Your company executives could still be the weakest cybersecurity link

Representational image depecting cybersecurity protection
(Image credit: Shutterstock)

The C-Suite is often still the weakest cybersecurity link in an organization, as it focuses too hard on the bottom line, often ignoring warnings coming in from IT, and not paying that much attention to the digital employee experience (DEX).

A new report from IT software company Ivanti surveying 10,000 office workers, IT professionals, and the C-Suite on their level of prioritization and adoption of DEX in organizations found executives very much exacerbates the problem of IT security.

Today’s enterprise has a hybrid workforce. Some work full-time remotely, some check in from time to time, while some prefer office life in its full glory. This approach has expanded the asset inventory under IT management by quite a lot, leaving security experts struggling. 

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022end of this survey

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Prioritizing user experience

Roughly a third (32%) still use spreadsheets to track these assets, while half (47%) have full visibility into every endpoint attempting to connect to the network. At the same time, 49% of C-level executives requested, at least on one occasion, to bypass one or more security measures in the last 12 months. 

The C-Suite seems to have its priorities backwards, Ivanti suggests. Its number one priority was employee productivity, while workplace culture and employee satisfaction fell further down the list. Also, almost two-thirds (62%) of C-Suite execs admitted that leadership prioritizes profitability over employee experience. 

This is also prompting IT to behave the same, the report further found, stating that only 21% of IT leaders consider the end user experience as their main priority when choosing new tools.

Yet, almost half (49%) of employees are frustrated by the tech and tools at their disposal in the workplace, with two-thirds (64%) believing the way they interact with technology directly impacts overall employee morale. 

To that end, a quarter (26%) of employees are considering finding a new job, where the tech would be more suitable.

  • No company is safe without one of the best firewall options to monitor incoming and outgoing traffic 

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
Cyber-security
Security leaders don't want to be held personally liable for attacks
Cyber-security
Dealing with the issue of CISO stress
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Hacker Typing
Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
Dr Chase Cunningham speaking at ZTW25
The grand delusion: endpoint protection isn’t the magic pill, says Dr Zero Trust
Red padlock open on electric circuits network dark red background
AI-powered cyber threats are becoming the biggest worry for businesses everywhere
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Google Pixel Watch 3
Google Pixel Watches hit with delayed notifications, crashing, and performance issues following Wear OS 5.1 update
Zendesk Relate 2025
Zendesk Relate 2025 - everything you need to know as the event unfolds
Disney Plus logo with popcorn
You can finally tell Disney+ to stop bugging you about that terrible Marvel show you regret starting
Google Gemini AI
Gemini can now see your screen and judge your tabs
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Philips Hue
Philips Hue might be working on a video doorbell, and according to a new report, we just got our first look at it