Pessimism Running High Over Data Breaches - Slide 3

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Pessimism Running High Over Data Breaches-3 Next

Mobile data is slightly ahead of organized crime and accidental exposure.

While confidence in our collective IT security appears to be down in 2010, there doesn’t appear to be much change in store in the way IT organizations plan to defend themselves.

A survey of 450 employees at Fortune 1000 companies conducted by FishNet Security, an IT services firm that specializes in security, found that while the vast majority of IT organizations think the number of data breaches will increase in 2010 due to the rise of mobile computing and social networks, few appear to be changing the way they think about security technologies in order to better respond to the threat.

That may be because of limited budgets and a lack of awareness of new security technologies. But whatever the reason, it appears IT organizations are awaiting the inevitable crisis in the face of constrained security budgets.

More Slideshows:

Identity Theft: What to Do If Your Personal Information Has Been Compromised Help users understand the steps they should take should their personal information be exposed.

Four Worst and Four Best Practices in Business Intelligence Maximize your business intelligence efforts by avoiding the worst and embracing the best practices identified by Information Builders.

If the Job Fits Five questions you should ask before accepting your next IT job.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.