© Copyright Acquisition International 2026 - All Rights Reserved.

Article Image - Surge in IT Security Measures Anticipated in 2015
Posted 24th February 2015

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Surge in IT Security Measures Anticipated in 2015
Image

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Chief information officers (CIOs) are taking a multipronged approach to protecting sensitive company information, a new survey from Robert Half Technology shows. The majority of CIOs interviewed are currently taking or planning to take steps in the next 12 months to improve information technology (IT) security at their firms. The most common strategies include beefing up employee training on security issues (54 percent), vetting firms that have access to company data more closely (45 percent) and hiring more IT security professionals (41 percent).

The survey was developed and conducted by Robert Half Technology, a leading provider of IT professionals on a project and full-time basis, and includes responses from more than 2,400 CIOs from U.S. companies with 100 or more employees in 24 metropolitan areas.

CIOs were asked, “Which, if any, of the following measures is your company currently taking or planning to take within the next 12 months to enhance IT security?” Their responses:*

  • Currently taking or planning to take ANY of the following measures- 85%
  • Enhance employee training on security issues- 54%
  • Enhance vetting of firms with access to company data- 45%
  • Add IT security personnel- 41%
  • Implement multifactor authentication processes- 41%
  • Contract with third-party vendors or add tools to enhance security- 41%
  • Currently taking other measures- 1%
  • Not currently taking or planning to take any of the measures identified- 15%

* Multiple responses were allowed.

“We live in an era where information security threats are a real business risk,” said John Reed, senior executive director of Robert Half Technology. “CIOs are attacking the problem from all sides, but there is a strong emphasis on employee-driven measures. Vigilant IT teams and security-savvy individuals throughout the organisation are a valuable and fundamental defense; without both, other courses of action will be less effective.”

A strong organisational communications plan and sound relationships with vendors will help improve security measures, but it all begins with the team responsible for managing those efforts.

Robert Half Technology offers the top three attributes of effective security employees and what to ask them when hiring:

  •  Future Focused – It’s important to ensure candidates will be an asset to your security efforts, bringing a broad range of experiences that will allow them to identify vulnerabilities in your network. Use this opportunity to discuss their use of proven methodologies, best practices and risk intelligence in previous roles and try to assess how they would apply them in your company. Ask candidates: “How would you create a security-conscious culture in our business?”
  • Security Certifications – A well-rounded security professional will not only take steps to protect the organisation, but also to stay ahead in the industry. With so many widely recognised certifications available — like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) and CompTIA certifications — it’s not uncommon for candidates to have these on their resumes. While certifications show an investment and commitment to growing their knowledge base, it’s important to assess applicants’ real-world experience, too. Ask candidates: “How have your security certifications prepared you for this role?”
  • Soft Skills – IT security professionals should have impeccable communication skills. Externally, they should be building solid relationships with firms and vendors that have access to company data or may be brought on to help with security efforts. Internally, they should be able to raise awareness to potential threats and explain security measures in a way that will help guide employee behaviors. The prevalence of bring your own device (BYOD) policies, for example, is just one of the many trends that make clear communication skills vital to ensuring companywide compliance. It’s essential for security team members to build partnerships across the organisation to help increase vigilance throughout. Ask candidates: “What would be your communications approach around security, potential threats and best practices to senior leadership and employees companywide?”

Added Reed, “Successful organisations always start with good people, and talented security professionals are no exception. An effective security team will be able to institute processes, establish policies and ensure best practices are in use, resulting in the utmost safety for the business.”

Categories: Strategy


You Might Also Like
Read Full PostRead - Eye Icon
2016 Most Innovative Law Firm in Austria
Legal
04/04/20162016 Most Innovative Law Firm in Austria

BREITENEDER Rechtsanwälte. Attorneys at Law is one of the leading Austrian and internationally recognized law firms specialized in investor protection, securities litigation and capital market law (investors only).

Read Full PostRead - Eye Icon
Current Approach to Due Diligence  Requires Rethink
M&A
30/04/2015Current Approach to Due Diligence Requires Rethink

Completing a corporate transaction without rigorous financial due diligence is unthinkable. Yet, despite numerous well publicised incidents of cybercrime, investors remain blasé about the potential impact of cyber risks on long term value.

Read Full PostRead - Eye Icon
Four Key Elements can Deliver a Successful Data Mesh Strategy, says STX Next
News
11/06/2024Four Key Elements can Deliver a Successful Data Mesh Strategy, says STX Next

Domain ownership, information as an asset, data catalogues and context-aware governance should all inform how architecture is modelled and used

Read Full PostRead - Eye Icon
Money-Making Magic: Discovering Exciting and Profitable Investment Ventures
Finance
19/07/2023Money-Making Magic: Discovering Exciting and Profitable Investment Ventures

Investing has always been a gateway to financial growth and security. Even so, it doesn't have to be all about numbers and charts. Investment ventures not only generate significant returns – they bring excitement and thrill to the table.

Read Full PostRead - Eye Icon
Most Trusted for High-Value Transactions in the Caribbean
Strategy
29/06/2016Most Trusted for High-Value Transactions in the Caribbean

Emmanuel Jacques Almosnino is well renowned law firm, comprised of highly skilled international attorneys involved with tax, financing, real property and wealth management.

Read Full PostRead - Eye Icon
Revolutionizing Agriculture with Advanced Data Science
Innovation
30/01/2024Revolutionizing Agriculture with Advanced Data Science

Founded in 2014, Austin Data Labs stands at the forefront of revolutionizing the global food supply chain through advanced AI-based data science. The company’s acclaimed scAIcloud® platform and extensive industry know-how position it as a key player in enha

Read Full PostRead - Eye Icon
Estin & Co Advise Naxicap Acquisition of FIK Group from Perceva
Legal
24/06/2015Estin & Co Advise Naxicap Acquisition of FIK Group from Perceva

Estin & Co Advise Capital Export During Backing of Celec BIMBO

Read Full PostRead - Eye Icon
This is a test
News
29/11/2021This is a test

this is a test of the link system to see how it copes with the link replacement being a full system with no-follow links in it.

Read Full PostRead - Eye Icon
ADE Announces Strategic Partnership with Dowling Energy
M&A
30/08/2024ADE Announces Strategic Partnership with Dowling Energy

Leading investor in onsite sustainable energy solutions AMPYR Distributed Energy (ADE) has established a strategic partnership with Dowling Energy, an innovative company that helps property owners realise the full potential of onsite renewables.



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow