Tech Jobs Would Be Great, If It Wasn’t For The Users

A new information technology workforce study has confirmed what many IT and data pros have already concluded: Their jobs would be so much better if they didn’t have to deal with other people.

Making matters worse, many technology professionals believe they are sorely undervalued in the workplace, and that is in part due to the time they must spend helping users solve problems or to understand the value of data and information.

“As the global economy grows ever more dependent on the fast-evolving IT sector, the perspectives of IT professionals on their challenges and opportunities take on greater weight,” according to a new survey commissioned by Kensington, a worldwide computer accessory company.

The survey of technology professionals in the US, UK and Australia was conducted through Spiceworks' "Voice of IT" network. It addresses a broad spectrum of factors crucial to implementing and assessing IT in the business environment: strategy, security, budgets, productivity barriers to improvement, helpdesk commitments, administrative pressures, and time allocation and employee wellness.

“It is the perceived value of IT -- or lack thereof -- that appears to be the subject of the survey's most noteworthy findings. The fact that many IT professionals ‘juggle wearing multiple hats and, dealing with ‘human issues’ in particular,” may detract from the value they are able to deliver to their organizations, according to the survey report.

When asked about the personality they most identify with, 32 percent of survey respondents felt they were most like a firefighter – but, as the report states, "in spending so much time dealing with employee errors and administrative tasks, there’s a chance [IT professionals'] talents are undervalued and underutilized."

Survey respondents also specified their complaints about organizations’ overall commitment to IT -- which ranged from no or low budget allocation and lack of management understanding, to limited training for end-users. Forty-four percent complained that they were hampered by lack of time/resources; 40 percent blamed insufficient budget; 36 percent complained that IT was perceived as a cost, not as an opportunity; and 28 percent grumbled that employees disregard the ‘rules’.

Other key study findings:

Probably no surprise, security was afforded the top budget priority of the IT professionals surveyed, followed by employee connectivity/uptime and employee set up/workspace configuration.

“Human error, lack of process or ‘employees not following’ established processes, and external threats were seen as the biggest IT security risks to organizations,” the study noted. (Employee training is considered a vital component of corporate security -- yet the survey found that just 5 percent of IT professionals' time was allocated to training.)

The survey respondents also cited hardware/ infrastructure refresh and OS updates as important for 2016. “However, big data and cloud technology were acknowledged as higher priorities by companies in Australia compared to businesses in the US and the UK,” the study revealed.

IT professionals reported that they want to spend more time on IT strategy, “but insufficient budget, lack of time/resources, and a prevailing attitude within their organizations that technology is a cost, not an opportunity, are reported barriers.”

Improved or upgraded systems and multi-screening/monitors/displays are the most common technology measures implemented specifically to improve performance across all three countries. The U.S. and UK have similar rates of cloud adoption, with roughly one third of organizations having already shifted to some extent, the report explains.

“Organizations in Australia have so far placed more emphasis on BYOD than their counterparts in the US and UK, but US employees are driving change, rather than organizational top-down initiatives,” the study reported.
Information-Management: http://bit.ly/1VEFbbT

« Exposing Cybercrime As A Business Model
Can FinTech Supersede Financial Services Workers? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

Tufin

Tufin

Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

e-Crime Bureau

e-Crime Bureau

e-Crime Bureau is a specialized company offering cyber/computer forensics, cyber security consulting services, forensic audit and investigations services and training to clients across Africa.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Secure Recruitment

Secure Recruitment

Secure Recruitment is a specialist Executive Search business that focuses its efforts on attracting specific exceptional talent in Cyber Security.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

SecondSight

SecondSight

SecondSight’s Vertical AI embodies a full-spectrum approach to cyber insurance, facilitating accurate digital risk profiling.