Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

This lack has even been addressed by the U.S. Department of Homeland Security, and how its continuation will soon create serious issues for the government and the public sector at large. Let’s take a look at what we need to fix to help preserve the nation’s cybersecurity, and the nature of this shortage.

Shortage, According to the DHS

The mission of the Department of Homeland Security is to protect American citizens and American businesses within the borders of the United States. To accomplish this, there needs to be a collaborative effort between human security experts and systems that leverage artificial intelligence. The Assistant Director for the Cyber Security and Infrastructure Security Agency (or CISA) Jeanette Manfra, doesn’t split hairs when it comes to the shortage of cybersecurity talent.

“It’s a national security risk that we don’t have the talent,” according to Manfra. “We have a massive shortage that is expected to grow larger.” 

Missing Skills

With cybersecurity demand increasing, this shortage is a huge issue. The Center for Cyber Safety and Education has stated that the current 1.5 million available cybersecurity jobs will swell to 1.8 million by 2021… and where there’s insufficient security talent, there are more breaches in both the public and private sector.

Why is There a Shortage?

Looking at the industry, one could hypothesize that the shortage of public-sector cybersecurity employees is mostly due to the fact that the private sector is more lucrative. While there is no denying that this is how economics tend to play out, it isn’t actually the reason that there is a shortage.

Frankly, it mostly has to do with the job.

Much like other municipal positions, public-sector cybersecurity is a largely thankless industry, which isn’t exactly a selling point for it. Imagine doing critical work, but having your contributions overlooked and ignored… that is, until there was a problem. Then it’s your fault that it happened.

Education Also Needs Improvement

It also doesn’t help that there have been a lot of for-profit colleges closing their doors, meaning that the leading providers of IT training are going away as demand for cybersecurity ramps up.

Fortunately, many ethical hackers out there have picked up the slack. This group identifies vulnerabilities and serves as consultants for businesses. They are also responsible for designing the free coursework that many organizations are now pushing in the attempt to grow cybersecurity awareness. Many online tools have been published by cybersecurity firms to try and pique the interest of potential hires in the future, like Cyber Aces, Hacker101, Google Gruyere, and others.

Jeanette Manfra has also said that CISA is campaigning for grade and secondary schools to add development into their curriculum and to establish training procedures modeled to encourage more people to sign on and remain in the industry.

Improvements here could even help the cybersecurity industry as a whole. Manfra posits that if the government were to subsidize the educational costs new cybersecurity professionals incur in exchange for a few years of work in the public sector, the industry as a whole would have a better level of standardization. As a result, costs would stabilize, benefiting businesses further.

It is important to recognize that cybercrime isn’t going to go away, which means that your business needs to be protected. To learn more about cybersecurity and how it pertains to your business, keep coming back to our blog, or reach out to the professionals at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 05 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet IT Support Efficiency Malware Privacy Email Phishing Google Workplace Tips Computer Users Collaboration IT Services Hosted Solutions Mobile Device Quick Tips Ransomware Workplace Strategy Small Business Cybersecurity Microsoft Communication Data Backup Smartphone Passwords Saving Money Android Business Management Smartphones VoIP communications Mobile Devices Backup Managed Service Data Recovery Browser Managed IT Services Upgrade Social Media Disaster Recovery Microsoft Office Tech Term Network Remote Internet of Things Facebook Automation Artificial Intelligence Cloud Computing Covid-19 Remote Work Miscellaneous Gadgets Windows Server Current Events Managed Service Provider Holiday Outsourced IT Productivity Information Employee/Employer Relationship Spam Encryption Windows 10 AI Data Management Training Compliance Business Continuity Office Government Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Two-factor Authentication Apps Data Security Mobile Office Gmail Managed Services Employer-Employee Relationship Voice over Internet Protocol Chrome Budget Networking Apple App Mobile Device Management Vendor Applications Computing WiFi Access Control Information Technology Tip of the week Office 365 Conferencing Hacker How To Avoiding Downtime BDR Marketing BYOD Operating System Virtual Private Network Health Risk Management Help Desk Big Data Analytics Office Tips Retail Augmented Reality Healthcare Storage Computers Password Managed IT Services Bring Your Own Device Website HIPAA Router Display Cybercrime Printer Paperless Office Windows 11 The Internet of Things Infrastructure 2FA Monitoring Social Excel Document Management Remote Workers IT Support Telephone Scam Customer Service Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Going Green Vendor Management Solutions Firewall Content Filtering User Tip Modem Safety Processor Computer Repair Mobile Security YouTube Holidays Cryptocurrency Data Storage Smart Technology Supply Chain Video Conferencing Virtual Desktop Machine Learning Managed Services Provider LiFi Data storage Saving Time Virtual Machines Professional Services Outlook Managed IT Service Customer Relationship Management Maintenance Money Humor Downloads Antivirus iPhone Hacking Licensing Presentation Entertainment Vulnerabilities Sports Mouse Data Privacy Wireless Technology Images 101 Administration Telephone System Multi-Factor Authentication Robot Mobility Cost Management Word IT Management VPN Employees Meetings Settings Wireless Printing Physical Security Integration Managing Costs Amazon Hosted Solution Entrepreneur Username Point of Sale eCommerce Typing Black Friday SSID Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Knowledge Undo Network Management Google Drive Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT 5G Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Unified Communications Experience Google Docs Shopping Nanotechnology Optimization Bitcoin PowerPoint Running Cable Application SharePoint Addiction Google Wallet Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Windows 8 Writing Distributed Denial of Service Workplace Laptop IBM Service Level Agreement Internet Service Provider Drones Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Halloween Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Competition Financial Data Browsers Smartwatch Connectivity IT Hacks Social Engineering Break Fix Scams Scary Stories Fun Upload Procurement Remote Computing Azure Hybrid Work Cyber security Deep Learning Multi-Factor Security Tech Human Resources Social Network Telework User CES Tablet IoT Communitications Dark Web Cables Education Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Mobile Computing How To Microsoft Excel IT Maintenance IP Address Search Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Best Practice Legislation Shortcuts Recovery Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Buisness Wearable Technology Memory Vendors IT solutions Hard Drives Content Remote Working Legal Health IT Unified Threat Management Motherboard Data Breach Business Growth Comparison Google Play Be Proactive Domains Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Cortana Refrigeration Trend Micro Alt Codes Network Congestion Specifications Security Cameras Workplace Strategies Public Speaking Lithium-ion battery User Error Microchip Internet Exlporer Software as a Service Fraud Meta Downtime

Blog Archive