Top Security Priorities for CIOs in 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Top Security Priorities for CIOs in 2014-10 Next

Adopting Biometrics and New Authentication Options

Biometrics made a splash in 2013 with the iPhone's use of the fingerprint in place of passwords. Multi-factor authentication made waves as companies like Dropbox and Twitter discussed this option after serious breaches. Jim Reno, distinguished engineer with CA Technologies, said we will continue to see biometrics being leveraged for uses beyond unlocking a smartphone screen and customizing video game settings.

The reason to turn away from passwords and to biometrics and other forms of authentication is simple – trust. According to an article in the Business Reporter, companies that use biometrics, in particular, gain more trust from their customers. It's also a way for companies to protect themselves, as the article pointed out:

Companies that have adopted biometric solutions have seen an improvement in customer satisfaction. Slovakian financial institution Tatra Bank introduced biometric signature identification for customers in February 2011 as well as a voice biometric identification in the middle part of this year. Michal Liday, retail head of Tatra Bank, speaking at a voice biometrics conference in London, says: "Before we introduced biometrics, we were subject to fraud attacks from misused identities from theft or misused identity cards. This was a regular story." 

The security experts have made their predictions for 2014. Now it is time for CIOs to make some tough decisions and establish security priorities for the coming year. Certainly many of those predictions will come into play. The predictions aren’t made in a vacuum; CIOs would be foolish not to consider the situations in which experts expect serious threats and risks.

Bring Your Own Device (BYOD) will continue to be a primary concern for CIOs in 2014. However, CIOs will have to pay attention to a few twists to the BYOD movement, like BYOI, or Bring Your Own Identity. Unfortunately, as Jake O’Donnell pointed out in a SearchConsumerization piece, the budget doesn’t necessarily meet the needs for mobile security, and that’s a problem that CIOs will have to work around.

CIOs will also turn more attention to the cloud, not just to determine how to make data in the cloud more secure but to  see how the cloud plays a role in covering network security, as Philip Lieberman, CEO & Founder, Lieberman Software, stated, adding:

CIOs will have to reevaluate proposed security as a service being delivered via the cloud considering that hardware and software will no longer need to be purchased for deployment.

These issues are just the tip of the security iceberg. Overall, the primary challenge for CIOs will be to make sure everyone within the company is on board when it comes to security policy. It appears that 2014 will see a real shift in security concerns and in the way security will work. Education for everyone from the CEO down to every employee who has access to the corporate network will be a must.

Here are the top priorities that CIOs will be (or should be) focusing on in 2014.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.