The State of Security on the Internet of Things

Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Previous Next

Click through for results from a mobile device security survey conducted by Mocana.

While there is a lot of concern over the security of IT equipment within the enterprise, the landscape of networked computing devices is still much more diverse than people realize.

In fact, a new survey of 15,000 IT and business professionals conducted by Mocana, a provider of security software for embedded systems, finds that while there is more awareness of these issues than ever in the wake of some high-profile attacks such as Stuxnet, most IT organizations are not doing a lot to protect these vulnerable systems.

As a result, most of the survey respondents said it’s only a matter of time before something major happens in their industry.

More Slideshows:


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.


2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

infra86-190x128.jpg Top 5 Places Your Enterprise Data Is at Risk

The top five areas exposing your sensitive data to risk and tips for minimizing security vulnerabilities. ...  More >>

Security99-290x195.jpg 5 Ways to Keep Cybersecurity on Track While on Vacation

Spring signals a time for many to press pause on hectic schedules and enjoy a week of vacation, but basic cybersecurity processes and procedures still need to remain priorities. ...  More >>

Security98-190x128 5 Security Steps to Protect Users from Ransomware

Advanced security hacking techniques known as ransomware attacks are on the rise, so it’s important that organizations be proactive in protecting against such attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.