SHARE
Facebook X Pinterest WhatsApp

Where are You Vulnerable Security Traps Abound

Where are You Vulnerable Security Traps Abound Even as IT spending is under the gun in 2009 as budget cuts continue and IT projects are delayed, security remains a top concern and priority among IT professionals. Security breaches have decreased in number, but they’ve increased in severity in 2008, according to a recent survey of […]

Written By
thumbnail Jessica Davis
Jessica Davis
Jun 9, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

1Where are You Vulnerable Security Traps Abound

Even as IT spending is under the gun in 2009 as budget cuts continue and IT projects are delayed, security remains a top concern and priority among IT professionals. Security breaches have decreased in number, but they’ve increased in severity in 2008, according to a recent survey of 1,500 IT professionals, commissioned by CompTIA survey. Here’s what to look out for.

2No Title

The combination of human error and technical malfunction is the most prevalent cause of severe security breaches, both inside and outside of the United States. The survey reveals that intentional breaches and spyware are the least likely factors to cause a firm’s most severe security breach.

3No Title

Human error-related security breaches most often occur as the result of users failing to follow security procedures.

4No Title

Mobile devices, often not covered by corporate IT security policies, are a big source of vulnerability. They can include mobile phones and even USB thumb drives.

5No Title

Social networks also represent a threat. With more employees accessing Facebook, Twitter and other social networking sites from their work PCs and from their mobile phones, IT organizations must take a closer look at the risks.

6No Title

Breaches mean not only data loss. They also mean lost productivity. U.S. IT staff members spend 10 to 14 percent of their time dealing with breaches, depending on the company size. And outside of the U.S., staff members are likely to spend even more time dealing with breaches.

7No Title

While more companies are implementing comprehensive written IT security policies in the United States – over 60 percent in 2008 – whether a company has one or not is largely influenced by the size of the company. Small companies are the least likely to have such a policy. And most policies do cover remote and mobile employees, but far fewer cover mobile devices.

Recommended for you...

Hack The Box Report: Build Cyber Skills, Not Just Compliance
Luis Millares
Oct 17, 2025
SolarWinds Launches AI Agent and Expands AI Features
Jordan Smith
Oct 15, 2025
Check Point & Wiz Partner on Integrated Security Solutions
Jordan Smith
Oct 15, 2025
CyberArk Expands Machine Identity Security with New Features
Luis Millares
Oct 7, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.