TOP
STORIES
 1 of 5
24 High-Tech Halloween Costumes
Former NASA engineer creates creepy Halloween costumes with the simple use of smartphones and tablets.
 2 of 5
Digital Signage Gets Spooky at 14-Acre Sports Complex
ConnectedSign installs 60 HD displays, including 12 interactive digital signage kiosks and a video wall, throughout 14-acre sports facility.
 3 of 5
Inside Atlanta’s High-Profile Security Control Rooms
In conjunction with its hosting this year's recently completed ASIS annual Seminar and Exhibits, media members took a tour of security operations and command centers around Atlanta.
 4 of 5
7 Super-Scary Wiring Scenarios
CI is bringing back our Halloween-themed guide to feeling great about your company's wiring techniques. What's the worst wiring scenario you've encountered?
 5 of 5
ESPN Makes Digital Splash with Eye-Popping SportsCenter Upgrade
Mobile displays, video floor, social media wall among many highlights of the new SportsCenter digital studio DC-2.
Cloud, Mobile Devices Increase Security Threats
CompTIA's annual Information Security Trends Survey stresses ongoing education of end users as they use company-funded mobile devices.

Article


November 21, 2012 | by D. Craig MacCormack

More than half of the 875-plus respondents to CompTIA’s 10th annual Information Security Trends Survey say they remain concerned about hacking, phishing, malware, viruses and other potential threats to their networks.

One of the other major trends in this year’s survey, says CompTIA director of technology analysis Seth Robinson, is the continued need for education of end users, many of whom still struggle to understand how to keep their information safe. The problems have multiplied, it seems, as companies continue to allow employees to use company-funded mobile devices as well as the expansion of cloud computing and social media.

“When you give these devices out, you’re really placing some trust in the hands of the end users,” says Robinson. “There’s a need to raise the level of awareness and that doesn’t mean hold one training session and be done with it. The landscape is changing so sufficiently, you really need to have some sort of ongoing training.”

Robinson suggests companies initiate simulated “attacks” of their networks and track the results, reporting to employees after they end how many people clicked on the phishing link or otherwise compromised the security of sensitive information.

Some companies, he says, may pick and choose what information should go on the cloud and what information should remain in-house.

“As the complexity of technology goes up, there are more chances of security issues,” says Robinson.

Growing In Importance
Four out of five companies expect to keep security as a high priority over the next two years, with large companies more likely to do so than their small and medium counterparts.

“Spending on security products shows no signs of abating, but a comprehensive security solution also must focus on the end users,” Robinson said. “It boils down to policies, processes and people, making every user aware of their responsibilities for security.”
Another key aspect of improving security, says Robinson, is a better working relationship between management and IT staffers, as the issues now touch on both sides of the aisle.

“Security can’t just be the domain of the IT department anymore,” he says. “Everyone needs to get up to speed on keeping an eye on what’s going on.”

Security and IT integrators could become the beneficiaries of the increasing push in many companies for more cloud computing and managed services offerings, where the company has its network and information watched by someone with more knowledge of potential threats and how to eliminate them.

Although the corporate setting is most often associated with security breaches and issues, restaurants and hotels “are collecting more and more data every day,” says Robinson, and utilities with smart meters need to be encrypted.

Medical facilities are another prime target for hackers, who are always trying to stay one step ahead of the security measures, he says.

“Even if there’s not an obvious threat, they’re always working on something new,” says Robinson.

View the 4 photos attached to this entry
       
View photos
About the author

Craig MacCormack is a veteran journalist with more than 15 years experience covering local and national news and sports as well as architecture and engineering. He joined Commercial Integrator in January 2011. Follow him on Twitter: @CraigMacCormack.
View all posts by D. Craig MacCormack
Social Bookmark or Share This
  • Facebook
  • Twitter
  • Digg
  • Del.icio.us
  • Yahoo! Bookmarks
  • Google Bookmarks
  • StumbleUpon
  • Technorati
  • Reddit
  • Windows Live
  • LinkedIn
  • Evernote
  • E-mail


  • Latest
  • Blogs
  • Photos
  • Resources
Flashback Friday: 7 Spooky Technologies (Still?) Frightening CIs

For this week's edition of Flashback Friday, take a look at what technologies were giving installers and manufacturers the willies just one year ago. AVB, HDBaseT, 4K, wireless video ... are you any more comfortable with these technologies in 2014?

Western Digital Expands Purple Line of Surveillance Hard Drives
24 High-Tech Halloween Costumes
Audio-Technica Presents ‘How to Mic a Zombie’
10 Cable Commandments of the HDBaseT Installer
View more news
Flashback Friday: 7 Spooky Technologies (Still?) Frightening CIs

For this week's edition of Flashback Friday, take a look at what technologies were giving installers and manufacturers the willies just one year ago. AVB, HDBaseT, 4K, wireless video ... are you any more comfortable with these technologies in 2014?

24 High-Tech Halloween Costumes
Advanced Places Projection in Back, Control Up Front
Digital Signage Gets Spooky at 14-Acre Sports Complex
Inside Atlanta’s High-Profile Security Control Rooms
View more photo galleries
White Paper:
5 Ways to Profit While Saving Clients’ Money on Utilities

How integrators can leverage power management, lighting control, HVAC, uninterruptable power supplies and room management systems increase revenue while offering customers solid ROI.

White Paper: Campuses Banking on Emergency Notification, Upgrades
Webcast: Unscrambling Your AVB, HDBaseT Questions
White Paper: Technology Brief on Control Rooms
White Paper: The Voice: How to Design Emergency Communication Systems with Announcements
White Paper: Digital Signs of the Times
White Paper: A Snapshot of the Onsite Freelance & Contractor Workforce
Webcast: 7 Ways an Integrator Can Save Clients Money on Utility Costs
View more papers or webcasts



Recent comments

I am pretty sure that it wasn’t the amount of flat screens that the player’s had in thier locker…

Posted by JT on 2014 10 31 · commented on
'University of Oregon Builds Football Performance Center for Champions'.

All the words I have on this topic are already there for everyone to judge as they see fit.  The only…

Posted by David Danto on 2014 10 30 · commented on
'An IT Guy’s Guide to ‘Talking Legacy AV''.

I had actually pulled back a comment that I had sent to post yesterday, however in follow up to the last posted…

Posted by Corey Moss on 2014 10 30 · commented on
'An IT Guy’s Guide to ‘Talking Legacy AV''.

I agree with Mr. D’Angelo.  There was a message in here worth discussing seriously, as Mr. Danto…

Posted by Mark Coxon on 2014 10 30 · commented on
'An IT Guy’s Guide to ‘Talking Legacy AV''.