Survey: 68 Percent of IT Workers Feel Overwhelmed by Data Access Restrictions

CData Software, a provider of data connectivity solutions, recently released its research report, “Data Connectivity: The Missing Link for IT,” to offer insights into the current state of data connectivity among organizations and reveal how businesses can get the most out of their data in 2024.

The survey, conducted among 550 data and analytics professionals across Operations (Ops) and IT in organizations with over 200 employees, found that increasing data requests overwhelm IT teams, but security concerns hinder their ability to provide employees with access to timely data. The majority of Ops professionals feel that they are prohibited from accessing the data they need to make quick business decisions, which can lead to bad practices that impact the business’ ability to quickly grow revenue and improve operational efficiency.

“IT and other data professionals are challenged to keep up with increasing demand for timely data access from an exploding number of sources, while also ensuring the security and governance of that data," said Amit Sharma, CData co-founder and CEO. "Connectivity solutions that enable secure access to live and replicated data ease the burden on IT by providing employees with the data they need to make impactful decisions for their business.”

Key findings from the report include:

  • Data requests overburden IT teams: 68% of IT workers feel overwhelmed by the number of technical resources that are required to access the data they need to work, and 81% believe other employees at their organization feel the same.
  • In fact, one in four enterprise organizations use more than 100 different applications and systems to manage their operations.
  • Data management demands an excessive amount of time from IT teams: A substantial percentage of respondents (41%) indicated that they spend up to 60% of their workweek attending to data requests from colleagues or teams, yet are still unable to deliver data fast enough to match the speed of modern business.
  • Security poses significant obstacles to connectivity, keeping essential data out of the hands of those who need it most: The top three challenges preventing IT employees at organizations from most effectively providing other teams with relevant data include security controls around data (61%), limited access to operational data itself (47%), and challenges to data sharing (46%).
  • Ignorance is not an option: Many decision-makers readily admit to overlooking crucial data due to accessibility issues. Sixty eight percent of respondents acknowledged disregarding data inputs, with the primary reason being the inability to access information promptly (49%).
  • A data connectivity strategy encompassing both live data and replicated data will do more than relieve IT teams – it’s the missing link behind security and data literacy issues that are prominent in today’s technology landscape. Overburdened by data requests, IT teams are ignoring vital data they need due to a lack of easy access, preventing them from delivering holistic, live views of data to support meaningful business insights. This oversight puts organizations on the precipice of a potential rash of bad practices that can negatively impact business operations, decision-making, and outcomes.

To download Data Connectivity: The Missing Link for IT, please visit: https://www.cdata.com/lp/data-connectivity-report-2024/.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.