Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    BYOD, Malware Among Top Issues Affecting IT Security

    By
    Nathan Eddy
    -
    July 24, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1BYOD, Malware Among Top Issues Affecting IT Security

      1 - BYOD, Malware Among Top Issues Affecting IT Security

      by Nathan Eddy

      2Security Incidents Affect Nearly All Organizations

      2 - Security Incidents Affect Nearly All Organizations

      Almost all (96 percent) of survey respondents said they experienced at least one significant security incident in the past year, while nearly four in 10 (39 percent) said they had experienced two significant incidents and 16 percent experienced five or more. The study also indicated infrastructure complexity impacts security management, with 40 percent of companies finding security management more difficult today than two years ago.

      3BYOD Programs Poke Holes in Corporate Security

      3 - BYOD Programs Poke Holes in Corporate Security

      Of the top seven areas that saw significant security violations, malware and advanced threat protection led the list, with 60 percent, followed by application security (58 percent) and wireless security. More than half (54 percent) reported a serious violation of personal mobile device use, indicating BYOD programs need to be strengthened.

      4Firewalls, VPN Top List of Valuable Solutions

      4 - Firewalls, VPN Top List of Valuable Solutions

      Only a third of respondents said they were very confident when asked about the likelihood of improving their weakest IT security management areas, although 54 percent expressed some level of confidence and just 13 percent said they were not at all confident. Firewalls and virtual private networks (VPN) were considered the top solutions for integration value.

      5Information Security Overhead Expanding

      5 - Information Security Overhead Expanding

      Problem prevention was perceived to be more challenging today than two years ago by 49 percent of all organizations across the five industry sectors surveyed, and the findings suggest many organizations will continue to place more emphasis on problem prevention and explore the means to facilitate remediation. Results also indicated that the information security management overhead is expanding rather than contracting in most organizations.

      6Health Care, Financial Sectors See Data Leaks

      6 - Health Care, Financial Sectors See Data Leaks

      When ranked according to impact on a global basis, the health care sector was particularly affected by data leakage monitoring issues (60 percent). Although the financial industry appears to have seen fewer violations in data leakage monitoring, it recorded slightly higher-than-average data leakage incidents.

      7Health Care Also Struggles With Mobile Devices

      7 - Health Care Also Struggles With Mobile Devices

      Respondents in the health care sector also revealed themselves to be even more immature in personal mobile device security (65 percent) and endpoint compliance discovery and remediation (62 percent), compared with the cross-industry aggregate (60 percent and 57 percent). Financial institutions, in general, had more mature security management capacity in aggregate compared with other industries.

      8Education, Manufacturing Less Confident Than Finance

      8 - Education, Manufacturing Less Confident Than Finance

      Those most confident that security event-logging and monitoring tools would be improved came from the financial services industry (45 percent), with education the least certain in this respect, with just a third very confident, compared with 67 percent who were either somewhat or not confident. Those in the education and manufacturing sectors were the least sure that security measures relating to personal mobile device use would be improved.

      9Internal Security Breaches a Major Concern in U.S.

      9 - Internal Security Breaches a Major Concern in U.S.

      Overall, a greater number of organizations are satisfied or overly confident with security provisions governing devices connecting to their networks that belong to their own staff; however, a sizeable proportion, particularly in the United States, fears breaches from within more than most. Compliance policy violations occurred an average of 2.6 times in the last year across all three regions, but more in the United States (3.1) than in the United Kingdom (2.5) and Germany, Austria and Switzerland (2.2).

      10Mobile Security a Major Focus for IT

      10 - Mobile Security a Major Focus for IT

      Mobile security issues were ranked third in terms of impact significance for all global sectors, except financial services, where greater restrictions on device use are more strongly enforced. However, the survey found companies in this sector still suffered more violations due to issues with endpoint data encryption than those elsewhere.

      11BYOD Presents Myriad Security Issues

      11 - BYOD Presents Myriad Security Issues

      An average of 78 percent of all respondents cited that any one of 14 popular BYOD controls referenced would have an impact on existing governance, risk and compliance (GRC). Malware prevention (82 percent), lost or stolen device data-wipe mechanisms (82 percent), appropriate user/device enrolment tools (81 percent), device usage controls (79 percent) and data encryption (79 percent) were perceived to have the most significant GRC implications.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×