Mobile security seen as the major IT security risk in 2014
AGAT Software team
The vast majority of IT security professional view mobile devices as the biggest security threat in the upcoming year, according to a report published by the Ponemon Institute and Lumension.
The report, entitled “2014 State of Endpoint Risk,” indicated that 75 percent of respondents said mobile devices, such as smartphones, represented the greatest risk of potential security within the IT environment.
The survey, which included 676 IT and security professionals, stated that mobile endpoints were vulnerable to malware attacks, with 68% saying their mobile endpoints had been the target of malware in the last 12 months.
“Endpoint security risk is more difficult to manage than ever. The reason is the growing number of employees and other insiders using multiple mobile devices in the workplace followed by the increase in personal devices connected to the network and the growing popularity of public cloud services such as Dropbox,” the authors said.
When asked what plan their organizations had to secure employee-owned devices, 43% said they intended to use existing security plans, while 11% said that they had stricter security standards for BYOD (bring your own device) than for corporate-owned devices.
Of those who said their organizations had a BYOD security plan, 54% said they were relying on voluntarily installing an endpoint protection agent. Other steps included mandatory enrollment in company Mobile Device Management (MDM) solutions through technological means (35%) and a mandatory endpoint protection agent on laptops through technological means (32%).
Navigation: What is sentiment analysis? Why is sentiment analysis important? What is sentiment analysis used for? How does sentiment analysis work? What is sentiment analysis? The process of analyzing call recordings and chat to determine whether the underlying emotions are positive, negative, or neutral is the definition of AI sentiment analysis. In other words, sentiment […]
In this guide, we are going to practically go step-by-step in order to create and manage meeting policies and messaging policies in Microsoft Teams. We are also going to give tips on how to perform advanced governance actions such as permitting guest access, block joining anonymously to meetings and more. First of all, this only […]
Microsoft Teams is without a doubt one of the top collaboration platforms out there, especially with more and more companies converting to remote working since 2020. However, diving headfirst into a new collaboration platform without knowing its “ins and outs” sometimes leads to Team and Channel cluttering with a messy interface. On the one hand, […]