{"id":1937,"date":"2008-05-21T00:00:00","date_gmt":"2008-05-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/21\/organizations-deal-with-a-broad-range-of-security-threats\/"},"modified":"2021-12-30T11:40:19","modified_gmt":"2021-12-30T11:40:19","slug":"organizations-deal-with-a-broad-range-of-security-threats","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/21\/organizations-deal-with-a-broad-range-of-security-threats\/","title":{"rendered":"Organizations deal with a broad range of security threats"},"content":{"rendered":"<p>Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The survey of more than 2,000 individuals found that viruses and worms, cited by 54 percent of respondents, and spyware, selected by 51 percent, continue to be the top two information security threats organizations face today.<\/p>\n<p>Nearly three-quarters of respondents surveyed (71 percent) said their organizations allow mobile and remote employees to access data and networks, yet relatively few have implemented security awareness training tailored specifically for the mobile and remote workforce.<\/p>\n<p>Yet among organizations that have implemented such training for remote and mobile employees, 92 percent of respondents believe that the number of major security breaches has been reduced.<\/p>\n<p>http:\/\/www.net-security.org\/secworld.php?id=6148<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1937","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1937"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1937\/revisions"}],"predecessor-version":[{"id":4424,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1937\/revisions\/4424"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}