Mobile App Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 20 November 2013

CompTIA: Why Are We Still Talking About Security?

Posted on 09:06 by Unknown
by Seth Robinson on Thursday, November 14, 2013  CompTIA

Security may not be as hyped as other tech trends like cloud computing, mobility or Big Data, but several CompTIA research studies have shown that it remains a top priority for businesses among a wide range of IT initiatives. However, that may not necessarily translate into businesses having a robust security posture or knowing which steps to take as they explore new technology models. CompTIA’s Eleventh Annual Information Security Trends study examines the areas that may need closer attention in order to avoid exposure.



According to the study, more than 8 in 10 companies view their current level of security as satisfactory or very satisfactory. Some percentage of these companies likely do have robust security policies and up-to-date tools, especially among the 13 percent of companies that say they have experienced a drastic amount of change in their security over the past two years. Many other companies, though, show low level of concern for emerging security threats and low levels of adoption for modern security defenses.

As companies utilize new technology trends, they must begin taking a new security approach. Formal risk analysis is only performed by 41 percent of companies, and this discipline can help inform security decisions as data is stored with public cloud providers or made available to mobile devices. Fifty-five percent of the root cause for security incidents is human error, but only 1 in 5 companies view human error as a serious concern. New technology investments will have marginal return in this area; the more effective strategy is to properly educate the workforce.

In addition to these overarching changes, new technical skills and tools are needed as well. Use of cloud systems, adoption of mobile devices and reliance on digital data all require new security processes and products. Many companies may have started using these technologies without fully thinking through the security implications, so security changes may be taking place even as new systems are used in production.

The landscape is certainly becoming complicated, opening opportunity for channel firms. While 85 percent of channel firms claim some involvement in security, only 36 percent of firms offer security as a standalone product or service. In an environment where 75 percent of end-users rely on more than one firm for technology needs, there may be an opening for more firms to specialize in security and ensure that every facet of an end-user’s technology plan is secured.

It seems that the main reason we’re still talking about security is that the message is taking time to sink in. Slowly, companies are realizing that the defenses of the past are not up to the challenges presented by today’s attackers, who are able to monetize any type of data and who show little favoritism between large and small companies. There are many new technologies that enable greater productivity and allow new possibilities, but they also open the door to new threats in security and privacy. Businesses will need to rethink their overall security strategy if they want to remain safe in this new era.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Cloud, ICT Research, Industry News, James Jones, Security | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • LearningWorks: THE MISSING PIECE: Quantifying Non-Completion Pathways to Success
    ” . . . in the California Community College system . . . nearly one-third of students took an average of just two courses over about two yea...
  • Cisco Career Certifications Awarded American National Standards Institute Accreditation
    Achievement Demonstrates Compliance With Rigorous, Internationally Recognized Standards SAN JOSE, CA--(Marketwire - Jan 16, 2013) - Unders...
  • CyberWatch West Free Student 2 Student Webinar October 30th
    Online Workshop Oct 30 at 10:30 am PDT Man-in-the-Middle Attacks Using Mobile Devices Register @ cyberwatchwest.webex.com Student 2 Student ...
  • Spring 2013 NEW CCCApply Webinar Series
      Monday, 28 January 2013, TechEDge Written by Tim Calhoon Saturday, 26 January 2013 The New CCCApply online admissions application...
  • Community college grads out-earn bachelor's degree holders
    By Jon Marcus at The Hechinger Institute @CNNMoney February 26, 2013: 6:23 AM ET Nearly 30% of Americans with associate's degrees now ...
  • ACM CCECC Alice Summer Workshops Registration now open
    Registration has opened for the Alice Summer Workshops! A week has been set aside for a Community College focused workshop at Walt Disn...
  • CA Career Cafe: CALJOBS Job Search Service Now Available
    “ Somewhere someone is looking for exactly what you have to offer. ”                                                                    - ...
  • Code.org Launches To Help Make Computer Programming Accessible To Everyone
    Drew Olanoff ,  TechCrunch       Drew Olanoff has over 10 years of marketing, PR, customer service and support, relationship buildin...
  • EDGE goals addressed in 2013-14 California State Budget
    California's 2013-14 State Budget and an accompanying trailer bill, AB 86, address key EDGE goals of 1) beginning to restore dedicated f...
  • NCRIC Cyber Internship Program
    Northern California Regional Intelligence Center Cyber Internship Program Northern California Regional Intelligence Center (“NCRIC”) Mission...

Categories

  • Big Data
  • CATV
  • CENIC
  • Certifications
  • Cloud
  • Computational Thinking
  • Computer Engineering
  • Computer Science
  • CTE
  • Database
  • Digital Divide
  • Digital Literacy
  • Digital Media
  • Diversity
  • Educational Technology
  • elearning
  • Electronics
  • Entrepreneur
  • ethics
  • funding opportunity
  • Gaming
  • GIS
  • Grants
  • Hacking
  • Healthcare IT
  • ICT Applications
  • ICT Core Competencies
  • ICT Education
  • ICT Infrastructure
  • ICT Jobs
  • ICT pathways
  • ICT Regulation
  • ICT Research
  • Industry News
  • Innovation
  • Internships
  • James Jones
  • K-12
  • law
  • Linux
  • Mobility
  • MOOC
  • MPICT Announcements
  • Multimedia
  • Networking
  • networking security
  • Olivia Herriford
  • Open Source
  • Operating Systems
  • Pierre Thiry
  • Piracy
  • Public Policy
  • Security
  • Security; Identity Management
  • Smart Grid
  • Social Media
  • Soft Skills
  • Software Assurance
  • Software Engineering
  • Spanish
  • STEM Education
  • Storage
  • Teaching and Learning
  • Telecom
  • Tools
  • virtualization
  • Web
  • WIB
  • Wireless
  • women
  • Women in ICT
  • Workforce Development

Blog Archive

  • ▼  2013 (418)
    • ▼  November (41)
      • NSA 'infected' 50,000 networks with malware
      • Techies must nip growing scorn in bud
      • Is the tide turning? Women filled 60% of tech jobs...
      • Transfer Program Between California Community Coll...
      • Talent Shortage May Impede New Hiring by Technolog...
      • Time for the United States to Re-Skill ?
      • Tim Berners-Lee says 'surveillance threatens web'
      • Start a Microsoft TEALS Computer Science Program f...
      • 7 Ways to Find the Best IT Jobs
      • Cal Poly Announces Major New Initiative In Cyberse...
      • WebProfessionals.org Announces STEM to STEAMIE Ini...
      • US Department of Labor: $100m Youth Career Connec...
      • CompTIA: Why Are We Still Talking About Security?
      • New Milestone for CompTIA Troops to Tech Careers I...
      • HP: 90% of Apple iOS mobile apps show security vul...
      • Career tech at community colleges should not be un...
      • ITIF: A Guide to the Internet of Things
      • Guardian: Cyber-attacks eclipsing terrorism as gr...
      • CTI: Tech Leaders Warn IT Talent Shortage Could C...
      • Robert Half Technology 2014 Technology Salary Guid...
      • 5 Technology Jobs That Didn’t Exist 5 Years Ago
      • ATE@20: MPICT Runs Three Tests of International T...
      • Please Sign Petition to Make Computer Science Coun...
      • Opinion: The Case for Citywide Broadband in LA
      • New broadband report reveals £20 return on every £...
      • IASE Unclassified Cyber Awareness Challenge
      • LearningWorks: THE MISSING PIECE: Quantifying Non...
      • IT budgets, headcount set to grow in 2014: study
      • IBM to Announce More Powerful Watson via the Internet
      • Here Come the WiFi Drones
      • Netflix, YouTube Account for 50% of North American...
      • Quick Tips: Flip Your Class
      • New CompTIA Mobility+ Certification Addresses Skil...
      • Bay Area Computer User & Network Support Marketpla...
      • Los Angeles Citywide Gigabit Fiber RFP: Is This th...
      • Microsoft and Facebook offer bounties to bug hunters
      • How Much Media? 2013
      • Hour of Code Tutorials Are Ready to Try - 1.5m Stu...
      • ICT jobs in California ripe for the picking
      • Joint Workforce Development, CBO and MPICT Webinar...
      • Center for Community College Student Engagement Re...
    • ►  October (53)
    • ►  September (44)
    • ►  August (21)
    • ►  July (30)
    • ►  June (28)
    • ►  May (43)
    • ►  April (43)
    • ►  March (35)
    • ►  February (43)
    • ►  January (37)
  • ►  2012 (82)
    • ►  December (25)
    • ►  November (40)
    • ►  October (17)
Powered by Blogger.

About Me

Unknown
View my complete profile