SHARE
Facebook X Pinterest WhatsApp

September 2006 Security Survey: CIOs Need to Fill Holes in Security and Privacy Policies

Written By
thumbnail
Allan Alter
Allan Alter
Sep 27, 2006

Three-quarters of CIOs have confidence in their company’s IT security, but there are plenty of reasons to wonder why they do. In our survey, we asked about 14 IT security practices and about seven general practices for protecting customer and employee data. Of them, only three are in place at 80 percent or more of our respondents’ companies. Some policies, such as rules governing working with company data outside the office, the use of instant messaging, and password protection for hard drives, are done by only about half of respondents.

The reality? IT security is still riddled with holes. Antivirus software is almost ubiquitous and VPNs are now commonplace, but that’s not enough to ensure security. If companies want to get serious about preventing thieves from stealing data, they will have to start closing these gaps.

For more data and analysis, see CIO Insight ‘s Research Center blog at go.cioinsight.com/researchcentral.

Next page: Most companies still don’t do enough to keep employee and customer data private.

Recommended for you...

What do Amazon, Microsoft, Meta, and IBM Have in Common? Tape Storage
Drew Robb
Aug 15, 2022
What Does Quantum Computing Mean for IT?
Devin Partida
Aug 11, 2022
Solving the Video Surveillance Retention Challenge 
Drew Robb
Jul 28, 2022
Top 6 IT Challenges in Healthcare
Lauren Hansen
Jun 21, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.