Top Security Priorities for CIOs in 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Top Security Priorities for CIOs in 2014-3 Next

CIOs will eliminate consumer-based file sync and share solutions in the workplace.

According to John Landy, chief security officer at Intralinks, CIOs will eliminate consumer-based file sync and share solutions in the workplace in favor of enterprise-grade alternatives. Employees have become increasingly self-sufficient and in control of their own IT provisioning, thanks to the many tools easily at their fingertips. They regularly use consumer-grade applications in the workplace because these applications are familiar and easy to use. Employees think they are being more efficient by not wasting time turning to IT for help and not wasting time struggling with unfamiliar applications. But Landy pointed out that for the CIO and the IT department, this is a nightmare for security. He said:

Consumer-grade sync and share solutions introduce unnecessary vulnerabilities into secure data exchange processes, as IT no longer has control over who is sharing what information with whom and on what device. Over the year ahead, CIOs will begin to realize that while consumer-based file share and collaboration solutions may be acceptable for sharing information within the corporate firewall, they are not nearly secure enough to facilitate collaboration beyond it.

CIOs will realize that enterprise-grade solutions are available that offer security and control without hindering employee productivity, and they’ll turn to those tools in 2014 to avoid data loss, compliance fines, and other severe consequences associated with negligence in content management.

The security experts have made their predictions for 2014. Now it is time for CIOs to make some tough decisions and establish security priorities for the coming year. Certainly many of those predictions will come into play. The predictions aren’t made in a vacuum; CIOs would be foolish not to consider the situations in which experts expect serious threats and risks.

Bring Your Own Device (BYOD) will continue to be a primary concern for CIOs in 2014. However, CIOs will have to pay attention to a few twists to the BYOD movement, like BYOI, or Bring Your Own Identity. Unfortunately, as Jake O’Donnell pointed out in a SearchConsumerization piece, the budget doesn’t necessarily meet the needs for mobile security, and that’s a problem that CIOs will have to work around.

CIOs will also turn more attention to the cloud, not just to determine how to make data in the cloud more secure but to  see how the cloud plays a role in covering network security, as Philip Lieberman, CEO & Founder, Lieberman Software, stated, adding:

CIOs will have to reevaluate proposed security as a service being delivered via the cloud considering that hardware and software will no longer need to be purchased for deployment.

These issues are just the tip of the security iceberg. Overall, the primary challenge for CIOs will be to make sure everyone within the company is on board when it comes to security policy. It appears that 2014 will see a real shift in security concerns and in the way security will work. Education for everyone from the CEO down to every employee who has access to the corporate network will be a must.

Here are the top priorities that CIOs will be (or should be) focusing on in 2014.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.