Where are You Vulnerable? Security Traps Abound

  • By

    Jessica Davis

    | Posted 2009-06-09
  • Email
 
 
 
Previous
No Title
Next
Even as IT spending is under the gun in 2009 as budget cuts continue and IT projects are delayed, security remains a top concern and priority among IT professionals. Security breaches have decreased in number, but they've increased in severity in 2008, according to a recent survey of 1,500 IT professionals, commissioned by CompTIA survey. Here's what to look out for.
The fight against security threats is never-ending, forever-changing and now more severe.Read on to see some of the most common methods and circumstances that can lead to a vulnerability with your network or systems.
 
 
Jessica Davis covers the channel for eWeek and Channel Insider. Her technology journalism career began well before anyone heard of the World Wide Web and has included stints at Infoworld, Electronic News/EDN, and the Philadelphia Business Journal. Her work has also appeared on CNN and Forbes.com. She has covered hardware, software and networking, as well as the business side of technology. She has won several journalism awards, including a national ASBPE award for best staff-written column, and was named Marketing Computers hardest working tech journalist on their inaugural list of top tech journalists. Jessica can be reached at jessica.davis@ziffdavisenterprise.com
 
 
 

Submit a Comment

Loading Comments...
























 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date