Employee-Empowering Technologies Raise Security Stakes for Organizations

Cloud computing, mobility, social tools and other technologies that put more power in the hands of individual users pose new challenges for organizations seeking to secure data, devices and networks.

The majority of companies in CompTIA's 10th Annual Information Security Trends study attribute human error as a contributing cause of security breaches, just as they have in the previous nine years of the study. What's changing, however, is that the human element is no longer confined to malware, phishing and viruses.

Cloud computing options force end users to consider how data is handled outside of their organization. Unauthorized mobile applications and mobile malware strains are becoming more prevalent. Social networking is a growing factor affecting organizational security.

Four out of five companies expect to keep security as a high priority over the next two years, with large companies more likely to do so than their small and medium counterparts. Along with growing concern over increasingly sophisticated and targeted cyber-attacks, changes in IT operations have also prompted new security approaches.

In dealing with these changes, 41 percent of organizations report a need to help their security staff close moderate or significant gaps in security expertise, with the deficit most pronounced in areas such as cloud security, mobile security and data loss prevention. The impact of these deficiencies is felt in several ways, including being unaware of where the company is exposed, loss of business as a result of security issues with customer data and costs incurred for training the current workforce.

A net 49 percent of companies say they intend to hire security specialists, including those that also plan on training current staff. Executives have a strong preference for security professionals with industry certifications. A full 84 percent said they experienced a positive return on investment in security certifications, with certified staff viewed as more valuable because of their proven expertise and ability to perform at a high level than non-certified staff.

Featured

  • Achieving Clear Communications

    Achieving Clear Communications

    Technology within the security industry has adapted to numerous changes through the years, from the early days of analog devices to today’s IP-based solutions, networked cameras, and access control solutions, in addition to analytics, cloud-based products, virtual security guards, and more. Read Now

  • Taking Flight

    Taking Flight

    Airport security is a complex system that incorporates multiple technologies to ensure the safety and security of travelers, employees and the facility itself. Sound-based technologies are integral pieces of this system, providing means of communication, notification and monitoring. Read Now

  • Live From ISC West 2023 Preview

    Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • A Break from Routine

    A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

New Products

  • CyberAudit Introduced to Manage Systems, Intuitive Interface

    CyberAudit Web

    CyberLock, Inc. announces the release of CyberAudit Web 9.4! CyberAudit-Web (CAW), the software suite for managing CyberLock systems, provides an intuitive interface to assign keys, set expirations, monitor staff and configure access schedules. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • Pivot3 Surety

    Pivot3 Surety

    Pivot3 has announced Surety, a new intelligent software framework to simplify the management and monitoring of physical security environments. 3