Security Pros Worry About Cloud and Mobile Safety

 
 
By Karen A. Frenkel  |  Posted 05-01-2017 Email
 
 
 
 
 
 
 
 
 
  • Previous
    Security Pros Worry About Cloud and Mobile Safety
    Next

    Security Pros Worry About Cloud and Mobile Safety

    Companies are flocking to mobile devices and the cloud, but IT security professionals worry about data loss, which is their main mobile security concern.
  • Previous
    Confidence in Security
    Next

    Confidence in Security

    Asked how confident they are in their organization's overall security, 35% of respondents feel extremely or very confident; 50% feel moderately confident; 11% feel slightly confident; and 3% do not feel at all confident.
  • Previous
    Top Cloud Service Delivery Models
    Next

    Top Cloud Service Delivery Models

    SaaS: 72%, IaaS: 57%, PaaS: 49%, BPaaS: 11%, None or not sure: 8%
  • Previous
    Main Benefits of the Cloud
    Next

    Main Benefits of the Cloud

    Flexible scalability: 49%, Improved availability and business continuity: 41%, Increased agility: 37%, Cost reduction: 37%, Accelerated deployment and provisioning: 31%, Improved security: 21%
  • Previous
    Cloud Security a Top Concern
    Next

    Cloud Security a Top Concern

    81% of respondents said they are concerned about security; 13% said they are slightly concerned; and 6% said they are not at all concerned.
  • Previous
    Top Five Barriers to Cloud Adoption
    Next

    Top Five Barriers to Cloud Adoption

    General security risks: 34%, Lack of staff resources or expertise: 32%, Integration with existing IT environment: 29%, Data loss and leakage risks: 29%, Legal and regulatory compliance: 27%,
  • Previous
    Biggest Cloud Security Headaches
    Next

    Biggest Cloud Security Headaches

    Visibility into infrastructure security: 43%, Setting consistent security policies: 38%, Compliance: 36%, Reporting security threats: 34%, Lack of integration with on-premises security: 34%
  • Previous
    Best Ways to Protect Data In the Cloud
    Next

    Best Ways to Protect Data In the Cloud

    Data encryption: 76%, Network encryption: 69%, Access control: 55%, Trained cloud security professionals: 47%, Intrusion detection and prevention: 42%
  • Previous
    Biggest Pain Points for Mobile Security
    Next

    Biggest Pain Points for Mobile Security

    Added IT resources needed to manage mobile security: 31%, Increased help desk workload: 24%, Reduced employee productivity: 16%, Malware infections and related costs: 13%, Data loss or leakage: 12%
  • Previous
    Top BYOD Security Concerns
    Next

    Top BYOD Security Concerns

    Data leakage: 65%, Lost or stolen devices: 61%, Users download unsafe apps or content: 59%, Malware: 57%, Unauthorized access to data and systems: 56%
  • Previous
    Negative Impact of Mobile Threats
    Next

    Negative Impact of Mobile Threats

    Requires more IT resources for mobile security: 25%, Increased help desk workload: 23%, Data loss or leakage: 12%, Reduced employee productivity: 12%, Malware infections and related cost: 12%
 

A recent survey finds that IT security professionals' security concerns are directly linked to the cloud and mobile devices. Eighty-one percent of the respondents expressed concern over public cloud usage, and, of these individuals, 49 percent are extremely or very concerned, according to the report, "2017 Cyber Security Survey." Sixty-five percent of the security professionals surveyed said data loss was their main mobile security worry. "It's no surprise that keeping these devices protected requires a different approach than traditional network security often provides," Donald Meyer, head of product marketing, cloud and data center at Check Point Software Technologies, wrote in a company blog. The study, which was done by Check Point in collaboration with Crowd Research Partners, surveyed 1,900 IT professionals in US-based companies with 1,000 or more employees. The survey highlights the security controls and technologies IT professionals consider most effective, and it includes recommendations on how to deploy architectures that protect complex hybrid networks and mobile devices.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login Register