How the CIO role has been ‘completely transformed’ in recent years through IT shift
One in three CIOs say their job role has been ‘completely transformed’ in recent years while another third say their job has become more important in their company’s hierarchy, according to a new piece of research from Bitdefender.
The study, titled ‘Virtualisation makes CIOs’ roles key’, surveyed more than 150 UK-based IT decision makers in companies with more than 1,000 PCs, and found some worrying security findings. Only 55% of incoming cyberattacks could be stopped with current resources, while almost a third (30%) of companies admitted they were breached. More worryingly, the vast majority (87%) of those polled said they did not know how the company was breached.
Naturally, a similar number (88%) said IT security budget was a ‘top priority’ for their organisation, with only 3% of respondents saying their budget was insufficient, although this comes in gradients; 60% said their budget was sufficient, with 31% adding it was sufficient but the team was understaffed.
With the threat landscape continuing to increase – the Identity Theft Resource Center said 2016 was a record year when it came to US company and government agency data breaches – the report argues it is time to act.
Bitdefender came up with 10 best practice tips in total when it came to data security, with highlights including:
- Be mindful of geographical jurisdiction: “Any data centre, regardless of the data it stores, falls under the data privacy and protection laws of the country it’s built in,” the report notes, which is particularly prescient given the upcoming EU General Data Protection Regulation (GDPR) laws
- Perform due diligence on the cloud service provider: Make sure you do a thorough assessment to assess both the provider’s capacity to serve as well as the capacity to recover from technical and natural causes. “This guarantees business continuity for your organisation, and helps draft and enforce emergency procedures that need to be set in place as soon as such accidents occur,” the report notes
- Limit the number of employees who can access sensitive data: “Besides two-factor authentication, even two-person authentication could be set in place for critical systems, similar to financial institutions where large transactions must be authorised by two or more individuals,” says the report
You can find out more here (PDF).
- » Cisco Jasper moves IoT and EMM closer with mobility management platform release
- » Intel pushes further into enterprise wearables with Recon Jet Pro partner and distributor deals
- » Why self-service is a key component of successful EMM
- » Google shares its tiered approach to enterprise mobile security in new paper
- » CIOs in Hong Kong stepping up fight against lax BYOD practices, new data reveals