How Digital Assets Strain IT Security Efforts

How Digital Assets Strain IT Security Efforts  

How Digital Assets Strain IT Security EffortsHow Digital Assets Strain IT Security Efforts

An influx of digital assets found within cloud, mobile and big data initiatives is a major catalyst in how companies now approach cyber-security.

Greater AwarenessGreater Awareness

46% of survey respondents feel that their company’s security is completely satisfactory, and 54% said there is generally a high understanding of the topic.

Top Drivers for Shifting Security ApproachesTop Drivers for Shifting Security Approaches

Change in IT operations: 51%, Reports of security breaches: 46%, Internal security breach/incident: 40%

Formidable Barriers, Part IFormidable Barriers, Part I

47% said a company mindset that current security measures are “good enough” presents a major challenge in pursuing new security initiatives, while 43% cited the prioritization of other tech.

Formidable Barriers, Part IIFormidable Barriers, Part II

39% said a lack of security metrics presents a major challenge in pursuing new security initiatives, while 37% cited a lack of security-dedicated budgeting.

Hot FieldHot Field

There were nearly 110,000 job postings for information security analysts in 2015, up from just under 49,000 in 2013.

Talent ShortageTalent Shortage

45% of survey respondents said they deal with security skills gaps at their company, and 7% said these gaps are “major.”

Most Common Approaches in Closing IT Security Skills GapsMost Common Approaches in Closing IT Security Skills Gaps

Training for existing employees: 66%, Encouraging more certifications for IT security: 56%, Partnering with outside firms: 41%, Hiring more staff: 31%

Half FullHalf Full

71% describe the security awareness of their general workforce as “advanced,” while just 29% said it is “basic” or “low.”

Continuous EffortContinuous Effort

54% said they provide additional security training for the general workforce during new employee orientation, and 50% said they do so through ongoing training programs. Meanwhile, 48% said they do so by reviewing existing security policies.

CIO Insight Staff
CIO Insight Staff
CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need network monitoring technology and solutions to maintain regulatory compliance for their teams and organizations.

Get the Free Newsletter!

Subscribe to Daily Tech Insider for top news, trends, and analysis.

Latest Articles