{"id":1834,"date":"2005-09-27T00:00:00","date_gmt":"2005-09-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/27\/hacking-viruses-top-concerns-for-enterprises\/"},"modified":"2021-12-30T11:40:05","modified_gmt":"2021-12-30T11:40:05","slug":"hacking-viruses-top-concerns-for-enterprises","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/09\/27\/hacking-viruses-top-concerns-for-enterprises\/","title":{"rendered":"Hacking, Viruses top concerns for enterprises"},"content":{"rendered":"<p>Survey findings showed that hacking, unauthorized access and firewall breaches are the biggest problems for small, medium and large enterprises evaluating network security solutions.  The survey, conducted by Nortel, indicated that nearly half of respondents fear hacking the most, followed by viruses and worms.  Moreover, more than half had experienced a virus attack.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The survey also revealed that small-medium-size businesses security concerns are more application focused where providing virus protection for the network is the biggest challenge.<\/p>\n<p>As a networking vendor for service providers and enterprises, Nortel is keenly aware of the changes impacting today&#8217;s networks, particularly the unprecedented growth in wireless access and types of devices.<\/p>\n<p>Survey&#8217;s additional findings showed that 55 percent outsource some network security functions; of these, 25 percent outsource all network security solutions; 60 percent saying they preferred to standardize on one source for security solutions.<\/p>\n<p>http:\/\/www.ebcvg.com\/articles.php?id=912<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1834","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1834"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1834\/revisions"}],"predecessor-version":[{"id":4321,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1834\/revisions\/4321"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}