The Security Risks of Web 2.0 and Wireless

My early experiences as a reporter involved a typewriter. The very concept seems so remote it’s hard to believe at one time a small mistake would lead to unscrewing the cap off the White-Out or crumpling barely used sheets of paper. In a corner of my memory, I can still smell the White-Out and the […]

Written By: Pedro Pereira
May 29, 2008
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

My early experiences as a reporter involved a typewriter. The very concept seems so remote it’s hard to believe at one time a small mistake would lead to unscrewing the cap off the White-Out or crumpling barely used sheets of paper.

In a corner of my memory, I can still smell the White-Out and the typewriter ink. Another corner is stacked with trips to the library to look up the card index, sift through a reverse directory or use a microfiche machine.

“Microfiche.” Would today’s text-message-addicted teenager even know what that is? NITL! (For the uninitiated, that’s “not in this lifetime.”)

Now all I need is a laptop with a reliable Internet connection to replace all those “back-in-the-day” tools.

And I wouldn’t trade the laptop for anything. Appreciating the romance of days gone by is one thing, but it’s hard to beat the convenience and productivity afforded by the Internet and mobile computing.

Of course, I could do without the worry of whether someone is trying to hack into my wireless network or if a file that drops into my inbox is contaminated. Or the tracks I leave behind as I jump from web site to web site for shopping, entertainment or searching for information for my work.

As such, I am no different from you. Most likely you, too, worry about these side effects of modern-day conveniences.

And if you happen to be an IT manager trying to keep up with all the possible ways that information can leak out of your network or malware and viruses can sneak in, you may well be on the road to incurable insomnia.

The proliferation of handheld devices and notebook computers connected to desktops is a big contributor to the sleeplessness. More than 50 percent of respondents in a recent survey of 2,000 individuals by the Computer Technology Industry Association (CompTIA) said handheld devices have increased security threats.

Seventy-one percent of respondents said their organizations allow access to data in their networks by mobile and remote employees but indicated that security awareness training focused on mobile computing is not a priority for most. Only 39 percent of survey participants said their organizations have implemented security awareness training and education, while 19 percent said they intend to do so this year.
 
Clearly, there is a lot of exposure out there.

And while IT managers can be excused for the difficulty of keeping up with all the threats and technology advances, businesses have the option of retaining a solution provider with a security practice to help them secure their networks and data.

Wireless devices, after all, are only part of the concern. Businesses these days must contend with applications that have ongoing contact with the World Wide Web, be it to retrieve or send information.

Web 2.0 applications, such as instant messaging, Google Spreadsheets and Google Maps, deliver quantifiable benefits to cash-strapped businesses that, through those applications, gain access to technology that would otherwise be out of reach. But no good deed goes unpunished, so businesses must also be aware of and protect themselves against the accompanying risks.

It all starts with awareness. According to the CompTIA survey, 92 percent of the respondents whose organizations trained remote and mobile employees on security said the number of major security breaches has been reduced.

To the channel falls the job of helping all the organizations that remain behind the times in security. While we’re no longer talking about a migration from typewriters and microfiche, there’s still plenty to do to take full advantage of today’s technology.

Pedro Pereira is editor of eWeek Strategic Partner and a contributing editor for The Channel Insider. He is at pedro.pereira@ziffdavisenterprise.com.

Recommended for you...

Video: Why Women Are Leaving Tech – And How BouncePoint Plans to Stop It

Belinda Yax founded BouncePoint to bring women back to tech jobs and make it easier for them to stay and thrive.

Katie Bavoso
May 2, 2025
Video: Davin Jackson: The Cheat Code To A Career In Cybersecurity

Get to know eSecurity Planet’s Davin Jackson and his mission to be the change he wants to see in cybersecurity.

Katie Bavoso
Jan 23, 2025
The IT Job Market in 2024: MSPs and MSSPs in Review

The IT job market is evolving rapidly, driven by technological advancements and increasing reliance on digital solutions. What does this mean for MSPs and MSSPs?

Jordan Smith
Jan 7, 2025
Video: The Three Pain Points Holding Back High Capacity Leaders

IT Channel executive turned executive coach shares the tools to become a better leader.

Katie Bavoso
Jul 25, 2024
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.