â€œGiven todayâ€™s stagnant and declining IT budgets, itâ€™s imperative that organizations achieve more value from their IT spending,â€? said Steve Morton, vice president, enterprise product marketing, Symantec. â€œBy understanding challenges, risks and threats, organizations can plan and implement strategic technology initiatives such as virtualization, mobile security, encryption, backup and recovery, archiving and cloud computing to protect and manage their information more efficiently.â€?
As technologies become smarter and faster, the threats to these technological assets follow suit. For example, the exponential consumer adoption of smart mobile devices will increasingly result in these devices making their way into enterprises through the back door, blurring the lines between business and personal use, and driving new IT security models to market in 2011.
Analyst firm IDC estimates that by yearâ€™s end new mobile device shipments will have increased by 55 percent, and Gartner projects that in the same timeframe, 1.2 billion people will be using mobile phones capable of rich Web connectivity. Although cyber criminals have shown little interest in mobile devices in the past, as devices grow more sophisticated and as a handful of mobile platforms corner the market, it is inevitable that attackers will target mobile devices in 2011 and that mobile devices will continue to grow as a source of confidential data loss.