© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Surge in IT Security Measures Anticipated in 2015
Posted 24th February 2015

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Surge in IT Security Measures Anticipated in 2015
Image

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Chief information officers (CIOs) are taking a multipronged approach to protecting sensitive company information, a new survey from Robert Half Technology shows. The majority of CIOs interviewed are currently taking or planning to take steps in the next 12 months to improve information technology (IT) security at their firms. The most common strategies include beefing up employee training on security issues (54 percent), vetting firms that have access to company data more closely (45 percent) and hiring more IT security professionals (41 percent).

The survey was developed and conducted by Robert Half Technology, a leading provider of IT professionals on a project and full-time basis, and includes responses from more than 2,400 CIOs from U.S. companies with 100 or more employees in 24 metropolitan areas.

CIOs were asked, “Which, if any, of the following measures is your company currently taking or planning to take within the next 12 months to enhance IT security?” Their responses:*

  • Currently taking or planning to take ANY of the following measures- 85%
  • Enhance employee training on security issues- 54%
  • Enhance vetting of firms with access to company data- 45%
  • Add IT security personnel- 41%
  • Implement multifactor authentication processes- 41%
  • Contract with third-party vendors or add tools to enhance security- 41%
  • Currently taking other measures- 1%
  • Not currently taking or planning to take any of the measures identified- 15%

* Multiple responses were allowed.

“We live in an era where information security threats are a real business risk,” said John Reed, senior executive director of Robert Half Technology. “CIOs are attacking the problem from all sides, but there is a strong emphasis on employee-driven measures. Vigilant IT teams and security-savvy individuals throughout the organisation are a valuable and fundamental defense; without both, other courses of action will be less effective.”

A strong organisational communications plan and sound relationships with vendors will help improve security measures, but it all begins with the team responsible for managing those efforts.

Robert Half Technology offers the top three attributes of effective security employees and what to ask them when hiring:

  •  Future Focused – It’s important to ensure candidates will be an asset to your security efforts, bringing a broad range of experiences that will allow them to identify vulnerabilities in your network. Use this opportunity to discuss their use of proven methodologies, best practices and risk intelligence in previous roles and try to assess how they would apply them in your company. Ask candidates: “How would you create a security-conscious culture in our business?”
  • Security Certifications – A well-rounded security professional will not only take steps to protect the organisation, but also to stay ahead in the industry. With so many widely recognised certifications available — like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) and CompTIA certifications — it’s not uncommon for candidates to have these on their resumes. While certifications show an investment and commitment to growing their knowledge base, it’s important to assess applicants’ real-world experience, too. Ask candidates: “How have your security certifications prepared you for this role?”
  • Soft Skills – IT security professionals should have impeccable communication skills. Externally, they should be building solid relationships with firms and vendors that have access to company data or may be brought on to help with security efforts. Internally, they should be able to raise awareness to potential threats and explain security measures in a way that will help guide employee behaviors. The prevalence of bring your own device (BYOD) policies, for example, is just one of the many trends that make clear communication skills vital to ensuring companywide compliance. It’s essential for security team members to build partnerships across the organisation to help increase vigilance throughout. Ask candidates: “What would be your communications approach around security, potential threats and best practices to senior leadership and employees companywide?”

Added Reed, “Successful organisations always start with good people, and talented security professionals are no exception. An effective security team will be able to institute processes, establish policies and ensure best practices are in use, resulting in the utmost safety for the business.”

Categories: Strategy


You Might Also Like
Read Full PostRead - Eye Icon
Key to Success – Lithia Motors Acquires DCH Auto Group
M&A
12/03/2015Key to Success – Lithia Motors Acquires DCH Auto Group

In October 2014, Lithia Motors, Inc. announced that it had completed the purchase of DCH Auto Group Inc., one of the 10 largest dealer groups in the US.

Read Full PostRead - Eye Icon
Wirtualna Polska Holding IPO
Innovation
27/05/2015Wirtualna Polska Holding IPO

Wirtualna Polska Holding IPO

Read Full PostRead - Eye Icon
10 Simple Steps to Take Right Now to Secure Your Business From Email Scams
Innovation
13/02/202010 Simple Steps to Take Right Now to Secure Your Business From Email Scams

When dealing with email scams in business, you must ensure you are taking every step possible to prevent a co-worker or employee from falling victim to one. Companies offer hackers or scammers with more people to trick, so they are frequent targets. Luckily, t

Read Full PostRead - Eye Icon
Handling Industrial Progress and Strategic Mergers
News
06/05/2024Handling Industrial Progress and Strategic Mergers

In an era where rapid change defines the business landscape, the adoption of industrial automation is a critical shift. Industries ranging from automotive to general manufacturing are seeing reshaped production environments due to advanced machinery

Read Full PostRead - Eye Icon
How to Understand Stock Market Basics
Finance
17/02/2021How to Understand Stock Market Basics

The stock market can be a profitable and exciting way to diversify your income and investments. It can also be a bottomless pit of confusion. Even if you have decided to hire a professional to trade on your behalf you will still want to be knowledgeable about

Read Full PostRead - Eye Icon
Hailstorms, Sudden Stops, and Highway Risk: A Safety and Liability Perspective
Legal
26/01/2026Hailstorms, Sudden Stops, and Highway Risk: A Safety and Liability Perspective

Anyone who has ever driven through a sudden hailstorm knows how jarring it can be. One moment, the road is clear, and the next, ice is pounding against your windshield and roof. The noise is startling, visibility drops fast, and many drivers react without thin

Read Full PostRead - Eye Icon
The Blueprint for Selling Real Estate in Chicago IL: Acquisition International’s Expert Insights
News
27/03/2024The Blueprint for Selling Real Estate in Chicago IL: Acquisition International’s Expert Insights

Chicago drips with real estate potential. Skyrocketing home values, thriving neighborhoods, a vibrant culture – ripe opportunities abound for savvy investors. Yet seizing this wealth potential requires insider expertise in the complex workings of the mar

Read Full PostRead - Eye Icon
Cryptography in 2016
Innovation
30/06/2016Cryptography in 2016

Kingston Technology was founded in 1987 and has grown to be the world’s largest independent manufacturer of memory products.

Read Full PostRead - Eye Icon
Why the Project Management Sector Needs a Shake-Up
Innovation
29/10/2024Why the Project Management Sector Needs a Shake-Up

Failing projects result in wasted resources, time and increased risk for companies. They negatively impact staff, customers and clients, costing businesses dearly.



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow