The State of Security on the Internet of Things - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17
Next The State of Security on the Internet of Things-8 Next

The majority have or are working on it.

While there is a lot of concern over the security of IT equipment within the enterprise, the landscape of networked computing devices is still much more diverse than people realize.

In fact, a new survey of 15,000 IT and business professionals conducted by Mocana, a provider of security software for embedded systems, finds that while there is more awareness of these issues than ever in the wake of some high-profile attacks such as Stuxnet, most IT organizations are not doing a lot to protect these vulnerable systems.

As a result, most of the survey respondents said it’s only a matter of time before something major happens in their industry.

More Slideshows:


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

Why IT Projects Fail Recognize the early warning signs of imminent project failure.


2011 Salary Negotiation Tactics Experts offer key pointers on approaching the subject of salary as the economy evolves in 2011.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.