CIO CHATTER

Mobile technologies and the cloud raise security concerns for CIOs

In a recent SearchCIO.com news story that suggests some CIOs are putting a very strong emphasis on securing employees' mobile technologies and cloud access, Dave Trigo,

    Requires Free Membership to View

vice president and corporate CIO at The Hanover Insurance Group Inc., told SearchCIO.com Executive Editor Christina Torode that 99.9% of enterprise employees will use common sense and take corporate data security measures into consideration, but it's the 0.1% that can ruin a business.

More on mobile technologies and security concerns

Data security concerns follow Petraeus scandal

Should CIOs hire a chief mobility officer?

Trigo went on to explain that one single breach could ruin an organization by compromising confidential data or spoiling its reputation, but are companies taking it too far when they add security clauses into vender contracts and introduce draconian security policies for employees? We asked our readers to weigh in, posing the query, "Do you think security concerns over mobile devices are exaggerated?"

SearchCIO.com readers recognize the need for patrolling mobile technologies, especially given the popularity of the bring-your-own-device (BYOD) trend, but they also feel obligated to respect employee privacy:

I just feel sorry for the 12.5 % who think that security concerns are exaggerated. They will be the ones who will suffer the next major security breach in their operations.

  • "99.9% of employees will use common sense and take corporate data security measures into consideration before they share data." I defy you to find a large organization where more than 60% of the employees even have rudimentary common sense. This subject alone keeps IA [an information architect] up at night."
  • "I just feel sorry for the 12.5 % who [answered the poll who] think that security concerns are exaggerated. They will be the ones who will suffer the next major security breach in their operations."
  • "Compared to alternate communications methods (analog phone conversations, snail mail, unencrypted email, etc.) [mobile devices are] not that bad."
  • "With employees increasingly bringing their own device and accessing corporate data through it, addressing security of the corporate data remains a priority. Corporates need to run the thin line between total control and respecting privacy of personal information on the device."
  • "Security is most important with mobile devices, as these are being used in all social, commercial usages."

Most commenters seemed to agree that security concerns over mobile technologies are not exaggerated, but less than 25% of those polled felt that there is not enough concern. Nearly 15% of poll takers were unfazed by the security concerns associated with increased BYOD and social media use.

Who handles security concerns in your IT organization? Do you think these security precautions are exaggerated? Do you strongly agree -- or disagree -- with any of the respondents above? Share your two cents in the comment section below.

Let us know what you think about the story; email editor@techtarget.com.

This was first published in December 2012

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Expert Discussion

What measures is your organization undertaking to prevent security breaches?

Staff, SearchCIO.com
What's your opinion?
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.