Visit Our Sponsors
The increasingly mobile nature of the workforce is creating new security challenges for information technology (IT) staffs, research from the Computing Technology Industry Association (CompTIA) reveals. Theft of data and confidential information is a greater concern for more firms, especially when it comes to the use of hand-held devices and laptop computers by remote and mobile workers, according to the CompTIA survey.
Sixty percent of the 1,070 organizations surveyed said security issues related to the use of handheld devices for data access and transfer have increased significantly or increased somewhat over the past 12 months.
When it comes to wireless networks, 55 percent of organizations said security issues have increased significantly or somewhat over the past 12 months.
"The increasing pervasiveness of remote access to confidential data and applications by mobile employees, and the implementation of wireless networks, are raising the stakes for corporate IT departments," said John Venator, president and chief executive officer, CompTIA. "As access extends beyond the four walls of the organization to satellite offices, home-based workers and mobile employees, each remote connection or access point is another potential security vulnerability that must be secured."
Nearly 80 percent of the organizations allow data access by remote or mobile employees. But just 32 percent of organizations have implemented any security awareness training for these workers; and just 10 percent plans to implement such training in the next 12 months.
"Organizations that do not train their mobile workers in security fundamentals are doing themselves a great disservice," Venator said. "Nearly 90 percent of organizations that have implemented awareness training for remote and mobile workers believe that the number of security breaches they've encountered has been reduced."
CompTIA commissioned TNS Prognostics, a global leader in customer research-based consulting, to conduct the study to identify current IT security practices and highlight security challenges confronted by organizations of varying sizes and sectors.
Enjoy curated articles directly to your inbox.