Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

DHS Cybersecurity Shortage a Major Problem

DHS Cybersecurity Shortage a Major Problem

Cybersecurity is a big point of emphasis for the modern IT administrator. For the private business, it’s important for enough to be done in order to secure the business’ assets, and the integrity of the network itself. Unfortunately, when looking at public computing resources, there isn’t enough talent available to properly secure the systems that government entities rely on. 

Recently the U.S. Department of Homeland Security has announced their concern over the lack of cybersecurity talent, and how it is apt to be a problem for government and public sector if the talent shortage continues much longer. They go on to how every day that there is a shortage of cybersecurity professionals working in the public sector, is another day closer to a major event that is sure to be problematic. Today, we’ll take a look at this supposed cybersecurity talent shortage and what has to happen to keep our nation’s IT infrastructure from being under attack.

What DHS Says

Everyone knows that DHS’s entire mission is to keep Americans and American-owned businesses safe on home soil. Concordantly, there needs to be human experts working these angles with the A.I.-fueled systems that currently are the front-line defense of sensitive public computing networks. Jeanette Manfra, the Assistant Director for the Cyber Security and Infrastructure Security Agency (CISA), has been pretty forthcoming on the organization’s difficulty in finding suitable cybersecurity talent, and what the effect of not having that talent is:

“It’s a national security risk that we don’t have the talent,” Manfra said. “We have a massive shortage that is expected to grow larger.” 

The Skills Gap

With demand higher than ever for cybersecurity professionals, any shortage is a major problem. According to the Center for Cyber Safety and Education there are over 1.5 million unfilled cybersecurity jobs, which will grow to 1.8 million by 2021. The shortage in talent is one glaring reason that there have been so many data breaches in both the public and private sectors. 

Reasons for the Shortage

One would look at the industry and posit that the biggest reason for the shortage is that, with cybersecurity professionals in such demand, they will make more money working for private companies. While this is undeniably true, it actually isn’t the predominant reason for the shortage. The reason more people don’t want to work in cybersecurity is because it lacks incentive. 

Nope, it’s actually because of the job itself.

Let’s face it, it’s not a job many people want. It’s like being a policeman or garbage man. The job is thankless, but without them, chaos ensues. It's a high-stress job with no recognition unless something were to go wrong, in which case you become the face of failure. Not exactly filled with incentives. 

...But Education Could Be Better

Moreover, opportunities for formal education of these careers are actually being reduced by the recent closure of the for-profit colleges that once were at the center of IT training. Even as cybercrime becomes a multi-trillion dollar per year problem, training for these careers is going the way of the dodo. 

Luckily, there are around a million ethical hackers out there who are constantly checking systems for vulnerabilities. These individuals help out as consultants, and are often thought of as the people that benefit most from this huge push toward cybersecurity. As we speak there are organizations that are creating free coursework designed by these ethical hackers for a talent pool that has no choice but to grow. With tools like Cyber Aces, Hacker101, Google Gruyere, and more, there is an active attempt by cybersecurity firms to find talent that has an interest in doing these jobs. 

Manfra explained that CISA is really pushing their development of curriculum for developers in grade and secondary school and, borrowing a strategy from big tech by developing workforce training procedures that are modeled with recruitment and retention in mind. Since filling these jobs are a priority, you could begin to see special incentive programs for people willing to focus on cybersecurity as an expertise. 

Manfra sees government subsidy for the educational costs cybersecurity professionals pick up if they are willing to work in the public sector for a few years before they move on to the private sector, allowing CISA to “...build a community of people with shared experience.” The more people who are on the same page, the more costs will stabilize, which will help business.

Cybercrime isn’t going away, so ensuring that your business’ network and infrastructure is well maintained, consistently monitored, and that your staff is trained can go a long way toward protecting your business’ digital assets. Return to our blog regularly for great information about how to maintain cybersecurity. 

Everything You Need to Know About Data Backup
How Much TLC Does Your IT Need?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, November 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Email Network Security Data IT Services Data Backup Privacy Malware Internet Hackers Software Outsourced IT Productivity Computer Microsoft Managed IT Services Innovation Business Data Recovery Hardware IT Support IT Support Efficiency Ransomware Mobile Devices Tech Term Google User Tips Small Business Upgrade Business Continuity Backup Cloud Computing Phishing Windows 10 Communication Internet of Things Collaboration Cybersecurity Managed Service Provider Managed IT Services VoIP Remote Monitoring Workplace Tips Smartphone Android Paperless Office Business Management Disaster Recovery Smartphones Data Management Managed Service Windows 10 Windows communications Managed IT Encryption Save Money Artificial Intelligence Social Media Server Office 365 Browser Mobile Device Risk Management BYOD BDR Passwords Facebook Help Desk Saving Money Miscellaneous Apps Business Technology App Password Automation Mobile Device Management Holiday Government Document Management Quick Tips Wi-Fi Employer-Employee Relationship Robot Compliance Bring Your Own Device Going Green Training Gmail Vendor Management Microsoft Office Recovery Virtualization Big Data Network Analytics Applications Laptops Chrome Avoiding Downtime Firewall Unified Threat Management Healthcare Bandwidth Hosted Solution Website Money Infrastructure SaaS Data storage Telephone Systems Data loss Vulnerability Blockchain Content Filtering Information Wireless File Sharing Processor Windows 7 IT Management Redundancy Tip of the week Apple Scam Project Management Antivirus VPN Virtual Reality Work/Life Balance Customer Relationship Management Computing Data Security Regulations Office IT Service Information Technology Access Control Computers Machine Learning Mobility Operating System Printing Storage Gadgets Tablet RMM Remote Computing Files Settings Users Unified Communications Customer Service Politics Router Downtime Social Two-factor Authentication Management Smart Technology Digital Payment Solid State Drive Remote Monitoring and Management Upgrades Maintenance Websites Identity Theft Administration Wireless Technology Legal Networking Twitter Net Neutrality Current Events Patch Management Education Licensing LiFi Remote Workers Virtual Private Network Display File Management End of Support Health IT solutions Network Management Internet Exlporer Hard Drive HIPAA Budget Assessment IoT How To Monitors Bitcoin Server Management Cooperation Electronic Medical Records OneDrive Sports Alert Mobile Security Mouse Employees Consultation Outlook Monitoring Uninterrupted Power Supply Company Culture Professional Services Google Drive How To Samsung Recycling Utility Computing Word Search Business Growth Chromebook Dark Web Flexibility Private Cloud Spam Proactive Software as a Service Tech Support WiFi The Internet of Things YouTube Mobile Computing Hacker Employee-Employer Relationship Network Congestion Solid State Drives Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Deep Learning Computer Repair Teamwork Technology Tips Chatbots Wires Human Error Time Management Return on Investment Cybercrime Cost Management E-Commerce WannaCry Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Database Sensors Multi-Factor Security Enterprise Resource Planning Bookmarks Options Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Printer Alerts Law Enforcement Virtual Desktop Shared resources Comparison Identity Botnet Permission Processors Active Directory Travel Features Google Calendar Typing Geography Authorization GDPR Cookies Mobile Device Managment Software Tips Hacks Disaster Trending Office Tips Voice over Internet Protocol Payment Cards Best Practice Mobile Favorites Mail Merge Update 5G Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Gadget Sponsor Specifications Test Touchscreen Techology Windows Server Cache Electronic Health Records VoIP Telephone Legislation IT Technicians GPS Marketing High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Conferencing Address Wireless Internet Break Fix Social Networking Buisness Windows 8 Save Time Asset Tracking Statistics Mobile Data Managed Services SharePoint Staff Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Cyberattacks Transportation Mobile VoIP Mirgation Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Consulting Dark Data Personal Information Taxes Google Wallet Managing Stress Instant Messaging Employer/Employee Relationships Motherboard Google Maps OneNote Bluetooth Virtual Assistant Vendor Downloads Augmented Reality Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language eWaste Cyber security Migration Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Humor Managed Services Provider Shortcut Drones Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Backups Wasting Time Smart Devices Operations Printers Error Emergency CrashOverride Web Server Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Students Hard Disk Drive IT Consultant