Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

DHS Cybersecurity Shortage a Major Problem

DHS Cybersecurity Shortage a Major Problem

Cybersecurity is a big point of emphasis for the modern IT administrator. For the private business, it’s important for enough to be done in order to secure the business’ assets, and the integrity of the network itself. Unfortunately, when looking at public computing resources, there isn’t enough talent available to properly secure the systems that government entities rely on. 

Recently the U.S. Department of Homeland Security has announced their concern over the lack of cybersecurity talent, and how it is apt to be a problem for government and public sector if the talent shortage continues much longer. They go on to how every day that there is a shortage of cybersecurity professionals working in the public sector, is another day closer to a major event that is sure to be problematic. Today, we’ll take a look at this supposed cybersecurity talent shortage and what has to happen to keep our nation’s IT infrastructure from being under attack.

What DHS Says

Everyone knows that DHS’s entire mission is to keep Americans and American-owned businesses safe on home soil. Concordantly, there needs to be human experts working these angles with the A.I.-fueled systems that currently are the front-line defense of sensitive public computing networks. Jeanette Manfra, the Assistant Director for the Cyber Security and Infrastructure Security Agency (CISA), has been pretty forthcoming on the organization’s difficulty in finding suitable cybersecurity talent, and what the effect of not having that talent is:

“It’s a national security risk that we don’t have the talent,” Manfra said. “We have a massive shortage that is expected to grow larger.” 

The Skills Gap

With demand higher than ever for cybersecurity professionals, any shortage is a major problem. According to the Center for Cyber Safety and Education there are over 1.5 million unfilled cybersecurity jobs, which will grow to 1.8 million by 2021. The shortage in talent is one glaring reason that there have been so many data breaches in both the public and private sectors. 

Reasons for the Shortage

One would look at the industry and posit that the biggest reason for the shortage is that, with cybersecurity professionals in such demand, they will make more money working for private companies. While this is undeniably true, it actually isn’t the predominant reason for the shortage. The reason more people don’t want to work in cybersecurity is because it lacks incentive. 

Nope, it’s actually because of the job itself.

Let’s face it, it’s not a job many people want. It’s like being a policeman or garbage man. The job is thankless, but without them, chaos ensues. It's a high-stress job with no recognition unless something were to go wrong, in which case you become the face of failure. Not exactly filled with incentives. 

...But Education Could Be Better

Moreover, opportunities for formal education of these careers are actually being reduced by the recent closure of the for-profit colleges that once were at the center of IT training. Even as cybercrime becomes a multi-trillion dollar per year problem, training for these careers is going the way of the dodo. 

Luckily, there are around a million ethical hackers out there who are constantly checking systems for vulnerabilities. These individuals help out as consultants, and are often thought of as the people that benefit most from this huge push toward cybersecurity. As we speak there are organizations that are creating free coursework designed by these ethical hackers for a talent pool that has no choice but to grow. With tools like Cyber Aces, Hacker101, Google Gruyere, and more, there is an active attempt by cybersecurity firms to find talent that has an interest in doing these jobs. 

Manfra explained that CISA is really pushing their development of curriculum for developers in grade and secondary school and, borrowing a strategy from big tech by developing workforce training procedures that are modeled with recruitment and retention in mind. Since filling these jobs are a priority, you could begin to see special incentive programs for people willing to focus on cybersecurity as an expertise. 

Manfra sees government subsidy for the educational costs cybersecurity professionals pick up if they are willing to work in the public sector for a few years before they move on to the private sector, allowing CISA to “ a community of people with shared experience.” The more people who are on the same page, the more costs will stabilize, which will help business.

Cybercrime isn’t going away, so ensuring that your business’ network and infrastructure is well maintained, consistently monitored, and that your staff is trained can go a long way toward protecting your business’ digital assets. Return to our blog regularly for great information about how to maintain cybersecurity. 

Everything You Need to Know About Data Backup
How Much TLC Does Your IT Need?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Hosted Solutions Data Privacy IT Services Network Security Data Backup Email Malware Internet Hackers Software IT Support Business Efficiency Outsourced IT Innovation Microsoft Data Recovery Computer Hardware Mobile Devices Productivity Managed IT Services Small Business Google Upgrade Business Continuity IT Support Cloud Computing Backup Cybersecurity Collaboration Ransomware Phishing Smartphone Tech Term User Tips Communication Workplace Tips Managed Service Provider Disaster Recovery Managed IT Services Business Management Windows 10 VoIP Smartphones Managed Service Internet of Things Mobile Device Android Paperless Office Remote Monitoring Social Media Quick Tips Data Management communications Network Facebook Browser Encryption Managed IT Saving Money Server Artificial Intelligence Save Money Office 365 Windows 10 Windows Business Technology Virtualization BDR Miscellaneous Covid-19 Risk Management BYOD Help Desk Wi-Fi Compliance Passwords Holiday Government Vendor Management Health App Document Management Password Office Remote Work Microsoft Office Mobile Device Management Users Automation Training Windows 7 Apps Healthcare Unified Threat Management Data Security Big Data Analytics Chrome Recovery Firewall Bandwidth Applications Avoiding Downtime Bring Your Own Device Going Green Employer-Employee Relationship Robot Content Filtering Laptops Gmail Telephone Systems Information Technology SaaS Infrastructure Wireless Regulations Data loss Vulnerability Blockchain Computers Storage Information Apple Hosted Solution IT Management Redundancy Website Mobility File Sharing Processor Tip of the week Money Scam Two-factor Authentication Computing Project Management Data storage Antivirus Customer Relationship Management Employee-Employer Relationship Printing Virtual Private Network Operating System Politics Gadgets IT Service Work/Life Balance Access Control Remote Computing Unified Communications Settings Hard Drive IoT Downtime Flexibility Social OneDrive Machine Learning Company Culture RMM Customer Service Software as a Service Tablet Meetings Virtual Reality Router Proactive VPN Files Maintenance Budget Sports Display Private Cloud Bitcoin Remote Worker Remote Monitoring and Management End of Support Tech Support Management Data Breach Outlook Mouse Network Management Internet Exlporer HIPAA Assessment Remote Workers Monitors Digital Payment Cooperation How To Social Network Electronic Medical Records Websites Identity Theft Google Drive Server Management Alert Licensing Mobile Security Spam Business Growth Consultation Uninterrupted Power Supply File Management YouTube How To Samsung WiFi Mobile Computing Payment Cards Electronic Health Records Mobile Office Hacker Monitoring Chromebook Word Search Employees Administration Augmented Reality Co-Managed IT Dark Web Solid State Drive Current Events LiFi Wireless Technology Legal Recycling Education Utility Computing Consulting The Internet of Things Professional Services Managed Services Upgrades Data Storage IT solutions Smart Technology Twitter Patch Management Time Management Managed Services Provider Networking Net Neutrality 3D Printing CRM Multi-Factor Security Wearable Technology Best Practice Hard Disk Drives Virtual Machines IT Budget Microsoft Excel Modem Batteries Enterprise Content Management Hacking Finance Printer Alerts Cyber security Theft Distributed Denial of Service Annual Convention Projects Servers Gamification Remote Working Marketing Processors Cabling Wasting Time Smart Devices Wires Human Error Office Tips Buisness Comparison Identity Proactive Maintenance Cost Management Digitize E-Commerce Unsupported Software Virus Point of Sale Google Calendar Solid State Drives Connectivity Credit Cards Update Cookies Windows 8 Save Time ROI Disaster Vulnerabilities Trending Authentication Teamwork WPA3 Mail Merge Financial Managed IT Service San Diego Identities Return on Investment Enterprise Resource Planning Bookmarks Technology Laws Cybercrime Database VoIP Sensors Sponsor Permission Telephony Specifications Database Management Touchscreen Shadow IT Features Techology Social Engineering USB Sync Mobile Data Law Enforcement Legislation IT Technicians Google Wallet Options Holidays Lenovo Public Cloud Permissions Nanotechnology Notes Geography Authorization SharePoint Staff Shared resources Windows Server 2008 Fleet Tracking Address Procurement Botnet Break Fix Social Networking Hard Drives Google Docs Active Directory Mobile Statistics Favorites Peripheral Travel Humor Voice over Internet Protocol Digital Obstacle Test Dark Data Personal Information Black Friday Roanoke — Central Technology Solutions GDPR Cache Outsourcing Disaster Resistance Safety Mobile Device Managment Software Tips Unified Threat Management Hotspot Gadget Mirgation Drones 5G Star Wars IT Superfish Automobile Computer Care Fraud Screen Reader Backups PowerPoint Value of Managed Services High-Speed Internet Notifications Downloads Deep Learning Asset Tracking Motherboard Windows Server Bluetooth Conferencing PCI DSS Spyware Telephone MSP Course GPS Cyber Monday technology services provider Video Conferencing Cyberattacks Proactive IT Outsource IT Black Market User Error Language Development Shortcut Zero-Day Threat Migration Alt Codes Wireless Internet Business Telephone Writing Emoji Virtual Desktop Smart Tech Crowdsourcing Operations Manufacturing Firefox Optimization OneNote Network Congestion Supercomputer Data Warehousing Cryptocurrency Security Cameras User Management Managing Stress Instant Messaging Transportation Mobile VoIP Tech Terms Computer Repair Tracking Technology Assurance Group ’s 18 eWaste Heating/Cooling Biometric Read Only IT Consulting Laptop G Suite History Computing Infrastructure Virtual Assistant WannaCry Vendor Cables Backup and Disaster Recovery Physical Security Taxes Technology Tips Chatbots Typing Employer/Employee Relationships IT Assessment Retail Cortana Google Maps Hacks Webcam Emergency Students CrashOverride Printers IT Consultant Error Web Server Regulation Cameras Motion Sickness CCTV Administrator Hard Disk Drive Relocation