© Copyright Acquisition International 2025 - All Rights Reserved.

Article Image - Surge in IT Security Measures Anticipated in 2015
Posted 24th February 2015

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Surge in IT Security Measures Anticipated in 2015
Image

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Chief information officers (CIOs) are taking a multipronged approach to protecting sensitive company information, a new survey from Robert Half Technology shows. The majority of CIOs interviewed are currently taking or planning to take steps in the next 12 months to improve information technology (IT) security at their firms. The most common strategies include beefing up employee training on security issues (54 percent), vetting firms that have access to company data more closely (45 percent) and hiring more IT security professionals (41 percent).

The survey was developed and conducted by Robert Half Technology, a leading provider of IT professionals on a project and full-time basis, and includes responses from more than 2,400 CIOs from U.S. companies with 100 or more employees in 24 metropolitan areas.

CIOs were asked, “Which, if any, of the following measures is your company currently taking or planning to take within the next 12 months to enhance IT security?” Their responses:*

  • Currently taking or planning to take ANY of the following measures- 85%
  • Enhance employee training on security issues- 54%
  • Enhance vetting of firms with access to company data- 45%
  • Add IT security personnel- 41%
  • Implement multifactor authentication processes- 41%
  • Contract with third-party vendors or add tools to enhance security- 41%
  • Currently taking other measures- 1%
  • Not currently taking or planning to take any of the measures identified- 15%

* Multiple responses were allowed.

“We live in an era where information security threats are a real business risk,” said John Reed, senior executive director of Robert Half Technology. “CIOs are attacking the problem from all sides, but there is a strong emphasis on employee-driven measures. Vigilant IT teams and security-savvy individuals throughout the organisation are a valuable and fundamental defense; without both, other courses of action will be less effective.”

A strong organisational communications plan and sound relationships with vendors will help improve security measures, but it all begins with the team responsible for managing those efforts.

Robert Half Technology offers the top three attributes of effective security employees and what to ask them when hiring:

  •  Future Focused – It’s important to ensure candidates will be an asset to your security efforts, bringing a broad range of experiences that will allow them to identify vulnerabilities in your network. Use this opportunity to discuss their use of proven methodologies, best practices and risk intelligence in previous roles and try to assess how they would apply them in your company. Ask candidates: “How would you create a security-conscious culture in our business?”
  • Security Certifications – A well-rounded security professional will not only take steps to protect the organisation, but also to stay ahead in the industry. With so many widely recognised certifications available — like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) and CompTIA certifications — it’s not uncommon for candidates to have these on their resumes. While certifications show an investment and commitment to growing their knowledge base, it’s important to assess applicants’ real-world experience, too. Ask candidates: “How have your security certifications prepared you for this role?”
  • Soft Skills – IT security professionals should have impeccable communication skills. Externally, they should be building solid relationships with firms and vendors that have access to company data or may be brought on to help with security efforts. Internally, they should be able to raise awareness to potential threats and explain security measures in a way that will help guide employee behaviors. The prevalence of bring your own device (BYOD) policies, for example, is just one of the many trends that make clear communication skills vital to ensuring companywide compliance. It’s essential for security team members to build partnerships across the organisation to help increase vigilance throughout. Ask candidates: “What would be your communications approach around security, potential threats and best practices to senior leadership and employees companywide?”

Added Reed, “Successful organisations always start with good people, and talented security professionals are no exception. An effective security team will be able to institute processes, establish policies and ensure best practices are in use, resulting in the utmost safety for the business.”

Categories: Strategy


You Might Also Like
Read Full PostRead - Eye Icon
Paying the Price: Late Payments Forcing UK Businesses to Make Tough Decisions
Finance
17/02/2015Paying the Price: Late Payments Forcing UK Businesses to Make Tough Decisions

Although late payments are something almost every business comes across, in the UK there is currently a culture of unpaid payment causing a domino effect of debt across the British Isles.

Read Full PostRead - Eye Icon
M&A Appetite on the up, but Completed Deals Slide, says KPMG
Finance
08/09/2015M&A Appetite on the up, but Completed Deals Slide, says KPMG

Despite the recent turbulence in the markets, analysts expect the world’s largest businesses to show an increasing appetite for M&A transactions.

Read Full PostRead - Eye Icon
Cybersecurity on the high seas
Innovation
26/04/2019Cybersecurity on the high seas

With their preference for hijacks, machine-gun-point robbery and hostage-taking ransoms, 21st-century pirates on the high seas are a far cry from the pirates that we have all heard and read about.

Read Full PostRead - Eye Icon
Unlocking Corporate Appeal: How Print On Demand Elevates Brand Identity
News
31/08/2023Unlocking Corporate Appeal: How Print On Demand Elevates Brand Identity

Unlocking Corporate Appeal: How Print On Demand Elevates Brand Identity As companies try to make a name for themselves in the digital age, it is important to use strategies that help them stand out. Even though there are a lot of different ways to sell, print

Read Full PostRead - Eye Icon
6 Common Frauds Facing Merchants When Transacting Internationally
News
20/11/20236 Common Frauds Facing Merchants When Transacting Internationally

Image Source: Pexels As ecommerce expands its reach globally, so too do the risks of encountering different forms of fraud. Because of this, understanding their nature and developing preventive measures are integral pillars for ensuring both your business&#821

Read Full PostRead - Eye Icon
3 Ways to Grow Your Law Firm
Legal
13/10/20203 Ways to Grow Your Law Firm

Like all businesses, law firms need to grow if they want to increase profitability. Whether it’s via expansion to new locations or through the acquisition of more clients, law firms must find viable ways to increase revenue if they want to achieve their grow

Read Full PostRead - Eye Icon
App Annie Acquires Marketing Data Company AppScotch, Expands Technology Capabilities
M&A
14/03/2016App Annie Acquires Marketing Data Company AppScotch, Expands Technology Capabilities

Today App Annie, the most trusted app data and insights platform, announced that it has acquired app marketing data company AppScotch to expand its technology capabilities.

Read Full PostRead - Eye Icon
Make Platform Payments Your Superpower
Innovation
06/12/2022Make Platform Payments Your Superpower

Vertical market software is particularly niche, and it should be tailored to each business – as well as across every industry.

Read Full PostRead - Eye Icon
Valuation Knows no Boundaries
Innovation
31/07/2016Valuation Knows no Boundaries

PEM Corporate Finance is an M&A and business valuations firm based in Cambridge, England. We’re part of Kreston International – the 10th largest global network of independent accounting firms. We advise SMEs on M&A, buyouts, business valuations, succession



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have 14 unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow