Get Started Today!  (415) 295-4898

croom new

415 IT Blog

DHS Cybersecurity Shortage a Major Problem

DHS Cybersecurity Shortage a Major Problem

Cybersecurity is a big point of emphasis for the modern IT administrator. For the private business, it’s important for enough to be done in order to secure the business’ assets, and the integrity of the network itself. Unfortunately, when looking at public computing resources, there isn’t enough talent available to properly secure the systems that government entities rely on. 

Recently the U.S. Department of Homeland Security has announced their concern over the lack of cybersecurity talent, and how it is apt to be a problem for government and public sector if the talent shortage continues much longer. They go on to how every day that there is a shortage of cybersecurity professionals working in the public sector, is another day closer to a major event that is sure to be problematic. Today, we’ll take a look at this supposed cybersecurity talent shortage and what has to happen to keep our nation’s IT infrastructure from being under attack.

What DHS Says

Everyone knows that DHS’s entire mission is to keep Americans and American-owned businesses safe on home soil. Concordantly, there needs to be human experts working these angles with the A.I.-fueled systems that currently are the front-line defense of sensitive public computing networks. Jeanette Manfra, the Assistant Director for the Cyber Security and Infrastructure Security Agency (CISA), has been pretty forthcoming on the organization’s difficulty in finding suitable cybersecurity talent, and what the effect of not having that talent is:

“It’s a national security risk that we don’t have the talent,” Manfra said. “We have a massive shortage that is expected to grow larger.” 

The Skills Gap

With demand higher than ever for cybersecurity professionals, any shortage is a major problem. According to the Center for Cyber Safety and Education there are over 1.5 million unfilled cybersecurity jobs, which will grow to 1.8 million by 2021. The shortage in talent is one glaring reason that there have been so many data breaches in both the public and private sectors. 

Reasons for the Shortage

One would look at the industry and posit that the biggest reason for the shortage is that, with cybersecurity professionals in such demand, they will make more money working for private companies. While this is undeniably true, it actually isn’t the predominant reason for the shortage. The reason more people don’t want to work in cybersecurity is because it lacks incentive. 

Nope, it’s actually because of the job itself.

Let’s face it, it’s not a job many people want. It’s like being a policeman or garbage man. The job is thankless, but without them, chaos ensues. It's a high-stress job with no recognition unless something were to go wrong, in which case you become the face of failure. Not exactly filled with incentives. 

...But Education Could Be Better

Moreover, opportunities for formal education of these careers are actually being reduced by the recent closure of the for-profit colleges that once were at the center of IT training. Even as cybercrime becomes a multi-trillion dollar per year problem, training for these careers is going the way of the dodo. 

Luckily, there are around a million ethical hackers out there who are constantly checking systems for vulnerabilities. These individuals help out as consultants, and are often thought of as the people that benefit most from this huge push toward cybersecurity. As we speak there are organizations that are creating free coursework designed by these ethical hackers for a talent pool that has no choice but to grow. With tools like Cyber Aces, Hacker101, Google Gruyere, and more, there is an active attempt by cybersecurity firms to find talent that has an interest in doing these jobs. 

Manfra explained that CISA is really pushing their development of curriculum for developers in grade and secondary school and, borrowing a strategy from big tech by developing workforce training procedures that are modeled with recruitment and retention in mind. Since filling these jobs are a priority, you could begin to see special incentive programs for people willing to focus on cybersecurity as an expertise. 

Manfra sees government subsidy for the educational costs cybersecurity professionals pick up if they are willing to work in the public sector for a few years before they move on to the private sector, allowing CISA to “...build a community of people with shared experience.” The more people who are on the same page, the more costs will stabilize, which will help business.

Cybercrime isn’t going away, so ensuring that your business’ network and infrastructure is well maintained, consistently monitored, and that your staff is trained can go a long way toward protecting your business’ digital assets. Return to our blog regularly for great information about how to maintain cybersecurity. 

Everything You Need to Know About Data Backup
How Much TLC Does Your IT Need?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 01 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Privacy Network Security Hosted Solutions Cloud Data Recovery IT Services Software Efficiency Email Managed IT Services Internet Malware Outsourced IT Innovation Business Small Business Tech Term Hackers Cloud Computing Upgrade Business Management Microsoft Cybersecurity Collaboration User Tips Computer Windows 10 Phishing Mobile Devices Google Business Continuity Hardware Communication Managed Service Ransomware Workplace Tips VoIp Smartphones Android Managed Service Provider Backup Paperless Office Server Encryption Quick Tips Office 365 Communications Remote Monitoring Data Management Managed IT Disaster Recovery Mobile Device Internet of Things Network BDR Passwords Windows 7 Browser Holiday Wi-Fi Saving Money Healthcare Artificial Intelligence Vulnerability Business Technology Laptops Managed IT services Applications Save Money Help Desk Smartphone Government Social Media Facebook Document Management Remote Work Miscellaneous Compliance Automation Health Tip of the week Blockchain Vendor Management Information Microsoft Office Employer-Employee Relationship Avoiding Downtime Data Security Users Antivirus Virtualization Project Management Processor Bandwidth Two-factor Authentication Redundancy Scam VPN BYOD IoT Mobility Infrastructure Software as a Service RMM Access Control Virtual Private Network IT Management OneDrive Router Proactive Windows Storage Customer Relationship Management Meetings Chrome Machine Learning Analytics Website Data Loss Maintenance Company Culture Unified Threat Management File Management Managed Services Provider The Internet of Things Remote Workers Gmail Regulations Networking Apps Payment Cards Co-Managed IT Cooperation Management Search Risk Management File Sharing Server Management Hard Drive Net Neutrality Files Gadgets Professional Services Training Managed Services Tablet Assessment Internet Exlporer HIPAA Utility Computing Monitoring Dark Web Augmented Reality Bring Your Own Device Smart Technology Network Management Word Consultation Remote Monitoring and Management Patch Management Computing Financial Operating System Office Password Employees Social Network Time Management Recycling Electronic Health Records Mobile Security Consulting Alert Downtime Flexibility Covid-19 Unified Communications Employee-Employer Relationship Cookies Cables Fleet Tracking Notes Zero-Day Threat Technology Laws Windows Server 2008 Specifications Statistics Migration eWaste Cyberattacks Social Mobile Office Outlook Customer Service Proactive Maintenance Disaster Resistance Solid State Drive Digital Payment Hotspot Servers Emergency Mobile Device Management User Management Multi-Factor Security Shadow IT Operations Vulnerabilities Voice over Internet Protocol Wireless Projects Printer Holidays Managed IT Service Managing Stress Favorites Solid State Drives Recovery Nanotechnology Wires Asset Tracking PowerPoint Backup and Disaster Recovery Display Unified Threat Management Black Friday Bluetooth Chatbots Read Only Security Cameras Value of Managed Services Outsource IT MSP Shortcut Finance Cybercrime Proactive IT Cyber security Mouse Language Mirgation Point of Sale Teamwork Tech Terms Information Technology Outsourcing Money Mobile Computing Wearable Technology Star Wars Return on Investment IT Break Fix Spam Enterprise Content Management Conferencing Options Telephone App Human Error Optimization Cyber Monday Staff Identity Theft Enterprise Resource Planning Lenovo Printing Laptop Permissions Geography Authentication Database Management IT Consulting Computing Infrastructure Websites Cache E-Commerce Shared resources Samsung Theft Going Green Video Conferencing Microsoft Excel Settings Electronic Medical Records Personal Information SharePoint Business Telephone Social Networking 5G Mobile VoIP Fraud Screen Reader OneNote Virtual Assistant Mail Merge Permission Bitcoin User Error Virtual Machines Identity Manufacturing Superfish Remote Worker Vendor Google Calendar Remote Working Modem High-Speed Internet Authorization GDPR Data Breach Alerts SaaS Remote Computing Features Batteries Biometric Travel Tech Support Transportation Active Directory Downloads IT Assessment Virtual Reality G Suite Politics Wireless Internet Big Data Budget Smart Tech How To Wasting Time Address Test Current Events WiFi Credit Cards Firewall Touchscreen Hacking Mobile Private Cloud Smart Devices Development WPA3 Comparison Licensing CIO applications Procurement Gamification Techology Apple Technology Tips Heating/Cooling IT Technicians Cost Management Windows Server Digitize Data Warehousing Motherboard Chromebook Instant Messaging Employer/Employee Relationships Legislation Connectivity Database Computers Distributed Denial of Service Trending Bookmarks Hard Disk Drives ROI Sensors CEO Twitter Students Daniel Stevens Marketing Printers Education Regulation

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...