{"id":1777,"date":"2004-10-28T00:00:00","date_gmt":"2004-10-28T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/28\/businesses-lack-spyware-protection\/"},"modified":"2021-12-30T11:39:58","modified_gmt":"2021-12-30T11:39:58","slug":"businesses-lack-spyware-protection","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/10\/28\/businesses-lack-spyware-protection\/","title":{"rendered":"Businesses lack spyware protection"},"content":{"rendered":"<p>While a majority of companies are increasingly concerned about the growth of spyware on their employees&#8217; desktops, few are using anti-spyware technology, according to survey results released on Wednesday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a US survey of IT managers and executives, 70 percent expressed growing concern over spyware, yet less than 10 percent have installed anti-spyware software, according to a statement issued by Webroot, the Boulder, Colorado, security software company that commissioned the survey.  The survey was conducted by Equation Research.<\/p>\n<p>The disconnect appears to come from slow realisation of the problem and the need to put out fires before trying a comprehensive approach, said Richard Stiennon, vice-president of threat research for Webroot.  &#8220;Spyware is insidious and has been installing itself for the last two or three years,&#8221; Stiennon said.  &#8220;But now it&#8217;s at a flash point, where IT managers are finding computer systems are crashing, or it takes forever for systems to boot up.  And when they investigate the problem, they&#8217;re finding it&#8217;s spyware.<\/p>\n<p>The first response is to use the first tool you can as a point solution&#8230;but because a one-to-one [software] solution is too costly over time, they&#8217;re beginning to look at pushing out solutions to every desktop.&#8221;<\/p>\n<p>The vast majority of executives and IT managers surveyed, 96 percent, feel that their existing antivirus and firewall software protect them from outside threats, according to the study.  &#8220;They&#8217;re thinking that spyware is not a threat to their security but just a threat to their productivity,&#8221; Stiennon said.  &#8220;That&#8217;s how they felt about spam in the beginning, too.&#8221;<\/p>\n<p>However, 82 percent of those surveyed said their desktops are currently infected with spyware.  A third of respondents said that spyware has been on the rise in the past six months.<\/p>\n<p>Last year, the National Cyber Security Alliance said that 91 percent of 120 individuals participating in a study had spyware loaded on their computers.  And virtually none of the participants realised spyware could be transmitted and installed via file-sharing programs.<\/p>\n<p>http:\/\/news.zdnet.co.uk\/internet\/security\/0,39020375,39171738,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1777","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1777"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1777\/revisions"}],"predecessor-version":[{"id":4264,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1777\/revisions\/4264"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}