SHARE
Facebook X Pinterest WhatsApp

Why So Much of a CIO’s Day Is Devoted to Security

May 11, 2017

Why So Much of a CIO’s Day Is Devoted to Security

Why So Much of a CIO's Day Is Devoted to SecurityWhy So Much of a CIO’s Day Is Devoted to Security

CIOs and other IT professionals are spending more time than ever on cyber-security. Many devote a quarter of their typical work week to dealing with threats.

Massive TaskMassive Task

88% of the CIOs and other IT professionals surveyed said they are involved in the troubleshooting of security-related issues, up from 85% in 2015.

Timely IssueTimely Issue

Of those respondents, 80% said the time they’re spending on security has increased over the past 12 months, and 75% said they spend up to 10 hours a week on security issues.

Line of AttackLine of Attack

63% said email and browser-based malware has grown over the past 12 months, and 52% said the same about the overall sophistication of threats.

Big Spike: BandwidthBig Spike: Bandwidth

More than half of the survey respondents expect their organization’s bandwidth consumption to grow by 50% over the next 12 months.

Big Spike: EthernetBig Spike: Ethernet

More than half said their company will move to 100 Gigabit Ethernet by the end of 2018.

App AssessmentApp Assessment

65% of network and systems admins struggle to determine whether app issues are caused by the network, systems or apps, while 53% run into difficulties measuring latency and delay problems when troubleshooting apps.

Top Tech Deployed or Planned for 2017Top Tech Deployed or Planned for 2017

Mobile devices: 72%,
Server virtualization: 70%,
Private cloud: 64%,
Public cloud: 59%,
Software-defined networks: 45%

Unified Communications Tools DeployedUnified Communications Tools Deployed

VoIP: 56%,
Videoconferencing: 53%,
Enterprise instant messaging: 50%,
Web collaboration apps: 47%

Top Unified Communication ChallengesTop Unified Communication Challenges

Inability to view network edge and branch environments: 42%,
Lack of visibility into multivendor UC environments: 41%,
Inability to assess impact of UC deployments on other apps: 40%

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.