Mobile technologies and the cloud raise security concerns for CIOs

Mobile technologies continue to create a quandary for CIOs. SearchCIO.com readers share their thoughts in this CIO Chatter.

In a recent SearchCIO.com news story that suggests some CIOs are putting a very strong emphasis on securing employees'...

mobile technologies and cloud access, Dave Trigo, vice president and corporate CIO at The Hanover Insurance Group Inc., told SearchCIO.com Executive Editor Christina Torode that 99.9% of enterprise employees will use common sense and take corporate data security measures into consideration, but it's the 0.1% that can ruin a business.

More on mobile technologies and security concerns

Data security concerns follow Petraeus scandal

Should CIOs hire a chief mobility officer?

Trigo went on to explain that one single breach could ruin an organization by compromising confidential data or spoiling its reputation, but are companies taking it too far when they add security clauses into vender contracts and introduce draconian security policies for employees? We asked our readers to weigh in, posing the query, "Do you think security concerns over mobile devices are exaggerated?"

SearchCIO.com readers recognize the need for patrolling mobile technologies, especially given the popularity of the bring-your-own-device (BYOD) trend, but they also feel obligated to respect employee privacy:

I just feel sorry for the 12.5 % who think that security concerns are exaggerated. They will be the ones who will suffer the next major security breach in their operations.

  • "99.9% of employees will use common sense and take corporate data security measures into consideration before they share data." I defy you to find a large organization where more than 60% of the employees even have rudimentary common sense. This subject alone keeps IA [an information architect] up at night."
  • "I just feel sorry for the 12.5 % who [answered the poll who] think that security concerns are exaggerated. They will be the ones who will suffer the next major security breach in their operations."
  • "Compared to alternate communications methods (analog phone conversations, snail mail, unencrypted email, etc.) [mobile devices are] not that bad."
  • "With employees increasingly bringing their own device and accessing corporate data through it, addressing security of the corporate data remains a priority. Corporates need to run the thin line between total control and respecting privacy of personal information on the device."
  • "Security is most important with mobile devices, as these are being used in all social, commercial usages."

Most commenters seemed to agree that security concerns over mobile technologies are not exaggerated, but less than 25% of those polled felt that there is not enough concern. Nearly 15% of poll takers were unfazed by the security concerns associated with increased BYOD and social media use.

Who handles security concerns in your IT organization? Do you think these security precautions are exaggerated? Do you strongly agree -- or disagree -- with any of the respondents above? Share your two cents in the comment section below.

Let us know what you think about the story; email editor@techtarget.com.

This was last published in December 2012

Dig Deeper on Enterprise information security management

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What measures is your organization undertaking to prevent security breaches?
Cancel
My organization is really scrutinizing the use of personal phones to access organizational information. I agree to the notation that lease employee will ruin the organization if they do not adhere to security details
Cancel

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close