IT security and privacy: Concerns, initiatives, and predictions (TechRepublic Premium)

This archived TechRepublic Premium report, originally published in February 2015, is available for free to registered TechRepublic members. For all the latest research reports, 100+ ready-made policies, IT job descriptions, and more, check out TechRepublic Premium.

From the report:

A significant number of challenges lie ahead for companies that want to protect their data and assets from security and privacy violations. However, confidence levels and planned projects show that respondents and their organizations feel up to the task and are generally comfortable with the tools and practices at their disposal. Outsourcing of security functions, where used, can greatly assist in these efforts by giving IT staff more opportunities to protect the organization rather than performing rote or low-level tasks.

In contrast to results reported in our 2013 survey, both small and large companies alike are now improving their IT security controls. Large scale companies were decreasing budgets then, but few organizations of any size are doing so now – even with outsourcing and better security programs in place.

Information assurance and risk management were key company initiatives in the 2013 survey. Information assurance remains a priority but has been supplanted by internal and external threat monitoring/detection, which are seen as more urgent tasks in today’s security landscape.

Security operations in 2015 will continue to focus on risk management and gaining control over environments so that threats can be identified and blocked in real-time (or better yet, potential violations can be closed off before any sign of trouble occurs).

Lack of employee awareness and BYOD management still remain some of the most consistently highest-ranked security challenges, and it is clear this is an urgent priority to which all companies should attend. Training and employee awareness will be a key factor for organizations that wish to stay ahead of the curve. As is often the case in business, a blend of human and technological efforts will be the recipe for success in securing companies.

Subscribe to the TechRepublic Premium Exclusives Newsletter

Save time with the latest TechRepublic Premium downloads, including customizable IT & HR policy templates, glossaries, hiring kits, features, event coverage, and more. Exclusively for you! Delivered Tuesdays and Thursdays.

Subscribe to the TechRepublic Premium Exclusives Newsletter

Save time with the latest TechRepublic Premium downloads, including customizable IT & HR policy templates, glossaries, hiring kits, features, event coverage, and more. Exclusively for you! Delivered Tuesdays and Thursdays.

Resource Details

or

* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.

Provided by:
TechRepublic Premium
Published:
July 24, 2017
Topic:
TechRepublic Premium
Format:
PDF
or

* Sign up for a TechRepublic Premium subscription for $299.99/year, and download this content as well as any other content in our library. Cancel anytime. Details here.