The security experts have made their predictions for 2014. Now it is time for CIOs to make some tough decisions and establish security priorities for the coming year. Certainly many of those predictions will come into play. The predictions aren’t made in a vacuum; CIOs would be foolish not to consider the situations in which experts expect serious threats and risks.
Bring Your Own Device (BYOD) will continue to be a primary concern for CIOs in 2014. However, CIOs will have to pay attention to a few twists to the BYOD movement, like BYOI, or Bring Your Own Identity. Unfortunately, as Jake O’Donnell pointed out in a SearchConsumerization piece, the budget doesn’t necessarily meet the needs for mobile security, and that’s a problem that CIOs will have to work around.
CIOs will also turn more attention to the cloud, not just to determine how to make data in the cloud more secure but to see how the cloud plays a role in covering network security, as Philip Lieberman, CEO & Founder, Lieberman Software, stated, adding:
CIOs will have to reevaluate proposed security as a service being delivered via the cloud considering that hardware and software will no longer need to be purchased for deployment.
These issues are just the tip of the security iceberg. Overall, the primary challenge for CIOs will be to make sure everyone within the company is on board when it comes to security policy. It appears that 2014 will see a real shift in security concerns and in the way security will work. Education for everyone from the CEO down to every employee who has access to the corporate network will be a must.
Here are the top priorities that CIOs will be (or should be) focusing on in 2014.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>