Cybersecurity Research 2016: Weak Links, Digital Forensics, and International Concerns
- Provided by TechRepublic Premium
- Published August 30, 2016
- Topic TechRepublic Premium
- Format PDF
In May, Tech Pro Research conducted an online survey to find out what cybersecurity threats scare companies the most. Overall, respondents seemed more concerned about run-of-the-mill security breaches than acts of cyberwarfare. Almost half of people who took the survey came from small businesses, with 50 or fewer employees, and report author Jack Wallen pointed out the common misperception that small businesses don’t get targeted by cybercriminals. “Although most cyberwarfare attacks have much larger targets in mind, it is not beyond the realm of the possible that smaller targets are used as stepping stones to their ultimate goal,” Wallen said.
When asked what they felt was their company’s weakest security link, 45% of employees chose mobile devices. This is not a surprising finding, given the widespread use of smartphones, laptops, tablets and wearable devices in the workplace. In a Tech Pro Research survey on mobile security earlier in 2016, 47% of respondents reported that almost all employees at their company used either company-provided or personal devices for work purposes. Respondents to that survey also reported inconsistent use of security measures like user authentication, data encryption and device management software.
To solve the problem of securing mobile devices, and many other reported “weak links” like wireless networks and employee data, respondents said the key was education of end users and management. Education, plus the solution of researching policies and best practices beat out other strategies to tackle weak links like migrating systems to a more secure platform or provider or purchasing more secure hardware. To find out more, download the full report.
People Also Downloaded
- Cybersecurity Research 2016: Weak Links, Digital Forensics, and International Concerns
- Research: IT budget - drivers, trends and concerns in 2016
- Research: Defenses, response plans, and greatest concerns about cybersecurity in an IoT and mobile world
- Research: As overseas business operations grow so do concerns over cyberwarfare and cybersecurity