TOP
STORIES
 1 of 5
Top 10 Most Dramatic Football Stadium Upgrades
In honor of the Super Bowl, we're rounding up the most transformational stadium upgrades featured on Commercial Integrator.
 2 of 5
InfoComm Offering Courses & Seminars at ISE 2015
Check out the schedule of InfoComm offerings at the upcoming Integrated Systems Europe (ISE) show in Amsterdam.
 3 of 5
Virtue of the Ugly: When AV Mirrors Rock n’ Roll
It's time for AV integrators to follow in the footsteps of great rock n' roll musicians... and aim for more than just aesthetics.
 4 of 5
Academy Awards to be Drenched in Dolby Atmos Sound
Over half of the Oscar-nominated films for best sound editing were mixed in Dolby Atmos, including American Sniper, The Hobbit and Unbroken.
 5 of 5
Porsche Drivers Get Even More Attention Thanks to Digital Billboard
Australian billboard equipped with vehicle recognition technology caters its message directly to approaching Porsche drivers on the highway.
Cloud, Mobile Devices Increase Security Threats
CompTIA's annual Information Security Trends Survey stresses ongoing education of end users as they use company-funded mobile devices.

Article


November 21, 2012 | by D. Craig MacCormack

More than half of the 875-plus respondents to CompTIA’s 10th annual Information Security Trends Survey say they remain concerned about hacking, phishing, malware, viruses and other potential threats to their networks.

One of the other major trends in this year’s survey, says CompTIA director of technology analysis Seth Robinson, is the continued need for education of end users, many of whom still struggle to understand how to keep their information safe. The problems have multiplied, it seems, as companies continue to allow employees to use company-funded mobile devices as well as the expansion of cloud computing and social media.

“When you give these devices out, you’re really placing some trust in the hands of the end users,” says Robinson. “There’s a need to raise the level of awareness and that doesn’t mean hold one training session and be done with it. The landscape is changing so sufficiently, you really need to have some sort of ongoing training.”

Robinson suggests companies initiate simulated “attacks” of their networks and track the results, reporting to employees after they end how many people clicked on the phishing link or otherwise compromised the security of sensitive information.

Some companies, he says, may pick and choose what information should go on the cloud and what information should remain in-house.

“As the complexity of technology goes up, there are more chances of security issues,” says Robinson.

Growing In Importance
Four out of five companies expect to keep security as a high priority over the next two years, with large companies more likely to do so than their small and medium counterparts.

“Spending on security products shows no signs of abating, but a comprehensive security solution also must focus on the end users,” Robinson said. “It boils down to policies, processes and people, making every user aware of their responsibilities for security.”
Another key aspect of improving security, says Robinson, is a better working relationship between management and IT staffers, as the issues now touch on both sides of the aisle.

“Security can’t just be the domain of the IT department anymore,” he says. “Everyone needs to get up to speed on keeping an eye on what’s going on.”

Security and IT integrators could become the beneficiaries of the increasing push in many companies for more cloud computing and managed services offerings, where the company has its network and information watched by someone with more knowledge of potential threats and how to eliminate them.

Although the corporate setting is most often associated with security breaches and issues, restaurants and hotels “are collecting more and more data every day,” says Robinson, and utilities with smart meters need to be encrypted.

Medical facilities are another prime target for hackers, who are always trying to stay one step ahead of the security measures, he says.

“Even if there’s not an obvious threat, they’re always working on something new,” says Robinson.

View the 4 photos attached to this entry
       
View photos
About the author

Craig MacCormack is a veteran journalist with more than 15 years experience covering local and national news and sports as well as architecture and engineering. He joined Commercial Integrator in January 2011. Follow him on Twitter: @CraigMacCormack.
View all posts by D. Craig MacCormack
Social Bookmark or Share This
  • Facebook
  • Twitter
  • Digg
  • Del.icio.us
  • Yahoo! Bookmarks
  • Google Bookmarks
  • StumbleUpon
  • Technorati
  • Reddit
  • Windows Live
  • LinkedIn
  • Evernote
  • E-mail


  • Latest
  • Blogs
  • Photos
  • Resources



Recent comments

superb blog and also very helpful.
if you are interested, to increase your knowledge about Business…

Posted by amitgupta on 2015 01 28 · commented on
'Brush with Business Doom: How 2 Firms Came Back from the Brink of Disaster'.

You are correct! The distinction is that this is the 37th consecutive year that films using Dolby audio technologies…

Posted by Chelsea Cafiero on 2015 01 22 · commented on
'Academy Awards to be Drenched in Dolby Atmos Sound'.

    “Dolby Atmos debuted in June 2012 in the Oscar-winning animated film Brave.”

Posted by Ken DeLoria on 2015 01 22 · commented on
'Academy Awards to be Drenched in Dolby Atmos Sound'.

This is great for Cambridge. Though LogiSon has had this ability for a number of years with their networked…

Posted by Frank on 2015 01 21 · commented on
'Cambridge Sound Management Enables Sound Masking Across Multiple Locations'.