Only 34% of IT and security decision-makers can track unauthorized hardware changes made by users or support teams.
Only 34% of IT and security decision-makers can track unauthorized hardware changes made by users or support teams. — This cybersecurity statistic was published by HP Wolf Security in July 2025. It covers topics including Hardware, Firmware, Printers. The original data appears in Securing the Print Estate: A Proactive Lifecycle Approach to Cyber Resilience. For the full methodology and detailed findings, refer to the original report.
Share or Copy this stat
Frequently Asked Questions
What does this statistic say?
Only 34% of IT and security decision-makers can track unauthorized hardware changes made by users or support teams. This data was published by HP Wolf Security and covers Hardware, Firmware, Printers.
Where does this data come from?
This statistic comes from Securing the Print Estate: A Proactive Lifecycle Approach to Cyber Resilience, published by HP Wolf Security on July 17, 2025. You can view the original report at https://www.hp.com/content/dam/sites/garage-press/press/press-kits/2025/hp-wolf-security-study-reveals-gaps-in-print-security-leaving-devices-vulnerable-to-risk/Print%20Lifecycle%20Short%20Report.pdf.
What cybersecurity topics does this cover?
This statistic relates to Hardware, Firmware, Printers. Browse more statistics on Hardware or from HP Wolf Security.