Tech Jobs Would Be Great, If It Wasn’t For The Users

A new information technology workforce study has confirmed what many IT and data pros have already concluded: Their jobs would be so much better if they didn’t have to deal with other people.

Making matters worse, many technology professionals believe they are sorely undervalued in the workplace, and that is in part due to the time they must spend helping users solve problems or to understand the value of data and information.

“As the global economy grows ever more dependent on the fast-evolving IT sector, the perspectives of IT professionals on their challenges and opportunities take on greater weight,” according to a new survey commissioned by Kensington, a worldwide computer accessory company.

The survey of technology professionals in the US, UK and Australia was conducted through Spiceworks' "Voice of IT" network. It addresses a broad spectrum of factors crucial to implementing and assessing IT in the business environment: strategy, security, budgets, productivity barriers to improvement, helpdesk commitments, administrative pressures, and time allocation and employee wellness.

“It is the perceived value of IT -- or lack thereof -- that appears to be the subject of the survey's most noteworthy findings. The fact that many IT professionals ‘juggle wearing multiple hats and, dealing with ‘human issues’ in particular,” may detract from the value they are able to deliver to their organizations, according to the survey report.

When asked about the personality they most identify with, 32 percent of survey respondents felt they were most like a firefighter – but, as the report states, "in spending so much time dealing with employee errors and administrative tasks, there’s a chance [IT professionals'] talents are undervalued and underutilized."

Survey respondents also specified their complaints about organizations’ overall commitment to IT -- which ranged from no or low budget allocation and lack of management understanding, to limited training for end-users. Forty-four percent complained that they were hampered by lack of time/resources; 40 percent blamed insufficient budget; 36 percent complained that IT was perceived as a cost, not as an opportunity; and 28 percent grumbled that employees disregard the ‘rules’.

Other key study findings:

Probably no surprise, security was afforded the top budget priority of the IT professionals surveyed, followed by employee connectivity/uptime and employee set up/workspace configuration.

“Human error, lack of process or ‘employees not following’ established processes, and external threats were seen as the biggest IT security risks to organizations,” the study noted. (Employee training is considered a vital component of corporate security -- yet the survey found that just 5 percent of IT professionals' time was allocated to training.)

The survey respondents also cited hardware/ infrastructure refresh and OS updates as important for 2016. “However, big data and cloud technology were acknowledged as higher priorities by companies in Australia compared to businesses in the US and the UK,” the study revealed.

IT professionals reported that they want to spend more time on IT strategy, “but insufficient budget, lack of time/resources, and a prevailing attitude within their organizations that technology is a cost, not an opportunity, are reported barriers.”

Improved or upgraded systems and multi-screening/monitors/displays are the most common technology measures implemented specifically to improve performance across all three countries. The U.S. and UK have similar rates of cloud adoption, with roughly one third of organizations having already shifted to some extent, the report explains.

“Organizations in Australia have so far placed more emphasis on BYOD than their counterparts in the US and UK, but US employees are driving change, rather than organizational top-down initiatives,” the study reported.
Information-Management: http://bit.ly/1VEFbbT

« Exposing Cybercrime As A Business Model
Can FinTech Supersede Financial Services Workers? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Netmarks Indonesia (NMID)

Netmarks Indonesia (NMID)

Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

ClearBlade

ClearBlade

ClearBlade is the Edge Computing software company enabling enterprises to rapidly engineer and run secure, real-time, scalable IoT applications.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

British Security Industry Association - CySPAG

British Security Industry Association - CySPAG

CySPAG is a special interest group within the British Security Industry Association (BSIA) focused on reducing the risk of product related cybercrime.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

SOOS

SOOS

SOOS is the easy-to-integrate software security solution for your whole team. Build, catch, and fix vulnerabilities with SOOS Software Composition Analysis.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

ZainTech

ZainTech

Zaintech is a regional digital & ICT solutions provider offering comprehensive digital solutions and services to enterprise and government customers in the MENA region.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.