{"id":1838,"date":"2005-11-11T00:00:00","date_gmt":"2005-11-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/11\/11\/security-is-top-issue-for-converged-ip-deployments-survey\/"},"modified":"2021-12-30T11:40:05","modified_gmt":"2021-12-30T11:40:05","slug":"security-is-top-issue-for-converged-ip-deployments-survey","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/11\/11\/security-is-top-issue-for-converged-ip-deployments-survey\/","title":{"rendered":"Security Is Top Issue For Converged IP Deployments: Survey"},"content":{"rendered":"<p>Security is corporate executives&#8217; top priority for implementing converged IP networking, according to a new survey released by AT&#038;T and the Economist Intelligence Unit (EIU).  With more than 60% of respondents expressing concern that online customer data processing might expose their organizations to potential security breaches, IP security has become a hot topic.  Some 62% of companies surveyed plan to implement IP networking through most or all of their organizations within the next three years.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Though most of the executives surveyed believe that the majority of threats originate from within the organization, 89% identified viruses and worms as their primary security.  Nevertheless, they appear optimistic that the risks from these kinds of malicious code can be contained.  Only 83% expect viruses and worms to be the primary threat two years from now.<\/p>\n<p>However, there is growing concern about the predations of hackers and crackers.  Some 57% of respondents identified hackers and corporate espionage as a top threat, double what it was two years ago.  &#8220;The new capabilities of the ubiquitous network are great for commerce, but open a whole new dimension of risk,&#8221; AT&#038;T vice president of managed security services Stan Quintana said in a statement.  &#8220;A multi-layered approach to security is required.&#8221;<\/p>\n<p>Indeed, AT&#038;T and EIU report that organizations are willing to put the necessary resources into security to meet the threats.  The survey found that network security spending has stabilized at about 15% of IT budgets.<\/p>\n<p>http:\/\/www.securitypipeline.com\/news\/173601939<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1838","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1838","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1838"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1838\/revisions"}],"predecessor-version":[{"id":4325,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1838\/revisions\/4325"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1838"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1838"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1838"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}