Mobile technologies and the cloud raise security concerns for CIOs

Mobile technologies continue to create a quandary for CIOs. SearchCIO.com readers share their thoughts in this CIO Chatter.

This Content Component encountered an error

In a recent SearchCIO.com news story that suggests some CIOs are putting a very strong emphasis on securing employees' mobile technologies and cloud access, Dave Trigo, vice president and corporate CIO at The Hanover Insurance Group Inc., told SearchCIO.com Executive Editor Christina Torode that 99.9% of enterprise employees will use common sense and take corporate data security measures into consideration, but it's the 0.1% that can...

ruin a business.

More on mobile technologies and security concerns

Data security concerns follow Petraeus scandal

Should CIOs hire a chief mobility officer?

Trigo went on to explain that one single breach could ruin an organization by compromising confidential data or spoiling its reputation, but are companies taking it too far when they add security clauses into vender contracts and introduce draconian security policies for employees? We asked our readers to weigh in, posing the query, "Do you think security concerns over mobile devices are exaggerated?"

SearchCIO.com readers recognize the need for patrolling mobile technologies, especially given the popularity of the bring-your-own-device (BYOD) trend, but they also feel obligated to respect employee privacy:

I just feel sorry for the 12.5 % who think that security concerns are exaggerated. They will be the ones who will suffer the next major security breach in their operations.

  • "99.9% of employees will use common sense and take corporate data security measures into consideration before they share data." I defy you to find a large organization where more than 60% of the employees even have rudimentary common sense. This subject alone keeps IA [an information architect] up at night."
  • "I just feel sorry for the 12.5 % who [answered the poll who] think that security concerns are exaggerated. They will be the ones who will suffer the next major security breach in their operations."
  • "Compared to alternate communications methods (analog phone conversations, snail mail, unencrypted email, etc.) [mobile devices are] not that bad."
  • "With employees increasingly bringing their own device and accessing corporate data through it, addressing security of the corporate data remains a priority. Corporates need to run the thin line between total control and respecting privacy of personal information on the device."
  • "Security is most important with mobile devices, as these are being used in all social, commercial usages."

Most commenters seemed to agree that security concerns over mobile technologies are not exaggerated, but less than 25% of those polled felt that there is not enough concern. Nearly 15% of poll takers were unfazed by the security concerns associated with increased BYOD and social media use.

Who handles security concerns in your IT organization? Do you think these security precautions are exaggerated? Do you strongly agree -- or disagree -- with any of the respondents above? Share your two cents in the comment section below.

Let us know what you think about the story; email editor@techtarget.com.

This was first published in December 2012

Dig deeper on Enterprise information security management

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Related Discussions

Staff, SearchCIO.com asks:

What measures is your organization undertaking to prevent security breaches?

0  Responses So Far

Join the Discussion

1 comment

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close