Tech Jobs Would Be Great, If It Wasn’t For The Users

A new information technology workforce study has confirmed what many IT and data pros have already concluded: Their jobs would be so much better if they didn’t have to deal with other people.

Making matters worse, many technology professionals believe they are sorely undervalued in the workplace, and that is in part due to the time they must spend helping users solve problems or to understand the value of data and information.

“As the global economy grows ever more dependent on the fast-evolving IT sector, the perspectives of IT professionals on their challenges and opportunities take on greater weight,” according to a new survey commissioned by Kensington, a worldwide computer accessory company.

The survey of technology professionals in the US, UK and Australia was conducted through Spiceworks' "Voice of IT" network. It addresses a broad spectrum of factors crucial to implementing and assessing IT in the business environment: strategy, security, budgets, productivity barriers to improvement, helpdesk commitments, administrative pressures, and time allocation and employee wellness.

“It is the perceived value of IT -- or lack thereof -- that appears to be the subject of the survey's most noteworthy findings. The fact that many IT professionals ‘juggle wearing multiple hats and, dealing with ‘human issues’ in particular,” may detract from the value they are able to deliver to their organizations, according to the survey report.

When asked about the personality they most identify with, 32 percent of survey respondents felt they were most like a firefighter – but, as the report states, "in spending so much time dealing with employee errors and administrative tasks, there’s a chance [IT professionals'] talents are undervalued and underutilized."

Survey respondents also specified their complaints about organizations’ overall commitment to IT -- which ranged from no or low budget allocation and lack of management understanding, to limited training for end-users. Forty-four percent complained that they were hampered by lack of time/resources; 40 percent blamed insufficient budget; 36 percent complained that IT was perceived as a cost, not as an opportunity; and 28 percent grumbled that employees disregard the ‘rules’.

Other key study findings:

Probably no surprise, security was afforded the top budget priority of the IT professionals surveyed, followed by employee connectivity/uptime and employee set up/workspace configuration.

“Human error, lack of process or ‘employees not following’ established processes, and external threats were seen as the biggest IT security risks to organizations,” the study noted. (Employee training is considered a vital component of corporate security -- yet the survey found that just 5 percent of IT professionals' time was allocated to training.)

The survey respondents also cited hardware/ infrastructure refresh and OS updates as important for 2016. “However, big data and cloud technology were acknowledged as higher priorities by companies in Australia compared to businesses in the US and the UK,” the study revealed.

IT professionals reported that they want to spend more time on IT strategy, “but insufficient budget, lack of time/resources, and a prevailing attitude within their organizations that technology is a cost, not an opportunity, are reported barriers.”

Improved or upgraded systems and multi-screening/monitors/displays are the most common technology measures implemented specifically to improve performance across all three countries. The U.S. and UK have similar rates of cloud adoption, with roughly one third of organizations having already shifted to some extent, the report explains.

“Organizations in Australia have so far placed more emphasis on BYOD than their counterparts in the US and UK, but US employees are driving change, rather than organizational top-down initiatives,” the study reported.
Information-Management: http://bit.ly/1VEFbbT

« Exposing Cybercrime As A Business Model
Can FinTech Supersede Financial Services Workers? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CGI Group

CGI Group

CGI is a leading IT and business process services provider. Services include IT consulting, Systems Integration, Application Development, Infrastructure, Business Processes, Digital IP.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Niagara Networks

Niagara Networks

Niagara Networks is a Network Visibility industry leader, with emphasis in 1/10/40/100 Gigabit systems and mission-critical IT and security appliances.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.