51%
Any of the listed activities
33%
Used specific tools designed for security monitoring
31%
Risk assessment covering cybersecurity risks
18%
Tested staff (e.g. with mock phishing exercises)
17%
Carried out a cybersecurity vulnerability audit
11%
Pentration testing
10%
Invested in threat intelligence
51%
Any of the listed activities
33%
Used specific tools designed for security monitoring
31%
Risk assessment covering cybersecurity risks
18%
Tested staff (e.g. with mock phishing exercises)
17%
Carried out a cybersecurity vulnerability audit
11%
Pentration testing
10%
Invested in threat intelligence
51%
Any of the listed activities
33%
Used specific tools designed for security monitoring
31%
Risk assessment covering cybersecurity risks
18%
Tested staff (e.g. with mock phishing exercises)
17%
Carried out a cybersecurity vulnerability audit
11%
Pentration testing
10%
Invested in threat intelligence
Carried out a cybersecurity vulnerability audit
Any of the listed activities
Used specific tools designed for security monitoring
Risk assessment covering cybersecurity risks
Pentration testing
Invested in threat intelligence
Tested staff (e.g. with mock phishing exercises)
Flexera, 2024