Highlighting the need for greater data security practices across industries, a new study from the Ponemon Institute found that 90 percent of polled businesses have suffered at least one data breach within the past 12 months.
In a survey of IT and IT security professionals from the United States, the study found that the complexity of implementing network security solutions was one of the biggest challenges for IT departments, cited 48 percent of respondents.
Additionally, 48 percent of respondents also cited resource constraints as one of their greatest issues when developing data protection strategies.
"Our survey research provides evidence that many organizations are ill-equipped to prevent cyber attacks against networks and enterprise systems," said Ponemon Institute founder and chairman Larry Ponemon.
The survey identified mobile devices as one of the main causes of concern when it comes to data security. Employee-owned devices and laptops, in particular, were cited as the endpoints most likely to result in a data breach.
Security concerns with mobile devices have been increasing in recent years, especially with the growth of smartphones and media tablets. While these devices may provide numerous productivity and efficiency improvements, developing security policies around them has proven to be a challenge for many companies.
There are a number of steps a company can take to bolster mobile cybersecurity. Data encryption has proven to be a popular solution for many businesses, as it enables IT security professionals to monitor and control access to certain information. Additionally, companies have found remote locking and memory wiping can ensure data doesn't fall into the wrong hands.
However, according to media consultant Amy Gahran, another approach that helps protect companies is simply developing good habits.
"Fortunately, protecting yourself against mobile security risks doesn't require getting paranoid about your phone," Gahran recently wrote for CNN.com. "Rather, it's about maintaining good habits, watching for red flags and deciding whether you need mobile security tools or services."