News

Mobile devices and virtualisation pose big challenges for IT: survey

Increased use of mobile devices, especially smartphones, in addition to the transition to virtualisation, are key factors weighing on enterprises trying to sort out security strategy and budgets, according to a survey of 688 information and security managers.

According to the Ponemon Institute’s “State of the Endpoint” study released this week, there are serious signs that IT operations and IT security often fail to work as a team.

The survey found that 40% of respondents said collaboration is “poor or non-existent” and 48% called it “adequate, but can be improved.”

According to respondents,VMware and Microsoft Hyper-V, are the most popular software platforms their organisations support, and 55% said virtualisation does require “additional security measures,” with most turning for help with that to the vendor or vendors with specialised virtualisation security components.

But a surprising 41% indicated responsibility for virtualisation security isn’t clearly defined by department or function. Additionally, 21% said IT security was responsible, 15% said IT operations was and 11% said it was the job for IT compliance.

Mobile devices — especially the use of employee-owned devices for work purposes — are also putting new stress on the IT department, according to the survey, which was sponsored by Lumension. The survey shows that mobile devices, especially smartphones, are counted as among “the greatest rise of potential IT security risk.”

Use of personal mobile devices for work appears to be growing rapidly, analysts found. 17% of the survey’s respondents said more than 75% of the organisation’s employees use their personal devices in the workplace; 20% said more than half did.

Roughly half allow some level of connectivity to the corporate network and indicated they “secure them in a manner similar to that already in place for corporate devices;” 12% claimed security standards were even stricter. 21% said they allow no such use, while a similar number said they are planning to allow it.

A quarter of the survey’s respondents said they use mobile-device management (MDM) of some kind today and 45% indicated that use would increase in the next 12 months. According to the analysts in 2010 only  9% of respondents cited mobile devices such as smartphones as an area of the greatest risk to the enterprise, this year 48% did.

Microsoft OS and applications — still predominant in corporate use — are seen as most vulnerable to overall IT risks, though slightly less than 2010 when the question was also asked. There is also deep concern about possible vulnerabilities in third-party applications. And there’s growing nervousness about the Apple Mac OS, with 25% listing it in their top-three greatest concerns. That’s up from 15% last year who said they were worried about the Mac and malware.

In addition, 41% of IT managers are now “very concerned” about Mac malware infections, analysts said.

Malware in general continues to be the plague disrupting IT security, according to the survey. About a third cited a “major increase” in all types of malware incidents over last year, and 22% claimed there was a “slight increase.” The vast majority of the organisations in the survey use anti-virus software, according to the survey and found it useful, though 21% dissed antivirus/anti-malware as “not effective at all.”

But according to the survey, 43% said there were more than 50 “malware attempts or incidents” that their IT organisations had to deal with monthly. That was up from 27% that said that last year.

According to Ponemon Institue, 32% said IT coped with between 26 to 50 monthly malware attempts and incidents, 13% said 11 to 25, and only 12% cited less than that.

About 90% cited “web-borne malware attacks” as a source, with “zero-day attacks” the incident that was “the biggest headache.” 36% said that their organisation have been subject to “targeted attacks” aimed specifically at them for purpose of infiltrating the organisation.

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines