article thumbnail

2015 Cyberthreat Defense Report Reveals Cyberattacks Rising and Confidence Sinking

CTOvision

CyberEdge Group surveyed more than 800 security decision makers and practitioners seeking a 360 degree view of threats, defenses and planned investments. Before diving into the details of the results we should mention that conclusions from opinion surveys like this are always somewhat generic. Enterprise mobility management holds firm.

Report 150
article thumbnail

Mobile device security: A new frontier for hackers

Cloud Musings

However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks. Staples For example, a security study found that 69 percent of users store sensitive personal information on their mobile devices. See “5 New Threats to Your Mobile Device Security” for more information.)

Mobile 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

Over the last year, IT budgets saw modest growth as departments embraced mobile, cloud and virtualization in record numbers. In a 2014 Next-Generation WAN Survey , 68 percent of respondents said demand for WAN bandwidth will increase over the next year. CTO Cyber Security DoD and IC Mobile' – bg. Limited WAN Bandwidth.

WAN 273
article thumbnail

Security attacks and countermeasures

Cloud Musings

The results of Dell’s Global Technology Adoption Index(GTAI) [1] show that security is a top concern for most of the 2000 global small and medium businesses surveyed. The outcomes further noted that such concerns create barriers to the adoption of critical technologies that drive value and growth: mobility, cloud and big data.

Security 159
article thumbnail

How to protect your data online

Dataconomy

Phishing attacks, malware, and hacking can all expose your PII to theft, risking your safety. For example, an app developer could improve a mobile application and encourage more downloads by tracking how users engage with it. Be wary of surveys and competitions that phish for sensitive data.

Data 41
article thumbnail

The BYOD Problem

Cloud Musings

The key trends influencing enterprise BYOD and mobile security line up as follows: Increased employee mobility (63%), satisfaction (56%) and productivity (55%) dominate as the top drivers of BYOD. 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi.

Mobile 70
article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

These areas of IT include general IT and technology, security, IT feeds, cloud computing, data center, mobile, social media, tips and tricks, virtualization, and operating system and software blogs. Malwarebytes is a leader of malware prevention and protection. They offer malware alerts, practical online security tips, and more.

Resources 113