The State of Security on the Internet of Things

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17
Previous Next

Click through for results from a mobile device security survey conducted by Mocana.

While there is a lot of concern over the security of IT equipment within the enterprise, the landscape of networked computing devices is still much more diverse than people realize.

In fact, a new survey of 15,000 IT and business professionals conducted by Mocana, a provider of security software for embedded systems, finds that while there is more awareness of these issues than ever in the wake of some high-profile attacks such as Stuxnet, most IT organizations are not doing a lot to protect these vulnerable systems.

As a result, most of the survey respondents said it’s only a matter of time before something major happens in their industry.

More Slideshows:


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.


2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security54-290x195 Five Easy Steps for Securing Data

Businesses of all sizes can benefit from clear, actionable tips on how to improve their data security. ...  More >>

Security51-190x128 Six Security Predictions and Tips for SMBs in 2015

Small to midsized businesses (SMBs) are vital to the U.S. economy, yet they are often the most vulnerable when it comes to cybersecurity. ...  More >>

Global13-290x195 Six Reasons Why CES Should Scare the Hell out of Network Administrators

While the tech geek is busting at the seams with anticipation, the network admin is scared to death. All this technology results in bandwidth hoarding, security vulnerabilities and compliance concerns for IT departments. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date