Tech Jobs Would Be Great, If It Wasn’t For The Users

A new information technology workforce study has confirmed what many IT and data pros have already concluded: Their jobs would be so much better if they didn’t have to deal with other people.

Making matters worse, many technology professionals believe they are sorely undervalued in the workplace, and that is in part due to the time they must spend helping users solve problems or to understand the value of data and information.

“As the global economy grows ever more dependent on the fast-evolving IT sector, the perspectives of IT professionals on their challenges and opportunities take on greater weight,” according to a new survey commissioned by Kensington, a worldwide computer accessory company.

The survey of technology professionals in the US, UK and Australia was conducted through Spiceworks' "Voice of IT" network. It addresses a broad spectrum of factors crucial to implementing and assessing IT in the business environment: strategy, security, budgets, productivity barriers to improvement, helpdesk commitments, administrative pressures, and time allocation and employee wellness.

“It is the perceived value of IT -- or lack thereof -- that appears to be the subject of the survey's most noteworthy findings. The fact that many IT professionals ‘juggle wearing multiple hats and, dealing with ‘human issues’ in particular,” may detract from the value they are able to deliver to their organizations, according to the survey report.

When asked about the personality they most identify with, 32 percent of survey respondents felt they were most like a firefighter – but, as the report states, "in spending so much time dealing with employee errors and administrative tasks, there’s a chance [IT professionals'] talents are undervalued and underutilized."

Survey respondents also specified their complaints about organizations’ overall commitment to IT -- which ranged from no or low budget allocation and lack of management understanding, to limited training for end-users. Forty-four percent complained that they were hampered by lack of time/resources; 40 percent blamed insufficient budget; 36 percent complained that IT was perceived as a cost, not as an opportunity; and 28 percent grumbled that employees disregard the ‘rules’.

Other key study findings:

Probably no surprise, security was afforded the top budget priority of the IT professionals surveyed, followed by employee connectivity/uptime and employee set up/workspace configuration.

“Human error, lack of process or ‘employees not following’ established processes, and external threats were seen as the biggest IT security risks to organizations,” the study noted. (Employee training is considered a vital component of corporate security -- yet the survey found that just 5 percent of IT professionals' time was allocated to training.)

The survey respondents also cited hardware/ infrastructure refresh and OS updates as important for 2016. “However, big data and cloud technology were acknowledged as higher priorities by companies in Australia compared to businesses in the US and the UK,” the study revealed.

IT professionals reported that they want to spend more time on IT strategy, “but insufficient budget, lack of time/resources, and a prevailing attitude within their organizations that technology is a cost, not an opportunity, are reported barriers.”

Improved or upgraded systems and multi-screening/monitors/displays are the most common technology measures implemented specifically to improve performance across all three countries. The U.S. and UK have similar rates of cloud adoption, with roughly one third of organizations having already shifted to some extent, the report explains.

“Organizations in Australia have so far placed more emphasis on BYOD than their counterparts in the US and UK, but US employees are driving change, rather than organizational top-down initiatives,” the study reported.
Information-Management: http://bit.ly/1VEFbbT

« Exposing Cybercrime As A Business Model
Can FinTech Supersede Financial Services Workers? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Shieldfy

Shieldfy

Shieldfy is a cloud-based security shield for your website to protect it from cyber attacks and malwares.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.