Get Started Today!  (415) 295-4898

croom new

415 IT Blog

DHS Cybersecurity Shortage a Major Problem

DHS Cybersecurity Shortage a Major Problem

Cybersecurity is a big point of emphasis for the modern IT administrator. For the private business, it’s important for enough to be done in order to secure the business’ assets, and the integrity of the network itself. Unfortunately, when looking at public computing resources, there isn’t enough talent available to properly secure the systems that government entities rely on. 

Recently the U.S. Department of Homeland Security has announced their concern over the lack of cybersecurity talent, and how it is apt to be a problem for government and public sector if the talent shortage continues much longer. They go on to how every day that there is a shortage of cybersecurity professionals working in the public sector, is another day closer to a major event that is sure to be problematic. Today, we’ll take a look at this supposed cybersecurity talent shortage and what has to happen to keep our nation’s IT infrastructure from being under attack.

What DHS Says

Everyone knows that DHS’s entire mission is to keep Americans and American-owned businesses safe on home soil. Concordantly, there needs to be human experts working these angles with the A.I.-fueled systems that currently are the front-line defense of sensitive public computing networks. Jeanette Manfra, the Assistant Director for the Cyber Security and Infrastructure Security Agency (CISA), has been pretty forthcoming on the organization’s difficulty in finding suitable cybersecurity talent, and what the effect of not having that talent is:

“It’s a national security risk that we don’t have the talent,” Manfra said. “We have a massive shortage that is expected to grow larger.” 

The Skills Gap

With demand higher than ever for cybersecurity professionals, any shortage is a major problem. According to the Center for Cyber Safety and Education there are over 1.5 million unfilled cybersecurity jobs, which will grow to 1.8 million by 2021. The shortage in talent is one glaring reason that there have been so many data breaches in both the public and private sectors. 

Reasons for the Shortage

One would look at the industry and posit that the biggest reason for the shortage is that, with cybersecurity professionals in such demand, they will make more money working for private companies. While this is undeniably true, it actually isn’t the predominant reason for the shortage. The reason more people don’t want to work in cybersecurity is because it lacks incentive. 

Nope, it’s actually because of the job itself.

Let’s face it, it’s not a job many people want. It’s like being a policeman or garbage man. The job is thankless, but without them, chaos ensues. It's a high-stress job with no recognition unless something were to go wrong, in which case you become the face of failure. Not exactly filled with incentives. 

...But Education Could Be Better

Moreover, opportunities for formal education of these careers are actually being reduced by the recent closure of the for-profit colleges that once were at the center of IT training. Even as cybercrime becomes a multi-trillion dollar per year problem, training for these careers is going the way of the dodo. 

Luckily, there are around a million ethical hackers out there who are constantly checking systems for vulnerabilities. These individuals help out as consultants, and are often thought of as the people that benefit most from this huge push toward cybersecurity. As we speak there are organizations that are creating free coursework designed by these ethical hackers for a talent pool that has no choice but to grow. With tools like Cyber Aces, Hacker101, Google Gruyere, and more, there is an active attempt by cybersecurity firms to find talent that has an interest in doing these jobs. 

Manfra explained that CISA is really pushing their development of curriculum for developers in grade and secondary school and, borrowing a strategy from big tech by developing workforce training procedures that are modeled with recruitment and retention in mind. Since filling these jobs are a priority, you could begin to see special incentive programs for people willing to focus on cybersecurity as an expertise. 

Manfra sees government subsidy for the educational costs cybersecurity professionals pick up if they are willing to work in the public sector for a few years before they move on to the private sector, allowing CISA to “...build a community of people with shared experience.” The more people who are on the same page, the more costs will stabilize, which will help business.

Cybercrime isn’t going away, so ensuring that your business’ network and infrastructure is well maintained, consistently monitored, and that your staff is trained can go a long way toward protecting your business’ digital assets. Return to our blog regularly for great information about how to maintain cybersecurity. 

Everything You Need to Know About Data Backup
How Much TLC Does Your IT Need?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, November 15 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Network Security Data Hosted Solutions IT Support Privacy Data Recovery Software Cloud Email IT Services Outsourced IT Internet Managed IT Services Malware Tech Term User Tips Innovation Business Windows 10 Efficiency Hackers Computer Small Business Cloud Computing Microsoft Collaboration Upgrade Business Management Phishing Ransomware Google Hardware Business Continuity Managed Service Paperless Office Cybersecurity VoIp Workplace Tips Mobile Devices Android Communication Server Remote Monitoring Office 365 Managed Service Provider Encryption Communications Internet of Things Passwords Artificial Intelligence Vulnerability Managed IT Smartphones Backup Applications Mobile Device BDR Managed IT services Data Management Holiday Laptops Business Technology Disaster Recovery Wi-Fi Help Desk Government Save Money Document Management Quick Tips Saving Money Healthcare Browser Compliance Blockchain Tip of the week Processor Smartphone Project Management Employer-Employee Relationship Information Scam Avoiding Downtime Redundancy Antivirus Windows 7 Bandwidth Automation Microsoft Office Windows Data Security Infrastructure RMM Miscellaneous Vendor Management Chrome IT Management Two-factor Authentication Router Customer Relationship Management VPN Analytics Machine Learning Social Media Website Access Control BYOD The Internet of Things Company Culture Gmail Cooperation Unified Threat Management Network Risk Management Word Remote Workers Password Apps Software as a Service Net Neutrality Regulations Patch Management Mobility IoT Management Hard Drive Tablet Server Management File Sharing Internet Exlporer File Management Data Loss Dark Web Gadgets Smart Technology Alert Proactive Storage Monitoring Maintenance Assessment Bring Your Own Device HIPAA Utility Computing Users Financial Network Management Remote Monitoring and Management Networking Operating System Consultation Mobile Security OneDrive Professional Services Training Search Unified Communications Facebook Employees Recycling Downtime Files Employee-Employer Relationship Virtual Private Network Fleet Tracking Zero-Day Threat Virtualization Batteries IT Consulting Cyberattacks Social Managed IT Service Trending GDPR Connectivity Samsung Transportation Active Directory Migration eWaste Managed Services Provider Mobile Device Management Black Friday Statistics Wireless Internet Big Data Cookies Cables SharePoint Customer Service Superfish Wireless Mouse Language Servers Smart Devices Vulnerabilities Mail Merge User Error Favorites Money Wasting Time Current Events Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Managing Stress Data Breach Read Only Security Cameras Break Fix Recovery Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Bluetooth Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Permissions Mirgation Computing Infrastructure Hard Disk Drives Sensors Mobile Computing Address WiFi Conferencing Microsoft Excel Database Human Error Spam Enterprise Content Management Printing Augmented Reality Notes Wearable Technology Star Wars Fraud User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft Proactive Maintenance Solid State Drive App Authentication Google Calendar Cache Electronic Medical Records Computing Alerts Websites Solid State Drives Payment Cards Geography Meetings Voice over Internet Protocol Projects OneNote Permission Travel Value of Managed Services Social Networking Technology Laws Remote Worker Virtual Reality PowerPoint Display Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Cybercrime Screen Reader Emergency Multi-Factor Security Authorization Return on Investment Remote Computing Comparison Licensing SaaS Options Telephone Modem High-Speed Internet Printer Politics How To Test Technology Tips Managed Services G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Tech Support Legislation Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Touchscreen Hacking Database Management Smart Tech WPA3 Settings Personal Information Consulting Specifications Time Management 5G Mobile VoIP Development Instant Messaging Lenovo Digital Payment Hotspot Heating/Cooling Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Twitter Education Marketing CEO Printers Students Daniel Stevens Cyber security Regulation

Latest Blog

In managing business technology, we are always talking about downtime--how expensive downtime is, how downtime hurts productivity, how there are a multitude of separate situations that can cause downtime. That kind of doom and gloom may not get you to act, but it may just pu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...