Survey: Mobile Devices, Remote Computing Posing New Security Challenges

Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals.

The CompTIA survey of more than 2,000 individuals found that viruses and worms, cited by 54 percent of respondents, and spyware, selected by 51 percent, continue to be the top two information security threats organizations face today.

But security issues related to handheld devices, and to mobile and remote workers, are clearly emerging concerns. In each of the four countries where surveys were conducted the United States, Canada, United Kingdom, and China more than 50 percent of respondents said security threats related to use of handheld devices has increased significantly compared to one year ago.

"As global trends of workforce mobility and decentralization place a greater strain on IT security infrastructure, it is becoming increasingly more complex for IT departments to safeguard information," said Laurel Chivari, vice president, marketing and communications, CompTIA. "Threats related to mobile/remote computing and handheld devices can include simple user operating error; using a mobile device for unauthorized purposes; worms, viruses and phishing attacks; or loss or theft of the mobile device."

Nearly three-quarters of respondents surveyed (71 percent) said their organizations allow mobile and remote employees to access data and networks, yet relatively few have implemented security awareness training tailored specifically for the mobile and remote workforce. Just 39 percent of respondents said their organizations have implemented security awareness training and education, while 19 percent said they intend to do so in 2008.

Yet among organizations that have implemented such training for remote and mobile employees, 92 percent of respondents believe that the number of major security breaches has been reduced.

CompTIA commissioned TNS to conduct the survey. The online survey of individuals responsible for information security enforcement in their organizations was conducted in January and February and received a total 2,024 responses. For more information on "Trends in Information Security: A CompTIA Analysis of IT Security and the Workforce" and other CompTIA research, visit http://www.comptia.org/sections/research/default.aspx.

Featured

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities