Tech Jobs Would Be Great, If It Wasn’t For The Users

A new information technology workforce study has confirmed what many IT and data pros have already concluded: Their jobs would be so much better if they didn’t have to deal with other people.

Making matters worse, many technology professionals believe they are sorely undervalued in the workplace, and that is in part due to the time they must spend helping users solve problems or to understand the value of data and information.

“As the global economy grows ever more dependent on the fast-evolving IT sector, the perspectives of IT professionals on their challenges and opportunities take on greater weight,” according to a new survey commissioned by Kensington, a worldwide computer accessory company.

The survey of technology professionals in the US, UK and Australia was conducted through Spiceworks' "Voice of IT" network. It addresses a broad spectrum of factors crucial to implementing and assessing IT in the business environment: strategy, security, budgets, productivity barriers to improvement, helpdesk commitments, administrative pressures, and time allocation and employee wellness.

“It is the perceived value of IT -- or lack thereof -- that appears to be the subject of the survey's most noteworthy findings. The fact that many IT professionals ‘juggle wearing multiple hats and, dealing with ‘human issues’ in particular,” may detract from the value they are able to deliver to their organizations, according to the survey report.

When asked about the personality they most identify with, 32 percent of survey respondents felt they were most like a firefighter – but, as the report states, "in spending so much time dealing with employee errors and administrative tasks, there’s a chance [IT professionals'] talents are undervalued and underutilized."

Survey respondents also specified their complaints about organizations’ overall commitment to IT -- which ranged from no or low budget allocation and lack of management understanding, to limited training for end-users. Forty-four percent complained that they were hampered by lack of time/resources; 40 percent blamed insufficient budget; 36 percent complained that IT was perceived as a cost, not as an opportunity; and 28 percent grumbled that employees disregard the ‘rules’.

Other key study findings:

Probably no surprise, security was afforded the top budget priority of the IT professionals surveyed, followed by employee connectivity/uptime and employee set up/workspace configuration.

“Human error, lack of process or ‘employees not following’ established processes, and external threats were seen as the biggest IT security risks to organizations,” the study noted. (Employee training is considered a vital component of corporate security -- yet the survey found that just 5 percent of IT professionals' time was allocated to training.)

The survey respondents also cited hardware/ infrastructure refresh and OS updates as important for 2016. “However, big data and cloud technology were acknowledged as higher priorities by companies in Australia compared to businesses in the US and the UK,” the study revealed.

IT professionals reported that they want to spend more time on IT strategy, “but insufficient budget, lack of time/resources, and a prevailing attitude within their organizations that technology is a cost, not an opportunity, are reported barriers.”

Improved or upgraded systems and multi-screening/monitors/displays are the most common technology measures implemented specifically to improve performance across all three countries. The U.S. and UK have similar rates of cloud adoption, with roughly one third of organizations having already shifted to some extent, the report explains.

“Organizations in Australia have so far placed more emphasis on BYOD than their counterparts in the US and UK, but US employees are driving change, rather than organizational top-down initiatives,” the study reported.
Information-Management: http://bit.ly/1VEFbbT

« Exposing Cybercrime As A Business Model
Can FinTech Supersede Financial Services Workers? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

ControlScan

ControlScan

ControlScan is a Managed Security Services Provider (MSSP) - our primary focus is protecting your business and securing your sensitive data.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

Iceberg

Iceberg

Iceberg has been established to provide companies with cyber security experts who will protect businesses from the unseen threat of cyber crime.

Wolf Hill Group

Wolf Hill Group

Wolf Hill Group, a Slone Partners company, is a national recruitment firm focused on Cybersecurity.

Bitcrack

Bitcrack

Bitcrack Cyber Security helps your company understand and defend your threat landscape using our key experience and skills in cybersecurity, threat mitigation and risk.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Torch.AI

Torch.AI

Torch.AI’s Nexus™ platform changes the paradigm of data and digital workflows, forever solving core impediments caused by the ever-increasing volume and complexity of information.

Codezero Technologies

Codezero Technologies

Codezero is at the forefront of microservices development, employing an identity-aware overlay network that delivers zero-trust security to DevOps.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.