TOP
STORIES
 1 of 5
6 Products Win NSCA Excellence in Product Innovation Awards
Winners in six categories plus an overall Most Innovative Product of 2015 honored at NSCA's Business and Leadership Conference in Tampa, Fla.
 2 of 5
You're Out of Excuses: Time to Prepare for IT Convergence
The convergence of AV and IT continues to transform the integration industry. It’s time to get on board and get up to speed with the abundant resources at your disposal.
 3 of 5
Sydney Opera House is Exquisite Landscape for Far Out Projection
Technical Direction Company projected across a busy Sydney Harbour for Visions of Vienna, a multi-media concert with stunning visuals and live music by the Sydney Symphony Orchestra.
 4 of 5
Chronicles of a Rookie’s First Time at ISE
Everything a first timer should know about traveling to and attending Integrated Systems Europe in Amsterdam.
 5 of 5
4K and Beyond: What’s in Store for Digital Signage Expo…
Producer of Digital Signage Expo (DSE) 2015 gives CI a teaser of what you'll find at the March 10-12 event in Las Vegas.
Cloud, Mobile Devices Increase Security Threats
CompTIA's annual Information Security Trends Survey stresses ongoing education of end users as they use company-funded mobile devices.

Article


November 21, 2012 | by D. Craig MacCormack

More than half of the 875-plus respondents to CompTIA’s 10th annual Information Security Trends Survey say they remain concerned about hacking, phishing, malware, viruses and other potential threats to their networks.

One of the other major trends in this year’s survey, says CompTIA director of technology analysis Seth Robinson, is the continued need for education of end users, many of whom still struggle to understand how to keep their information safe. The problems have multiplied, it seems, as companies continue to allow employees to use company-funded mobile devices as well as the expansion of cloud computing and social media.

“When you give these devices out, you’re really placing some trust in the hands of the end users,” says Robinson. “There’s a need to raise the level of awareness and that doesn’t mean hold one training session and be done with it. The landscape is changing so sufficiently, you really need to have some sort of ongoing training.”

Robinson suggests companies initiate simulated “attacks” of their networks and track the results, reporting to employees after they end how many people clicked on the phishing link or otherwise compromised the security of sensitive information.

Some companies, he says, may pick and choose what information should go on the cloud and what information should remain in-house.

“As the complexity of technology goes up, there are more chances of security issues,” says Robinson.

Growing In Importance
Four out of five companies expect to keep security as a high priority over the next two years, with large companies more likely to do so than their small and medium counterparts.

“Spending on security products shows no signs of abating, but a comprehensive security solution also must focus on the end users,” Robinson said. “It boils down to policies, processes and people, making every user aware of their responsibilities for security.”
Another key aspect of improving security, says Robinson, is a better working relationship between management and IT staffers, as the issues now touch on both sides of the aisle.

“Security can’t just be the domain of the IT department anymore,” he says. “Everyone needs to get up to speed on keeping an eye on what’s going on.”

Security and IT integrators could become the beneficiaries of the increasing push in many companies for more cloud computing and managed services offerings, where the company has its network and information watched by someone with more knowledge of potential threats and how to eliminate them.

Although the corporate setting is most often associated with security breaches and issues, restaurants and hotels “are collecting more and more data every day,” says Robinson, and utilities with smart meters need to be encrypted.

Medical facilities are another prime target for hackers, who are always trying to stay one step ahead of the security measures, he says.

“Even if there’s not an obvious threat, they’re always working on something new,” says Robinson.

View the 4 photos attached to this entry
       
View photos
About the author

Craig MacCormack is a veteran journalist with more than 15 years experience covering local and national news and sports as well as architecture and engineering. He joined Commercial Integrator in January 2011. Follow him on Twitter: @CraigMacCormack.
View all posts by D. Craig MacCormack
Social Bookmark or Share This
  • Facebook
  • Twitter
  • Digg
  • Del.icio.us
  • Yahoo! Bookmarks
  • Google Bookmarks
  • StumbleUpon
  • Technorati
  • Reddit
  • Windows Live
  • LinkedIn
  • Evernote
  • E-mail


  • Latest
  • Blogs
  • Photos
  • Resources



Recent comments

We are looking forward to not only seeing what’s in store, but also showing some of what’s to…

Posted by Digital Signage Software on 2015 03 02 · commented on
'4K and Beyond: What's in Store for Digital Signage Expo 2015?'.

No truer words have every been written.

Posted by Tom Anderson on 2015 03 02 · commented on
'8 No-Cost Ways to Influence People'.

Chris;

Exactly how we plan to do these shows in the future, when possible.
The process does…

Posted by George Tucker on 2015 03 02 · commented on
'The One Thing You're Missing at Every Tradeshow'.

We stay each year in an apartment for ISE. Making sure we stay in a slight different location within the city…

Posted by Chris Dinsdale on 2015 02 28 · commented on
'The One Thing You're Missing at Every Tradeshow'.