{"id":2200,"date":"2008-05-06T00:00:00","date_gmt":"2008-05-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/06\/study-security-pros-look-to-wireless-biometrics\/"},"modified":"2021-12-30T11:40:52","modified_gmt":"2021-12-30T11:40:52","slug":"study-security-pros-look-to-wireless-biometrics","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2008\/05\/06\/study-security-pros-look-to-wireless-biometrics\/","title":{"rendered":"Study: Security pros look to wireless, biometrics"},"content":{"rendered":"<p>Companies plan to invest in wireless security and biometric technologies over the next year and increasingly view continuing education as a necessity to make their businesses more secure, according to a recently published survey.  The report, published by business-intelligence firm Frost &#038; Sullivan and funded by security-certification group (ISC)2, found that companies in each of three major regions &#8212; the Americas, Europe and Asia &#8212; listed wireless-security, biometric-authentication and business-continuity systems in their top-5 technologies to deploy in the next year.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Customer and public confidence will drive security up the priority list, based on the increasing impact that evolving threats have on the reputation and issues relating to privacy violations,&#8221; stated the report stated.<\/p>\n<p>About three-quarters of the security practitioners polled believe that worm and virus attacks are the top threat to their systems, followed by external attackers and inside employees. Half of those polled planned to gain additional training in security administration, and approximately a third planned to study either application and system-development security or network security.<\/p>\n<p>http:\/\/www.securityfocus.com\/brief\/732?ref=rss<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2200","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2200"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2200\/revisions"}],"predecessor-version":[{"id":4687,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2200\/revisions\/4687"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}