Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

This lack has even been addressed by the U.S. Department of Homeland Security, and how its continuation will soon create serious issues for the government and the public sector at large. Let’s take a look at what we need to fix to help preserve the nation’s cybersecurity, and the nature of this shortage.

Shortage, According to the DHS

The mission of the Department of Homeland Security is to protect American citizens and American businesses within the borders of the United States. To accomplish this, there needs to be a collaborative effort between human security experts and systems that leverage artificial intelligence. The Assistant Director for the Cyber Security and Infrastructure Security Agency (or CISA) Jeanette Manfra, doesn’t split hairs when it comes to the shortage of cybersecurity talent.

“It’s a national security risk that we don’t have the talent,” according to Manfra. “We have a massive shortage that is expected to grow larger.” 

Missing Skills

With cybersecurity demand increasing, this shortage is a huge issue. The Center for Cyber Safety and Education has stated that the current 1.5 million available cybersecurity jobs will swell to 1.8 million by 2021… and where there’s insufficient security talent, there are more breaches in both the public and private sector.

Why is There a Shortage?

Looking at the industry, one could hypothesize that the shortage of public-sector cybersecurity employees is mostly due to the fact that the private sector is more lucrative. While there is no denying that this is how economics tend to play out, it isn’t actually the reason that there is a shortage.

Frankly, it mostly has to do with the job.

Much like other municipal positions, public-sector cybersecurity is a largely thankless industry, which isn’t exactly a selling point for it. Imagine doing critical work, but having your contributions overlooked and ignored… that is, until there was a problem. Then it’s your fault that it happened.

Education Also Needs Improvement

It also doesn’t help that there have been a lot of for-profit colleges closing their doors, meaning that the leading providers of IT training are going away as demand for cybersecurity ramps up.

Fortunately, many ethical hackers out there have picked up the slack. This group identifies vulnerabilities and serves as consultants for businesses. They are also responsible for designing the free coursework that many organizations are now pushing in the attempt to grow cybersecurity awareness. Many online tools have been published by cybersecurity firms to try and pique the interest of potential hires in the future, like Cyber Aces, Hacker101, Google Gruyere, and others.

Jeanette Manfra has also said that CISA is campaigning for grade and secondary schools to add development into their curriculum and to establish training procedures modeled to encourage more people to sign on and remain in the industry.

Improvements here could even help the cybersecurity industry as a whole. Manfra posits that if the government were to subsidize the educational costs new cybersecurity professionals incur in exchange for a few years of work in the public sector, the industry as a whole would have a better level of standardization. As a result, costs would stabilize, benefiting businesses further.

It is important to recognize that cybercrime isn’t going to go away, which means that your business needs to be protected. To learn more about cybersecurity and how it pertains to your business, keep coming back to our blog, or reach out to the professionals at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services 2FA Operating System Computers Router Virtual Private Network Risk Management Healthcare Website Health Help Desk Office Tips Analytics Firewall Document Management Windows 7 Microsoft 365 Telephone Solutions The Internet of Things Scam Data loss Social Cooperation Going Green Patch Management Windows 11 Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Excel Physical Security Remote Workers Display Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Money Saving Time Images 101 Humor Multi-Factor Authentication Mobility Managed IT Service Safety Maintenance Antivirus Sports Downloads Mouse Licensing Employees Integration Entertainment Administration Telephone System Holidays Robot Customer Relationship Management Cost Management Data Storage Settings Printing Wireless Supply Chain Content Filtering Video Conferencing Hacking IT Management Managed Services Provider Presentation VPN YouTube Meetings Virtual Machines Professional Services Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop iPhone Data storage LiFi Word Smart Technology Vulnerabilities Data Privacy Outlook Machine Learning Public Speaking Lenovo Screen Reader IT Assessment Writing Distributed Denial of Service IT Maintenance Virtual Reality Computing Infrastructure Value Business Intelligence Lithium-ion battery Service Level Agreement Flexibility Hacks Server Management Organization Entrepreneur Scary Stories Private Cloud Identity Shortcuts Superfish Bookmark Digital Security Cameras Identity Theft Smart Tech Smart Devices Fun Ransmoware Remote Working Twitter Alerts Memory Vendors Deep Learning Download Undo Error Data Breach Google Play Be Proactive Workforce Browsers Videos Education Connectivity Electronic Health Records Social Engineering Break Fix Remote Computing Wasting Time Threats Upload Mobile Computing Social Network Trend Micro Multi-Factor Security Security Cameras Workplace Strategies Meta Tablet IoT Software as a Service Search Dark Web Alert Managing Costs Amazon Application Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations eCommerce Dark Data Google Calendar SSID Virtual Assistant Outsource IT IBM Legal Data Analysis IT solutions Star Wars Surveillance How To Microsoft Excel Notifications Staff Virtual Machine Environment Media Business Growth Gamification Reviews Travel Social Networking Legislation Medical IT Transportation Small Businesses Techology Fileless Malware Google Maps Development Cortana Alt Codes Content Wearable Technology Hypervisor Displays Competition Health IT Shopping Downtime Unified Threat Management Motherboard Optimization Comparison PowerPoint Permissions Employer/Employee Relationships Outsourcing Unified Threat Management Directions Hosted Solution Assessment Typing PCI DSS Navigation Gig Economy Network Congestion Specifications Workplace Knowledge Fraud Teamwork Hiring/Firing Google Drive User Error Microchip User Internet Exlporer Internet Service Provider Username Regulations Compliance Evernote Paperless Point of Sale Memes 5G Black Friday Co-managed IT Experience SQL Server Technology Care IP Address Google Docs Unified Communications Database Net Neutrality Bitcoin Network Management Financial Data Running Cable Tech Support IT Technicians History Business Communications Google Wallet Proxy Server Smartwatch Cookies IT Monitors Cyber Monday Scams Hotspot Azure Hybrid Work Recovery Tactics Procurement Hard Drives Windows 8 Telework Laptop Websites Mirgation Cyber security Tech Human Resources Domains Drones CES Nanotechnology Communitications Cables Electronic Medical Records Language SharePoint Addiction Supply Chain Management Refrigeration Management FinTech Halloween Chatbots Term Google Apps

Blog Archive