Your Organization/Association Should Deploy Security on No-Less than Two Levels
First among your organization/association[BM2] [BM3] , regular cybersecurity checks in each workforce should create an agreed-upon, scaled culture of cybersecurity. Daily/routine
checks should be assigned. Keep information technology (IT) support through a fully
managed service provider.
In low to mid-range
shops, reputable operations can monitor all operation domains among
cybersecurity.
The
non-partisan Government Accountability Office (GAO), released March 2021, urges groups take action to implement
comprehensive cybersecurity strategy. Its several identified major challenges:
·
implement comprehensive cybersecurity strategy;
·
maintain effective oversight;
·
secure federal systems and information;
·
protect critical cyber-infrastructure;
·
protect privacy and sensitive data.
This is
viewed universally as high risk.
High-Tech
Cybersecurity Skills & Training
In 2021 at least 38 states are tackling cyberthreats
directed at governments and private sector. The U.S. Department of Labor projects
strong tech demand to grow 13
percent, from 2016 to 2026. This adds roughly
600 thousand new jobs.
Cybersecurity skills on corporate boards’ agendas and investments,
despite slowing cybersecurity
budget growth. Among state agencies, supporting programs are incenting cybersecurity
training and education. These are establishing or increasing appropriations for
cyber skills. In 2019 the U.S. included $15 billion for cybersecurity,
increasing $583 million over 2018.
Continuous opportunities prosper for new workforce entrants. The
National Cyber Strategy needs techie bodies to strengthen critical
cybersecurity federal networks and infrastructure.
Among shortages of cybersecurity talent and capability, techie
and non-techie confront a shortage of cybersecurity. Over the last eight
years–currently to grow by 350 percent–a full-on war for cyber talent continues.
National
Cyber Strategy
High-Tech, Public Sector
Federal or regional public-facing
staff can’t compete
with corporate salaries–while your employer thinks you should improve. They’re looking for:
§
Data security §
Network security §
Data analysis §
Threat knowledge §
Identity management |
§ Endpoint security § Regulatory landscape § Cryptography[BM4] |
On federal scale, public-facing staff often are administrating regulations. Often late-breaking security measures are complex for the average agency, say Freedom of
Information Act (FOIA) or Gramm-Leach-Bliley Act (GLBA[BM5] ):
· FOIA establishes the public’s right to obtain information
from most, but not all, federal government agencies.
· GLBA requires organizations to maintain a written
information security plan.
National Markets
High-Tech, Private Sector
The national high-tech market is
adopting cloud-based business transformation technologies, diversifying an evolving threat landscape. These high-tech sectors work within sub-industries:
·
electronics;
·
manufacturing;
·
software development;
·
digital media space.
These operate at leading-edge
technology: innovation; secrecy; intellectual property. Security itself is in
forefront of this technology. Consequentially cyber-security is imperative. To provide long-term
data protection, apply end-to-end U.S. standards-based encryption technologies.
Small and medium-sized businesses (SMBs) range around 100+
employees. SMB security is also a moving target; criminals advance daily. Top
reasons for the high rate of attacks: lack of time; budget; expertise; proper
security.
Low-Tech
Cybersecurity Skills
Your low-tech cybersecurity—a “simple
operation”—is you and colleagues defending computers, servers,
mobile devices, electronic systems and networks and
data.
Several websites say a cybersecurity career can be a
moderate learning curve, adaptable for your non-tech
background. A computer science degree is seldom required. Non-techies can
blend with cyber policy analysts and technical writers. Coding or development
skills can be in-house.
Low-Tech, Public Sector
A small tech-oriented organization should
establish an encircling cybersecurity culture, underpinning[BM6] :
·
conversing regularly, frequently, about cybersecurity;
·
strong password management;
·
teach employees to recognize phishing attempts;
·
reporting cybersecurity incidents.
While
avoiding data breaches[BM7] , 50 percent
of SMBs have this year suffered a security breach. Small businesses are attacked
more often than larger businesses, but the attacker finds fewer networks to
exploit.
Low-Tech, Private Sector:
Your small tech outfit’s productivity is a central core of your
life. IT support, if on the back burner, can or will make or break the
livelihood of the business. An IT investment, sooner or later, will be your
partner.
Being up-to-date with security measures should be a major
priority. Through solutions for computer software, hardware, and recent innovations
like VoIP phone systems and cloud storage.
But the demand of IT savvy, analysts estimate that by 2021, over 4 million cybersecurity jobs will be unfilled. This profession bears an extremely overloaded work-load.
The Take Away
·
High-Tech
- Create
an agreed-upon, scaled culture of cybersecurity;
- Non-partisan
GAO urges groups implement cybersecurity strategy;
-
Most
state and private sectors encountering high-tech cyberthreats;
-
Cybersecurity
skills on corporate board agendas and investments;
-
Federal/regional
public-facing staff can’t compete with corporate salaries;
-
National
high-tech market adopting cloud-based business, technologies.
·
Low-Tech
- Several websites: cybersecurity career often moderate learning curve;
- Small tech-oriented organization should establish encircling cybersecurity culture;
- IT support, if on the back burner, can break business;
- Being up-to-date with security measures major priority;
- Analysts: by 2021 4 million cybersecurity jobs unfilled.
No comments:
Post a Comment