• FREE RESOURCES
        • Accounts Payable
          Finally! The trick to securing greater T&E compliance
          Benefits
          Rooting out folks who don’t belong on your health plan: A 6-point dependent audit checklist
          IT
          3 costly misconceptions about biz email compromise
          Credit and Collections
          Collecting via email: 4 must-make moves in your subject line
          Accounts Payable
          5 Tough-to-spot signs that an invoice is fake
  • PREMIUM CONTENT
        • Staff management
          120 Proven Communications Tips for Today’s CFO
        • Payroll
          Handling Nonexempt Employee Pay: Stay Compliant and Avoid DOL Audits
          Accounts Payable
          T&E Best Practices: Complete Guide to Ensure Compliance
          Payroll
          Payroll Best Practices: 4 Ways to Save Time and Money
        • Staff management
          Email Best Practices: A 6-Question Quiz
          Staff management
          Innovative Communications Strategies: An Email Case Study
          Staff management
          A 5-part Framework for Successful Workplace Communications
        • SEE MORE
          PREMIUM RESOURCES
  • CORONAVIRUS RESOURCES
  • LOG IN
  • SIGN UP FOR FREE

Resourceful Finance Pro

  • FREE RESOURCES
        • Accounts Payable
          Finally! The trick to securing greater T&E compliance
          Benefits
          Rooting out folks who don’t belong on your health plan: A 6-point dependent audit checklist
          IT
          3 costly misconceptions about biz email compromise
          Credit and Collections
          Collecting via email: 4 must-make moves in your subject line
          Accounts Payable
          5 Tough-to-spot signs that an invoice is fake
  • PREMIUM CONTENT
        • Staff management
          120 Proven Communications Tips for Today’s CFO
        • Payroll
          Handling Nonexempt Employee Pay: Stay Compliant and Avoid DOL Audits
          Accounts Payable
          T&E Best Practices: Complete Guide to Ensure Compliance
          Payroll
          Payroll Best Practices: 4 Ways to Save Time and Money
        • Staff management
          Email Best Practices: A 6-Question Quiz
          Staff management
          Innovative Communications Strategies: An Email Case Study
          Staff management
          A 5-part Framework for Successful Workplace Communications
        • SEE MORE
          PREMIUM RESOURCES
  • CORONAVIRUS RESOURCES
  • Accounts Payable
  • Credit and Collections
  • Payroll
  • Accounting
  • Benefits
  • Finance Technology
  • Sales & Use Tax
  • More
    • Employment Law
    • Strategy
    • Policy and Culture
    • Fraud
    • Budgeting and Forecasting
    • Banking
    • Staff Management
    • Cost Control
  • Budgeting and Forecasting
  • Finance Technology
1 minute read

How much of IT’s budget goes to security?

Jennifer Azara
by Jennifer Azara
May 3, 2008
  • SHARE ON

For nearly a decade, companies have been devoting a lot of attention — and dollars — to the security of their systems and data. But how much is too much? Or not enough?Recent stats from IT benchmarking firm Computer Economics reveal a trend you probably want to jump on.

The best way to measure how important data security is to an organization: See how much of its IT budget it eats up. When asked how much of a priority security spending was for IT dollars, here’s what your peers said:

  • High priority (43%)
  • Medium priority (44%)
  • Low priority (12%), and
  • No priority (1%).

So people are still talking about the importance of security -– but their dollars allotted don’t necessarily match. In the past three years, the percentage of the total IT budget that companies spend on data security has actually decreased.

That doesn’t necessarily mean they’re not walking the talk or leaving their sensitive financial info at risk. The clue: Spending on IT staffing for security hasn’t changed. And that’s probably good news for most companies.

That means that by now, most companies have the spam filters and other hardware and software protections in place. The way to keep advancing the ball on security now is on the people side: getting employees trained on the best protections, having IT stay up-to-date on the latest security threats and protection upgrades, creating security policies and procedures, etc.

It’s a focus shift that can pay off in spades in terms of risk management.

Jennifer Azara
Jennifer Azara
Jennifer has covered business and finance for more than 24 years. She has written for CFOs, credit and collections professionals and accounts payable practitioners and has spoken at industry conferences on sales and use tax compliance.

Get the

Resourceful Finance Pro Logo

Newsletter

With Resourceful Finance Pro arriving in your inbox, you will never miss critical stories on accounting, benefits, payroll & employment law strategies.

  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • Hidden
  • This field is for validation purposes and should be left unchanged.
Resourceful Finance Pro Logo
  • ABOUT
  • CONTACT
  • WRITE FOR US
  • ADVERTISE WITH US

Resourceful Finance Pro, part of the SuccessFuel Network, provides the latest Finance and employment law news for Finance professionals in the trenches of small-to-medium-sized businesses. Rather than simply regurgitating the day's headlines, Resourceful Finance Pro delivers actionable insights, helping Finance execs understand what Finance trends mean to their business.

Privacy Policy | Terms of Service
Copyright © 2022 SuccessFuel

WELCOME BACK!

Enter your username and password below to log in

Forget Your Username or Password?

Reset Password

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.

Log In

During your free trial, you can cancel at any time with a single click on your “Account” page.  It’s that easy.

preloader