Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

Many Enterprises Still Struggling With Remote Security, Cisco Study Finds

Businesses still not prepared for mobile devices, operational disruptions, report says

Working remotely may have become an everyday occurrence for modern workers, but most companies still haven't normalized their policies and strategies for it, according to a study published today.

Cisco today announced the results of its "Securing the Mobile Workforce" nationwide survey, conducted last month. The survey shows that while many organizations appreciate the increased employee productivity and other benefits offered by laptop computers, smartphones, and virtual private networks, they may not have established clear security strategies or plans for employees to work remotely.

The survey, conducted by InsightExpress and commissioned by Cisco, interviewed 502 information technology decision makers from businesses of all sizes. The survey questioned IT professionals in the health care, retail, finance, government, and education sectors.

In the study, companies said they had enabled an average of 63 percent of employees with laptops, and another 46 percent of employees are using smartphones, noted Fred Kost, director of security solutions marketing at Cisco.

"With so many smartphones out there, it may be time to do some rethinking around the traditional VPN," Kost says. "The remote environment is changing, and the VPN client may change, as well."

Some companies are embracing the idea of the mobile worker, the study says. Of the companies that have adopted mobility and remote-access technology, 62 percent said doing so had resulted in increased employee productivity, with 57 percent noting an increase in employee satisfaction and 42 percent seeing a reduction in overhead costs.

But only 27 percent of the enterprises surveyed had enabled more than half of their workforce to work remotely, the study says. "That means that in the event of a disruption because of weather or other unforseen event, they may not be ready," Kost says.

Cisco did its part to support mobility earlier today, rolling out a new iPhone app that lets security managers track threats remotely.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
5 Common Errors That Allow Attackers to Go Undetected
Matt Middleton-Leal, General Manager and Chief Security Strategist, Netwrix,  2/12/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-7505
PUBLISHED: 2020-02-18
Stack-based buffer overflow in the gif_next_LZW function in libnsgif.c in Libnsgif 0.1.2 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LZW stream in a GIF file.
CVE-2015-7567
PUBLISHED: 2020-02-18
SQL injection vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary SQL commands via the "passwordreset&token" parameter.
CVE-2012-0718
PUBLISHED: 2020-02-18
IBM Tivoli Endpoint Manager 8 does not set the HttpOnly flag on cookies.
CVE-2019-10791
PUBLISHED: 2020-02-18
promise-probe before 0.10.0 allows remote attackers to perform a command injection attack. The file, outputFile and options functions can be controlled by users without any sanitization.
CVE-2009-5146
PUBLISHED: 2020-02-18
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.