Do smaller businesses in the Boston think they’re immune to security threats?

According to the Ponemon Institute’s “State of the Endpoint” study released this week, there are serious signs that IT operations and IT security often fail to work as a team. Forty percent say collaboration is “poor or non-existent” and 48% call it “adequate, but can be improved.” Virtualization, mainly VMware and Microsoft Hyper-V, are increasingly the software platforms their organizations support, and 55% say virtualization does require “additional security measures,” with most turning for help with that to the virtualization vendor or vendors with specialized virtualization security components.

With ever-increasing use of personal mobile devices, especially smartphones and other media devices, brought to the office companies are trying to sort out security strategy and budgets according to the more than 650 information and security managers surveyed.

Mobile devices — especially the use of employee-owned devices for work purposes — are also putting new stress on the IT department, according to the survey, which was sponsored by Lumension. The survey shows that mobile devices, especially smartphones, are counted as among “the greatest rise of potential IT security risk.”

There’s little doubt that security of every companies data, regardless of the size of the company, must be a priority. Finding the financial resources to carry out the necessary IT Security risk management can not wait. Your entire business might depend on it.

According to the survey, 43% said there were more than 50 “malware attempts or incidents” that their IT organizations had to deal with monthly. That was up from 27% that said that last year. Thirty-two percent said IT coped with between 26 to 50 monthly malware attempts and incidents, 13% said 11 to 25, and only 12% cited less than that.

Do numbers like this make you nervous about the IT Management and Security procedures currently in place at your company? They should, and the risk is not going to go away by itself.

If you would like to read the entire Network World article, just click here.