Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

This lack has even been addressed by the U.S. Department of Homeland Security, and how its continuation will soon create serious issues for the government and the public sector at large. Let’s take a look at what we need to fix to help preserve the nation’s cybersecurity, and the nature of this shortage.

Shortage, According to the DHS

The mission of the Department of Homeland Security is to protect American citizens and American businesses within the borders of the United States. To accomplish this, there needs to be a collaborative effort between human security experts and systems that leverage artificial intelligence. The Assistant Director for the Cyber Security and Infrastructure Security Agency (or CISA) Jeanette Manfra, doesn’t split hairs when it comes to the shortage of cybersecurity talent.

“It’s a national security risk that we don’t have the talent,” according to Manfra. “We have a massive shortage that is expected to grow larger.” 

Missing Skills

With cybersecurity demand increasing, this shortage is a huge issue. The Center for Cyber Safety and Education has stated that the current 1.5 million available cybersecurity jobs will swell to 1.8 million by 2021… and where there’s insufficient security talent, there are more breaches in both the public and private sector.

Why is There a Shortage?

Looking at the industry, one could hypothesize that the shortage of public-sector cybersecurity employees is mostly due to the fact that the private sector is more lucrative. While there is no denying that this is how economics tend to play out, it isn’t actually the reason that there is a shortage.

Frankly, it mostly has to do with the job.

Much like other municipal positions, public-sector cybersecurity is a largely thankless industry, which isn’t exactly a selling point for it. Imagine doing critical work, but having your contributions overlooked and ignored… that is, until there was a problem. Then it’s your fault that it happened.

Education Also Needs Improvement

It also doesn’t help that there have been a lot of for-profit colleges closing their doors, meaning that the leading providers of IT training are going away as demand for cybersecurity ramps up.

Fortunately, many ethical hackers out there have picked up the slack. This group identifies vulnerabilities and serves as consultants for businesses. They are also responsible for designing the free coursework that many organizations are now pushing in the attempt to grow cybersecurity awareness. Many online tools have been published by cybersecurity firms to try and pique the interest of potential hires in the future, like Cyber Aces, Hacker101, Google Gruyere, and others.

Jeanette Manfra has also said that CISA is campaigning for grade and secondary schools to add development into their curriculum and to establish training procedures modeled to encourage more people to sign on and remain in the industry.

Improvements here could even help the cybersecurity industry as a whole. Manfra posits that if the government were to subsidize the educational costs new cybersecurity professionals incur in exchange for a few years of work in the public sector, the industry as a whole would have a better level of standardization. As a result, costs would stabilize, benefiting businesses further.

It is important to recognize that cybercrime isn’t going to go away, which means that your business needs to be protected. To learn more about cybersecurity and how it pertains to your business, keep coming back to our blog, or reach out to the professionals at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android Productivity Upgrade VoIP Business Management Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Information Covid-19 Holiday Miscellaneous Gadgets Remote Work Training Server Managed Service Provider Outsourced IT Spam Employee/Employer Relationship Compliance Encryption Office Windows 10 IT Support Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To WiFi BDR Operating System Router Virtual Private Network Risk Management Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency Hacking User Tip Modem Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Word Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Safety Administration Vulnerabilities Entertainment Data Privacy Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Hosted Solution Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Typing Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Competition Knowledge Fraud Meta Google Drive User Error Microchip Username Managing Costs Amazon 5G Black Friday SSID Point of Sale eCommerce Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment User Media Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Windows 8 IP Address Laptop Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Drones Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Halloween Chatbots Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Refrigeration Fun Co-managed IT Superfish Bookmark Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Technology Care Business Communications Financial Data Lithium-ion battery Error History Education Connectivity IT Social Engineering Break Fix Scams Entrepreneur Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Undo Search Dark Web Cables CES Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Travel Social Networking Application Google Maps Smart Devices Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working IBM Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Downtime Unified Threat Management Motherboard Data Breach

Blog Archive