© Copyright Acquisition International 2025 - All Rights Reserved.

Article Image - Surge in IT Security Measures Anticipated in 2015
Posted 24th February 2015

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Mouse Scroll AnimationScroll to keep reading

Let us help promote your business to a wider following.

Surge in IT Security Measures Anticipated in 2015
Image

Surge in IT Security Measures Anticipated in 2015

Survey shows employee training is a top priority for CIOs in protecting company information

Chief information officers (CIOs) are taking a multipronged approach to protecting sensitive company information, a new survey from Robert Half Technology shows. The majority of CIOs interviewed are currently taking or planning to take steps in the next 12 months to improve information technology (IT) security at their firms. The most common strategies include beefing up employee training on security issues (54 percent), vetting firms that have access to company data more closely (45 percent) and hiring more IT security professionals (41 percent).

The survey was developed and conducted by Robert Half Technology, a leading provider of IT professionals on a project and full-time basis, and includes responses from more than 2,400 CIOs from U.S. companies with 100 or more employees in 24 metropolitan areas.

CIOs were asked, “Which, if any, of the following measures is your company currently taking or planning to take within the next 12 months to enhance IT security?” Their responses:*

  • Currently taking or planning to take ANY of the following measures- 85%
  • Enhance employee training on security issues- 54%
  • Enhance vetting of firms with access to company data- 45%
  • Add IT security personnel- 41%
  • Implement multifactor authentication processes- 41%
  • Contract with third-party vendors or add tools to enhance security- 41%
  • Currently taking other measures- 1%
  • Not currently taking or planning to take any of the measures identified- 15%

* Multiple responses were allowed.

“We live in an era where information security threats are a real business risk,” said John Reed, senior executive director of Robert Half Technology. “CIOs are attacking the problem from all sides, but there is a strong emphasis on employee-driven measures. Vigilant IT teams and security-savvy individuals throughout the organisation are a valuable and fundamental defense; without both, other courses of action will be less effective.”

A strong organisational communications plan and sound relationships with vendors will help improve security measures, but it all begins with the team responsible for managing those efforts.

Robert Half Technology offers the top three attributes of effective security employees and what to ask them when hiring:

  •  Future Focused – It’s important to ensure candidates will be an asset to your security efforts, bringing a broad range of experiences that will allow them to identify vulnerabilities in your network. Use this opportunity to discuss their use of proven methodologies, best practices and risk intelligence in previous roles and try to assess how they would apply them in your company. Ask candidates: “How would you create a security-conscious culture in our business?”
  • Security Certifications – A well-rounded security professional will not only take steps to protect the organisation, but also to stay ahead in the industry. With so many widely recognised certifications available — like CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) and CompTIA certifications — it’s not uncommon for candidates to have these on their resumes. While certifications show an investment and commitment to growing their knowledge base, it’s important to assess applicants’ real-world experience, too. Ask candidates: “How have your security certifications prepared you for this role?”
  • Soft Skills – IT security professionals should have impeccable communication skills. Externally, they should be building solid relationships with firms and vendors that have access to company data or may be brought on to help with security efforts. Internally, they should be able to raise awareness to potential threats and explain security measures in a way that will help guide employee behaviors. The prevalence of bring your own device (BYOD) policies, for example, is just one of the many trends that make clear communication skills vital to ensuring companywide compliance. It’s essential for security team members to build partnerships across the organisation to help increase vigilance throughout. Ask candidates: “What would be your communications approach around security, potential threats and best practices to senior leadership and employees companywide?”

Added Reed, “Successful organisations always start with good people, and talented security professionals are no exception. An effective security team will be able to institute processes, establish policies and ensure best practices are in use, resulting in the utmost safety for the business.”

Categories: Strategy


You Might Also Like
Read Full PostRead - Eye Icon
4 Experts You Need on Board to Successfully Get Your Startup Off the Ground
Finance
03/03/20204 Experts You Need on Board to Successfully Get Your Startup Off the Ground

Getting your small business off the ground is a trying time. You have already invested a lot of time and energy into making your dream of being an entrepreneur a reality, and sticking to a projected timeline is critical if you want to succeed in opening your b

Read Full PostRead - Eye Icon
Zillow Group Acquisition of Trulia
M&A
Read Full PostRead - Eye Icon
Execution Excellence: Where Strategy Meets Results
News
09/05/2025Execution Excellence: Where Strategy Meets Results

Execution Excellence: Where Strategy Meets Results Image from Pixabay Ambition is often tied to bold strategies. However, in the real world, it’s the execution that determines who comes out on top. For many organizations, crafting bold and innovative str

Read Full PostRead - Eye Icon
Five Types of Security Your Business Office or Warehouse Needs Today
News
01/06/2022Five Types of Security Your Business Office or Warehouse Needs Today

Increasingly, safety in the workplace has become a priority for many business owners.  Ensuring workers are safeguarded from on-the-job hazards is simply a good practice to have in place.  It can protect your business from litigious consequences and helps yo

Read Full PostRead - Eye Icon
How To Integrate Physical and Cybersecurity Into Your Business
Corporate Social Responsibility
31/10/2024How To Integrate Physical and Cybersecurity Into Your Business

Businesses today are juggling both physical and digital threats, often simultaneously. It’s not uncommon for companies to focus heavily on cybersecurity only to leave physical security as an afterthought. Integrating both physical and cybersecurity is about

Read Full PostRead - Eye Icon
Why Data Accuracy Is Crucial in Financial Analysis
News
03/06/2024Why Data Accuracy Is Crucial in Financial Analysis

The financial analytics market is already worth more than $8 billion, and is used to inform decisions with values spiraling into the trillions. This is impressive in isolation, but perhaps not enough to prove that accuracy is the driving force behind the adopt

Read Full PostRead - Eye Icon
Top Employee Engagement Tools for Managers: How to Keep Your Team Engaged
Leadership
26/07/2023Top Employee Engagement Tools for Managers: How to Keep Your Team Engaged

Managers bear several responsibilities, one of which is to ensure that their team remains engaged and motivated. However, keeping up with the ever-changing employee engagement needs can be challenging.

Read Full PostRead - Eye Icon
78% of Comms Leaders Say Protecting Their Brand’s Reputation is Unmanageable
Legal
04/05/202178% of Comms Leaders Say Protecting Their Brand’s Reputation is Unmanageable

Survey finds threats such as activism, fake news and cancel culture have transformed the reputational risk landscape in the last five years.

Read Full PostRead - Eye Icon
Where To Find Dedicated ReactJS Developers In 2022?
News
08/07/2022Where To Find Dedicated ReactJS Developers In 2022?

ReactJS is a mainstream technology incorporated by the world’s top organizations and businesses like Netflix, Facebook, Salesforce,  Instacart, and many more. Project owners keep adding this efficient and straightforward tool to their tech stacks. Conse



Our Trusted Brands

Acquisition International is a flagship brand of AI Global Media. AI Global Media is a B2B enterprise and are committed to creating engaging content allowing businesses to market their services to a larger global audience. We have a number of unique brands, each of which serves a specific industry or region. Each brand covers the latest news in its sector and publishes a digital magazine and newsletter which is read by a global audience.

Arrow