facebook linkedin twitter

Computerware Blog

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

This lack has even been addressed by the U.S. Department of Homeland Security, and how its continuation will soon create serious issues for the government and the public sector at large. Let’s take a look at what we need to fix to help preserve the nation’s cybersecurity, and the nature of this shortage.

Shortage, According to the DHS

The mission of the Department of Homeland Security is to protect American citizens and American businesses within the borders of the United States. To accomplish this, there needs to be a collaborative effort between human security experts and systems that leverage artificial intelligence. The Assistant Director for the Cyber Security and Infrastructure Security Agency (or CISA) Jeanette Manfra, doesn’t split hairs when it comes to the shortage of cybersecurity talent.

“It’s a national security risk that we don’t have the talent,” according to Manfra. “We have a massive shortage that is expected to grow larger.” 

Missing Skills

With cybersecurity demand increasing, this shortage is a huge issue. The Center for Cyber Safety and Education has stated that the current 1.5 million available cybersecurity jobs will swell to 1.8 million by 2021… and where there’s insufficient security talent, there are more breaches in both the public and private sector.

Why is There a Shortage?

Looking at the industry, one could hypothesize that the shortage of public-sector cybersecurity employees is mostly due to the fact that the private sector is more lucrative. While there is no denying that this is how economics tend to play out, it isn’t actually the reason that there is a shortage.

Frankly, it mostly has to do with the job.

Much like other municipal positions, public-sector cybersecurity is a largely thankless industry, which isn’t exactly a selling point for it. Imagine doing critical work, but having your contributions overlooked and ignored… that is, until there was a problem. Then it’s your fault that it happened.

Education Also Needs Improvement

It also doesn’t help that there have been a lot of for-profit colleges closing their doors, meaning that the leading providers of IT training are going away as demand for cybersecurity ramps up.

Fortunately, many ethical hackers out there have picked up the slack. This group identifies vulnerabilities and serves as consultants for businesses. They are also responsible for designing the free coursework that many organizations are now pushing in the attempt to grow cybersecurity awareness. Many online tools have been published by cybersecurity firms to try and pique the interest of potential hires in the future, like Cyber Aces, Hacker101, Google Gruyere, and others.

Jeanette Manfra has also said that CISA is campaigning for grade and secondary schools to add development into their curriculum and to establish training procedures modeled to encourage more people to sign on and remain in the industry.

Improvements here could even help the cybersecurity industry as a whole. Manfra posits that if the government were to subsidize the educational costs new cybersecurity professionals incur in exchange for a few years of work in the public sector, the industry as a whole would have a better level of standardization. As a result, costs would stabilize, benefiting businesses further.

It is important to recognize that cybercrime isn’t going to go away, which means that your business needs to be protected. To learn more about cybersecurity and how it pertains to your business, keep coming back to our blog, or reach out to the professionals at Computerware.

I Lost Data Once… A Collection of Horror Stories; ...
Monitoring Your Staff Has Benefits
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, November 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Cloud Internet Software Business Management Data Hackers Hardware Microsoft Workplace Tips Backup Network Security Managed Service Provider Productivity Business Hosted Solutions Email Malware IT Services Saving Money Efficiency Computer Google Productivity IT Support User Tips Innovation Small Business Smartphones Mobile Devices VoIP Data Backup Quick Tips Collaboration Microsoft Office Business Continuity communications Gadgets Social Media IT Support Disaster Recovery Android Data Recovery Network Server Upgrade Mobile Office Communication Virtualization Cybersecurity Mobile Device Management Smartphone Miscellaneous Phishing Ransomware Tech Term Windows 10 Windows Outsourced IT Holiday Operating System Unified Threat Management Vendor Management Passwords Apps Facebook Automation Managed IT Services Remote Monitoring Users BYOD Remote Computing Managed IT services Mobile Computing BDR Mobile Device Analytics Internet of Things WiFi Apple History Artificial Intelligence Data Management The Internet of Things Marketing Browser Save Money Firewall Alert App Big data Help Desk Two-factor Authentication Cloud Computing IT Consultant Encryption Business Technology Spam Office 365 Windows 10 Maintenance Antivirus Printer Gmail Bandwidth Government Office Health Cybercrime Content Filtering Information Technology Going Green Training Bring Your Own Device Wireless Technology Computers Saving Time Tech Support Information Search VPN Virus Managed IT Employer-Employee Relationship Best Practice Lithium-ion Battery Cost Management Managed Service Windows 8 Outlook Hiring/Firing Hard Drives Budget Customer Service Travel Education Recovery Healthcare Update Access Control Phone System Retail It Management Networking Hacking Blockchain IBM Money Data Loss Document Management Humor File Sharing Administration Hard Drive Law Enforcement Intranet Twitter Compliance Mobility Website Data storage Avoiding Downtime iPhone Risk Management Current Events Password Applications Value Legal Save Time Downtime Patch Management Hacker Conferencing Regulations Augmented Reality PowerPoint Proactive IT SaaS Computing Running Cable Hosted Solution End of Support Social Networking Digital Social Robot Project Management Wireless Securty Websites Management Google Maps DDoS Solid State Drive Storage Vulnerabilities Social Engineering Black Market Flexibility Vendor Cryptocurrency Word Laptop Private Cloud Cortana Business Growth Windows 7 Business Intelligence Data Security Excel Digital Payment Router Telephony Machine Learning Customer Relationship Management Paperless Office Fax Server Telephone Systems Comparison Tablet Scam Company Culture Sports Disaster User Monitoring Computer Repair Data Breach Specifications Safety Text Messaging Evernote Virtual Desktop Webcam Programming Identity Theft Statistics Virtual Assistant Network Congestion Documents IT service Entertainment Teamwork Heating/Cooling Telephone Start Menu Tech Terms Managed IT Service Mobile Technology Virtual Reality Politics Streaming Media Automobile Inbound Marketing Cooperation Software as a Service Emails Bluetooth Chromebook Uninterrupted Power Supply Processor Computing Infrastructure Hack Vulnerability Memory How To eWaste Google Docs Net Neutrality Bitcoin Meetings Pain Points Experience Chrome User Error Download Data Protection Co-managed IT Cleaning Wi-Fi Distribution Monitors Downloads Office Tips Processors Computer Accessories Microchip Taxes Lifestyle Distributed Denial of Service USB YouTube Unified Communications Settings Voice over Internet Protocol Trending Redundancy Presentation Gaming Console Public Cloud Licensing Mouse IT Plan Enterprise Resource Planning GPS Term Managed Services Provider Archive Consultation Banking Botnet Legislation Error Electronic Medical Records Transportation Skype Knowledge Relocation Tablets Permissions Directions Language Display Technology Tips Microserver Sync Accountants A.I. External Harddrive Recording email scam Addiction Audit Multi-factor Authentication SSID How To Fake News Notifications CCTV Digital Signature Dark Web Free Resource Point of Contact Migration Connected Devices 3D Ebay Music Processing Managed Services Data Warehousing Get More Done Business Metrics Computer Malfunction Wireless Headphones Thin CLient switches Health IT Writing Employee/Employer Relationship Reliable Computing Wasting Time Access Turn Key In Internet of Things Equifax Fleet Tracking Smart Phones Upgrades Logistics Emergency Hard Drive Disposal Printer Server Network Management Analytic Computer Care PDF Device security MSP Recycling Microsoft Excel Trojan LiFi Bookmark Scalability Desktop Finance Adminstration Pirating Information Google Play Telephone Service Google Drive Windows Server 2008 Motion Sickness Best Available Keyboard Nanotechnology Social Network Leadership Employer/Employee Relationships Product Reviews Organize Work/Life Balance Managing Costs Spyware Read Mobile Payment Startup Asset Tracking Deep Learning Microsoft 365 Messenger Tracking Business Cards Domains Service Level Agreement Browsers Electricity Printing Username Medical IT Rental Service Unified Threat Management Public Speaking Backup and Disaster Recovery Visible Light Communication Cabling Gamification Security Cameras Device Management Threats Web Server Shortcut Screen Reader Customer Resource management IT consulting User Tip Proactive Maintenance Navigation Virtual Machine Content Management cache Television Administrator Entrepreneur Smart Tech Solutions Business Managemenet Webinar Books Workers Troubleshooting Piracy Upload Advertising Data Analysis Flash Employees WannaCry Environment HTML CIO Professional Services Supercomputer HIPAA Fiber-Optic Database Upselling Worker Electronic Payment Mobile Security Video Surveillance Staffing Google Wallet GDPR online Currency Time Management Freedom of Information Competition Telephone System Windows XP SQL Server Corporate Profile Software License Trends Society Tech Hypervisor Assessment SharePoint Multi-Factor Security Cost Saving ZTime Displays Integration Reading Samsung Business Owner Fileless Malware Hybrid Cloud Google Calendar G Suite Devices Micrsooft LinkedIn Tip of the week Employer Employee Relationship Fraud IP Address Tactics UTM Human Resources Content Debate Drones Modem Touchscreen News Best Practives Hacks Physical Security Application Harddrive Proxy Server Azure VoIP Capital Productuvuty Cyber security Personal Information Financial 3D Printing Managing Stress Managing Risk Printers CrashOverride Regulation Strategy

toner1