01:28 PM
Keith Ferrell
Keith Ferrell
Connect Directly

Central Office IT Neglects Mobile Security: CDW Survey

Mobile security is very much a moving target -- one that too many businesses are either missing or not aiming at altogether, according to a newly released study.

Mobile security is very much a moving target -- one that too many businesses are either missing or not aiming at altogether, according to a newly released study.The CDW User-Proof IT Security Report (registration required for free download) surveyed just over 300 IT pros and found, among other things:

Nearly 70 percent of businesses have no mobile device security policy in place.

Top IT security concern is employee use of the Internet, particularly inappropriate content access, yet close to 60 percent of the companies have no content filters (much less blockers) in place.

Outside software being loaded onto company equipment and networks gives security a pain, too, but only four in ten have network auditware in place.

A couple of things make the CDW survey worth your time:

First, close to 40 percent of the respondents represented companies with fewer than 500 employees: that's a higher percentage of realworld midsize business respondents than is typical of security surveys lately.

Second, the survey was restricted to IT professionals whose companies actually had a written security policy in place --

This is a) precisely the sort of filter that makes surveys both more specific and more valuable and b) one of those quantifiable measures of the disconnect between your security policies and procedures (100 percent of the respondents have written policies in place but 70 percent of those policies don't address mobile issues at all? Come on!) and the very insecure realities your employees and co-workers are creating.

Good reading that's worth thinking about. And acting on.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.