The State of Endpoint Security - Slide 12

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18
Next The State of Endpoint Security-12 Next

What’s not to worry about?

Despite all the concern expressed about IT security and a significant increase in the quantity and complexity of attacks, not much seems to be actually improving.

A new survey of 688 IT security professionals in the U.S., conducted by the Ponemon Institute on behalf of Lumension Security, finds that not only is there an over-reliance on anti-virus software, but also that the amount of time IT organizations are spending on security issues is starting to have a significant impact on the rest of IT operations.

More Slideshows:

Beware: Twelve More Holiday Scams to Avoid Cyber scrooges work overtime during the holiday season – new threats hit mobile, email and the Web.

Seven Enterprise Search Appliances That Can Save the Day Appliances that can help you tame out-of-control document management.

Ten Ways to Optimize SharePoint 2010 for Peak Performance Top 10 management tips for SharePoint.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.