Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

This lack has even been addressed by the U.S. Department of Homeland Security, and how its continuation will soon create serious issues for the government and the public sector at large. Let’s take a look at what we need to fix to help preserve the nation’s cybersecurity, and the nature of this shortage.

Shortage, According to the DHS

The mission of the Department of Homeland Security is to protect American citizens and American businesses within the borders of the United States. To accomplish this, there needs to be a collaborative effort between human security experts and systems that leverage artificial intelligence. The Assistant Director for the Cyber Security and Infrastructure Security Agency (or CISA) Jeanette Manfra, doesn’t split hairs when it comes to the shortage of cybersecurity talent.

“It’s a national security risk that we don’t have the talent,” according to Manfra. “We have a massive shortage that is expected to grow larger.” 

Missing Skills

With cybersecurity demand increasing, this shortage is a huge issue. The Center for Cyber Safety and Education has stated that the current 1.5 million available cybersecurity jobs will swell to 1.8 million by 2021… and where there’s insufficient security talent, there are more breaches in both the public and private sector.

Why is There a Shortage?

Looking at the industry, one could hypothesize that the shortage of public-sector cybersecurity employees is mostly due to the fact that the private sector is more lucrative. While there is no denying that this is how economics tend to play out, it isn’t actually the reason that there is a shortage.

Frankly, it mostly has to do with the job.

Much like other municipal positions, public-sector cybersecurity is a largely thankless industry, which isn’t exactly a selling point for it. Imagine doing critical work, but having your contributions overlooked and ignored… that is, until there was a problem. Then it’s your fault that it happened.

Education Also Needs Improvement

It also doesn’t help that there have been a lot of for-profit colleges closing their doors, meaning that the leading providers of IT training are going away as demand for cybersecurity ramps up.

Fortunately, many ethical hackers out there have picked up the slack. This group identifies vulnerabilities and serves as consultants for businesses. They are also responsible for designing the free coursework that many organizations are now pushing in the attempt to grow cybersecurity awareness. Many online tools have been published by cybersecurity firms to try and pique the interest of potential hires in the future, like Cyber Aces, Hacker101, Google Gruyere, and others.

Jeanette Manfra has also said that CISA is campaigning for grade and secondary schools to add development into their curriculum and to establish training procedures modeled to encourage more people to sign on and remain in the industry.

Improvements here could even help the cybersecurity industry as a whole. Manfra posits that if the government were to subsidize the educational costs new cybersecurity professionals incur in exchange for a few years of work in the public sector, the industry as a whole would have a better level of standardization. As a result, costs would stabilize, benefiting businesses further.

It is important to recognize that cybercrime isn’t going to go away, which means that your business needs to be protected. To learn more about cybersecurity and how it pertains to your business, keep coming back to our blog, or reach out to the professionals at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Hosted Solutions Users Collaboration IT Services Mobile Device Ransomware Quick Tips Cybersecurity Workplace Strategy Microsoft Small Business Data Backup Passwords Communication Smartphone Backup Saving Money Smartphones Android VoIP Business Management communications Mobile Devices Upgrade Disaster Recovery Managed Service Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Productivity Automation Artificial Intelligence Current Events Facebook Cloud Computing Covid-19 Miscellaneous Gadgets Remote Work Server Managed Service Provider Information Holiday Outsourced IT Spam Employee/Employer Relationship Encryption AI Windows 10 Training Office Business Continuity Compliance Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Chrome Managed Services Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App BYOD Computing Applications Information Technology Access Control Hacker Office 365 Tip of the week Avoiding Downtime Conferencing Marketing How To BDR WiFi Operating System HIPAA Router Virtual Private Network Risk Management Health Computers Help Desk Office Tips Analytics IT Support Augmented Reality Website Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Social Vendor Management Solutions Cybercrime Display Printer Customer Service Paperless Office Windows 11 Infrastructure Monitoring 2FA Excel Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Going Green Patch Management The Internet of Things Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Content Filtering IT Management VPN Employees YouTube Meetings Physical Security Integration Cryptocurrency User Tip Customer Relationship Management Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage LiFi Hacking Data Storage Presentation Smart Technology Supply Chain Outlook Video Conferencing Wireless Technology Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Maintenance Antivirus Sports Word Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Images 101 Safety Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Application Permissions Workforce Wasting Time Threats Typing IBM Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Meta Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT Google Docs Unified Communications Database Surveillance Bitcoin Network Management Competition Running Cable Tech Support IT Technicians Virtual Machine Environment Media Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Windows 8 Laptop Websites Mirgation Hypervisor Displays Drones Shopping Nanotechnology Optimization User PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Halloween Chatbots Navigation Lenovo Gig Economy IP Address Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Recovery Fun Co-managed IT Twitter Alerts SQL Server Technology Care Deep Learning Download Net Neutrality Hard Drives Financial Data Domains Error History Business Communications Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Upload Procurement Refrigeration Mobile Computing Social Network Telework Public Speaking Cyber security Multi-Factor Security Tech Human Resources CES Lithium-ion battery Tablet IoT Communitications Search Dark Web Cables Alert Entrepreneur Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Undo Notifications Staff Value Business Intelligence Business Growth Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware Wearable Technology Memory Vendors Alt Codes Content Remote Working Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive

Blog Archive