© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Surge in IT Security Measures Anticipated in 2015
Posted 24th February 2015

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Surge in IT Security Measures Anticipated in 2015
Image

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Chief information officers (CIOs) are taking a multipronged approach to protecting sensitive company information, a new survey from Robert Half Technology shows. The majority of CIOs interviewed are currently taking or planning to take steps in the next 12 months to improve information technology (IT) security at their firms. The most common strategies include beefing up employee training on security issues (54 percent), vetting firms that have access to company data more closely (45 percent) and hiring more IT security professionals (41 percent).

The survey was developed and conducted by Robert Half Technology, a leading provider of IT professionals on a project and full-time basis, and includes responses from more than 2,400 CIOs from U.S. companies with 100 or more employees in 24 metropolitan areas.

CIOs were asked, “Which, if any, of the following measures is your company currently taking or planning to take within the next 12 months to enhance IT security?” Their responses:*

  • Currently taking or planning to take ANY of the following measures- 85%
  • Enhance employee training on security issues- 54%
  • Enhance vetting of firms with access to company data- 45%
  • Add IT security personnel- 41%
  • Implement multifactor authentication processes- 41%
  • Contract with third-party vendors or add tools to enhance security- 41%
  • Currently taking other measures- 1%
  • Not currently taking or planning to take any of the measures identified- 15%

* Multiple responses were allowed.

“We live in an era where information security threats are a real business risk,” said John Reed, senior executive director of Robert Half Technology. “CIOs are attacking the problem from all sides, but there is a strong emphasis on employee-driven measures. Vigilant IT teams and security-savvy individuals throughout the organisation are a valuable and fundamental defense; without both, other courses of action will be less effective.”

A strong organisational communications plan and sound relationships with vendors will help improve security measures, but it all begins with the team responsible for managing those efforts.

Robert Half Technology offers the top three attributes of effective security employees and what to ask them when hiring:

  •  Future Focused – It’s important to ensure candidates will be an asset to your security efforts, bringing a broad range of experiences that will allow them to identify vulnerabilities in your network. Use this opportunity to discuss their use of proven methodologies, best practices and risk intelligence in previous roles and try to assess how they would apply them in your company. Ask candidates: “How would you create a security-conscious culture in our business?”
  • Security Certifications – A well-rounded security professional will not only take steps to protect the organisation, but also to stay ahead in the industry. With so many widely recognised certifications available — like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) and CompTIA certifications — it’s not uncommon for candidates to have these on their resumes. While certifications show an investment and commitment to growing their knowledge base, it’s important to assess applicants’ real-world experience, too. Ask candidates: “How have your security certifications prepared you for this role?”
  • Soft Skills – IT security professionals should have impeccable communication skills. Externally, they should be building solid relationships with firms and vendors that have access to company data or may be brought on to help with security efforts. Internally, they should be able to raise awareness to potential threats and explain security measures in a way that will help guide employee behaviors. The prevalence of bring your own device (BYOD) policies, for example, is just one of the many trends that make clear communication skills vital to ensuring companywide compliance. It’s essential for security team members to build partnerships across the organisation to help increase vigilance throughout. Ask candidates: “What would be your communications approach around security, potential threats and best practices to senior leadership and employees companywide?”

Added Reed, “Successful organisations always start with good people, and talented security professionals are no exception. An effective security team will be able to institute processes, establish policies and ensure best practices are in use, resulting in the utmost safety for the business.”

Categories: Strategy


You Might Also Like
Read Full PostRead - Eye Icon
Welltower Completes Acquisition of Premier Seniors Housing Portfolio
Finance
14/10/2016Welltower Completes Acquisition of Premier Seniors Housing Portfolio

Welltower Inc. (NYSE: HCN) today announced it has completed the previously announced acquisition of the Vintage Senior Living portfolio for a purchase price of $1.15 billion.

Read Full PostRead - Eye Icon
Changing of the Guard
Leadership
02/12/2019Changing of the Guard

Changing of the Guard The London Internet Exchange (LINX) was established in 1994, using a donated piece of equipment no larger than a set-top box, no legal contracts and five founding members wanting to keep traffic local and avoid transatlantic fees. Now spr

Read Full PostRead - Eye Icon
Ones to Watch in 2016
Finance
29/02/2016Ones to Watch in 2016

Wallick & Volk is the oldest privately held mortgage company in the United States. We are a family owned and operated mortgage lender.

Read Full PostRead - Eye Icon
3 Signs Your TOM isn’t Working for You
News
17/06/20253 Signs Your TOM isn’t Working for You

Leading UK technology consultancy identifies the key warning signs that your Target Operating Model isn’t working for you.

Read Full PostRead - Eye Icon
How to Create a Positive Work Environment for Your Employees
News
16/01/2023How to Create a Positive Work Environment for Your Employees

A positive work environment is essential for the success of any business. Not only does it create a more pleasant atmosphere for employees, but it also helps to increase productivity and morale.

Read Full PostRead - Eye Icon
How To Prepare Your Business For Sale
M&A
20/03/2024How To Prepare Your Business For Sale

As entrepreneurs, we invest not only money but years of hard work, dedication, and passion into building our businesses.

Read Full PostRead - Eye Icon
How Do Worker’s Compensation Laws Differ Around the USA?
News
27/02/2023How Do Worker’s Compensation Laws Differ Around the USA?

IMG Source – https://unsplash.com/photos/p3Ip8U0eNNM Workers’ compensation is essentially an insurance that provides workers with lump sum compensation, a wage replacement, and medical benefits if they incur injuries, or become ill as a result of perfo

Read Full PostRead - Eye Icon
The 8 Best Coworking Spaces for Tech Startups
Innovation
24/02/2021The 8 Best Coworking Spaces for Tech Startups

Startup companies in the information technology sector need space to collaborate and innovate. In-person and remote meetings require a specialized office, but new businesses may not be able to invest in a permanent location. These are the best eight coworking

Read Full PostRead - Eye Icon
Laws and Regulations Around Waste Management Every Business Owner Needs to Know
Legal
23/11/2023Laws and Regulations Around Waste Management Every Business Owner Needs to Know

It’s important for businesses to stay on top of changing laws and legislation within their sector, and it can be hard to keep up when working weeks become hectic. Waste management might be an area of your business which becomes an afterthought alone, before



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow