Used authentication measures to protect data and devices in the UK 2018

Which authentication methods do you use to protect your data and devices?

CharacteristicShare of respondents
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
Statistic: Which authentication methods do you use to protect your data and devices?
Download
Show detailed source information?
Register for free
Already a member?
Log in
Source

Use Ask Statista Research Service

Number of respondents

1,041 respondents

Age group

18 years and older

Special properties

UK residental online population

Supplementary notes

Multiple answers were possible.

Citation formats
Use Statista now: unlimited access to all content
Leading companies trust Statista:
paypal google adobe pg samsung telekom
Statista is a great source of knowledge, and pretty helpful to manage the daily work.
Christof Baron

Christof Baron
CEO, MindShare Germany

Statistics on " Cyber crime in Latin America "

Other statistics that may interest you Cyber crime in Latin America

Overview

7

Types of attacks

8

Incidents in companies

8

Strategies and responses

8

Further related statistics

1

Discover Statista

Need help with using Statista for your research? Tutorials and first steps
Do you have any questions about our business solutions?

We provide you with detailed information about our Professional Account.

Use Statista now: unlimited access to all content
Learn more about how Statista can support your business.