© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Surge in IT Security Measures Anticipated in 2015
Posted 24th February 2015

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Surge in IT Security Measures Anticipated in 2015
Image

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Chief information officers (CIOs) are taking a multipronged approach to protecting sensitive company information, a new survey from Robert Half Technology shows. The majority of CIOs interviewed are currently taking or planning to take steps in the next 12 months to improve information technology (IT) security at their firms. The most common strategies include beefing up employee training on security issues (54 percent), vetting firms that have access to company data more closely (45 percent) and hiring more IT security professionals (41 percent).

The survey was developed and conducted by Robert Half Technology, a leading provider of IT professionals on a project and full-time basis, and includes responses from more than 2,400 CIOs from U.S. companies with 100 or more employees in 24 metropolitan areas.

CIOs were asked, “Which, if any, of the following measures is your company currently taking or planning to take within the next 12 months to enhance IT security?” Their responses:*

  • Currently taking or planning to take ANY of the following measures- 85%
  • Enhance employee training on security issues- 54%
  • Enhance vetting of firms with access to company data- 45%
  • Add IT security personnel- 41%
  • Implement multifactor authentication processes- 41%
  • Contract with third-party vendors or add tools to enhance security- 41%
  • Currently taking other measures- 1%
  • Not currently taking or planning to take any of the measures identified- 15%

* Multiple responses were allowed.

“We live in an era where information security threats are a real business risk,” said John Reed, senior executive director of Robert Half Technology. “CIOs are attacking the problem from all sides, but there is a strong emphasis on employee-driven measures. Vigilant IT teams and security-savvy individuals throughout the organisation are a valuable and fundamental defense; without both, other courses of action will be less effective.”

A strong organisational communications plan and sound relationships with vendors will help improve security measures, but it all begins with the team responsible for managing those efforts.

Robert Half Technology offers the top three attributes of effective security employees and what to ask them when hiring:

  •  Future Focused – It’s important to ensure candidates will be an asset to your security efforts, bringing a broad range of experiences that will allow them to identify vulnerabilities in your network. Use this opportunity to discuss their use of proven methodologies, best practices and risk intelligence in previous roles and try to assess how they would apply them in your company. Ask candidates: “How would you create a security-conscious culture in our business?”
  • Security Certifications – A well-rounded security professional will not only take steps to protect the organisation, but also to stay ahead in the industry. With so many widely recognised certifications available — like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) and CompTIA certifications — it’s not uncommon for candidates to have these on their resumes. While certifications show an investment and commitment to growing their knowledge base, it’s important to assess applicants’ real-world experience, too. Ask candidates: “How have your security certifications prepared you for this role?”
  • Soft Skills – IT security professionals should have impeccable communication skills. Externally, they should be building solid relationships with firms and vendors that have access to company data or may be brought on to help with security efforts. Internally, they should be able to raise awareness to potential threats and explain security measures in a way that will help guide employee behaviors. The prevalence of bring your own device (BYOD) policies, for example, is just one of the many trends that make clear communication skills vital to ensuring companywide compliance. It’s essential for security team members to build partnerships across the organisation to help increase vigilance throughout. Ask candidates: “What would be your communications approach around security, potential threats and best practices to senior leadership and employees companywide?”

Added Reed, “Successful organisations always start with good people, and talented security professionals are no exception. An effective security team will be able to institute processes, establish policies and ensure best practices are in use, resulting in the utmost safety for the business.”

Categories: Strategy


You Might Also Like
Read Full PostRead - Eye Icon
The Most Innovative UK Accountancy Firm 2016 Acquisition
Finance
04/05/2016The Most Innovative UK Accountancy Firm 2016 Acquisition

Formed as a start-up firm of chartered accountants, Aspen Waite has grown to become a recognised firm of business advisors.

Read Full PostRead - Eye Icon
The Many Changes & Challenges Headed For The Retail Banking Industry
News
01/02/2024The Many Changes & Challenges Headed For The Retail Banking Industry

Source – https://unsplash.com/photos/blue-and-white-unks-coffee-shop-signage-0O2Pp6-mOkY Over the course of this decade, the retail banking industry is set to witness more twists and turns than a rollercoaster at Six Flags. Plenty of changes, challenges,

Read Full PostRead - Eye Icon
The Role of DevOps in Cloud Application Development
News
26/07/2024The Role of DevOps in Cloud Application Development

DevOps is a software engineering practice that is ideally suited to the demands of cloud computing. In a DevOps environment, developers work closely with IT operations and other cross-functional teams to streamline the software development lifecycle. This coll

Read Full PostRead - Eye Icon
Acquisition International is Proud to Announce the Winners of the 2023 Research & Development Awards
News
28/09/2023Acquisition International is Proud to Announce the Winners of the 2023 Research & Development Awards

United Kingdom, September 2023 – Leading B2B publication, Acquisition International, reveals the winners within this year’s edition of the Research & Development Awards.

Read Full PostRead - Eye Icon
Creating a Tailored Acquisition & Integration Strategy
M&A
26/03/2018Creating a Tailored Acquisition & Integration Strategy

MVF, a global customer generation firm based in London, has made several acquisitions over the past twelve months - including Startups.co.uk, the UK’s number one website for entrepreneurs, startups and small business and Tech.co, a US based tech news and res

Read Full PostRead - Eye Icon
HAYSTACKID Acquisition of FLEX Discovery Transaction
Innovation
29/02/2016HAYSTACKID Acquisition of FLEX Discovery Transaction

HAYSTACKID is an international end-to-end eDiscovery and forensics services and solutions provider.

Read Full PostRead - Eye Icon
Data Driven Transformation: Unblocking AI’s Boundless Potential
News
16/08/2023Data Driven Transformation: Unblocking AI’s Boundless Potential

Digital Realty has been recognised by Acquisition International magazine as Best Business Data Solutions Firm 2023 – UK, for its extraordinary capabilities in bringing companies and data together by delivering the full spectrum of data center, colocation, an

Read Full PostRead - Eye Icon
Wind Turbine Composites Material Market Worth $5.5 Billion by 2020
Finance
06/03/2015Wind Turbine Composites Material Market Worth $5.5 Billion by 2020

New report defines and segments the global composite market for wind turbine with an analysis and forecast of its global volume and value.

Read Full PostRead - Eye Icon
Next-Level Document Management: Why Virtual Data Rooms Are Vital
News
30/10/2023Next-Level Document Management: Why Virtual Data Rooms Are Vital

Despite economic concerns and supply chain challenges, 72% of global businesses want to expand. There is no turning back now that the entire world has gone globalized. Companies of all sizes are successfully extending their operations abroad. The global stage



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow