ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

This lack has even been addressed by the U.S. Department of Homeland Security, and how its continuation will soon create serious issues for the government and the public sector at large. Let’s take a look at what we need to fix to help preserve the nation’s cybersecurity, and the nature of this shortage.

Shortage, According to the DHS

The mission of the Department of Homeland Security is to protect American citizens and American businesses within the borders of the United States. To accomplish this, there needs to be a collaborative effort between human security experts and systems that leverage artificial intelligence. The Assistant Director for the Cyber Security and Infrastructure Security Agency (or CISA) Jeanette Manfra, doesn’t split hairs when it comes to the shortage of cybersecurity talent.

“It’s a national security risk that we don’t have the talent,” according to Manfra. “We have a massive shortage that is expected to grow larger.” 

Missing Skills

With cybersecurity demand increasing, this shortage is a huge issue. The Center for Cyber Safety and Education has stated that the current 1.5 million available cybersecurity jobs will swell to 1.8 million by 2021… and where there’s insufficient security talent, there are more breaches in both the public and private sector.

Why is There a Shortage?

Looking at the industry, one could hypothesize that the shortage of public-sector cybersecurity employees is mostly due to the fact that the private sector is more lucrative. While there is no denying that this is how economics tend to play out, it isn’t actually the reason that there is a shortage.

Frankly, it mostly has to do with the job.

Much like other municipal positions, public-sector cybersecurity is a largely thankless industry, which isn’t exactly a selling point for it. Imagine doing critical work, but having your contributions overlooked and ignored… that is, until there was a problem. Then it’s your fault that it happened.

Education Also Needs Improvement

It also doesn’t help that there have been a lot of for-profit colleges closing their doors, meaning that the leading providers of IT training are going away as demand for cybersecurity ramps up.

Fortunately, many ethical hackers out there have picked up the slack. This group identifies vulnerabilities and serves as consultants for businesses. They are also responsible for designing the free coursework that many organizations are now pushing in the attempt to grow cybersecurity awareness. Many online tools have been published by cybersecurity firms to try and pique the interest of potential hires in the future, like Cyber Aces, Hacker101, Google Gruyere, and others.

Jeanette Manfra has also said that CISA is campaigning for grade and secondary schools to add development into their curriculum and to establish training procedures modeled to encourage more people to sign on and remain in the industry.

Improvements here could even help the cybersecurity industry as a whole. Manfra posits that if the government were to subsidize the educational costs new cybersecurity professionals incur in exchange for a few years of work in the public sector, the industry as a whole would have a better level of standardization. As a result, costs would stabilize, benefiting businesses further.

It is important to recognize that cybercrime isn’t going to go away, which means that your business needs to be protected. To learn more about cybersecurity and how it pertains to your business, keep coming back to our blog, or reach out to the professionals at ClearView IT.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Smartphones Small Business Microsoft Office Upgrade Mobile Devices Network Data Recovery Communication Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Passwords Holiday Disaster Recovery Apps Windows 10 IT Support Managed Service Browser Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Operating System Government Saving Money Gadgets Workplace Strategy Networking Windows Artificial Intelligence Managed IT services Bandwidth Mobile Device Management Blockchain Encryption Server Remote App Virtualization Information Spam WiFi Business Technology Budget Apple Gmail History Employee/Employer Relationship Information Technology Office Two-factor Authentication Office 365 Cybercrime Access Control Data Security Conferencing Big Data Health BDR Analytics Wi-Fi Training Compliance Cost Management Employer-Employee Relationship Patch Management Help Desk Hacking Remote Monitoring Document Management Vendor Remote Computing Voice over Internet Protocol Save Money Hacker IT Management Customer Service Unified Threat Management Firewall BYOD Computing Augmented Reality Word Vendor Management Hard Drive IBM Data loss Search... Website Best Practice Retail Alert Legal Project Management Data storage Hiring/Firing Applications Outlook Password Mobile Office Money Vulnerabilities Managed Services Social Healthcare Cleaning Sports Scam DDoS SaaS Robot How To Mobile Computing VPN iPhone Cortana Marketing Education Update Content Filtering Running Cable Router Storage Twitter Paperless Office Windows 11 Antivirus Law Enforcement End of Support The Internet of Things Maintenance Printer YouTube Data Breach User Laptop Websites Travel Remote Workers Mobility Virtual Reality Meetings Social Engineering Windows 7 Cryptocurrency Chrome Free Resource Black Market Monitoring Google Maps PowerPoint Current Events Saving Time Administration Politics Machine Learning Settings Solutions Presentation Disaster Computers Specifications Bitcoin Tech Terms Images 101 Solid State Drive Integration IT Consultant Display Telephone Managed IT Lithium-ion battery Customer Relationship Management Digital Co-Managed IT Chromebook Drones Entertainment Excel Employees Automobile Taxes Avoiding Downtime Processors Holidays How To Microchip Cooperation Virtual Assistant Flexibility Video Conferencing Physical Security Virtual Machines HIPAA Hack Computer Repair Identity Theft Wireless Technology Notifications Start Menu Processor Professional Services Unified Communications eWaste Downloads Computer Care Google Docs Bluetooth Downtime Vulnerability Safety Distributed Denial of Service Office Tips Software as a Service Managed Services Provider Private Cloud Data Protection Memory Multi-factor Authentication Virtual Private Network Virtual Desktop Experience Communitications Flash Motion Sickness Microsoft 365 Service Level Agreement Computing Infrastructure Smartwatch Device security Comparison Google Drive Procurement Telephone Systems Business Growth Management Shortcuts Staffing Wireless Headphones Microsoft Excel FinTech Knowledge CES Corporate Profile IT Assessment Tech Going Green IP Address Electronic Payment Business Cards Be Proactive Television Telephony Supply Chain Management Banking Employer Employee Relationship Value Google Wallet Error Cabling Cyber security Deep Learning Bookmark Organization Messenger Phone System Tablet Smart Devices Term G Suite Download Piracy Workplace Strategies HTML Mouse VoIP Remote Working Business Metrics Tracking Hosted Solution Trend Micro Browsers Recovery Nanotechnology Competition AI Books Digital Security Cameras Electronic Health Records Language Google Play Web Server Transportation Society Upload Software License SharePoint Entrepreneur Digital Payment Wasting Time LiFi Social Network Worker eCommerce Monitors Data Analysis Modem Visible Light Communication Documents Screen Reader Application Computer Accessories Reading Videos Business Intelligence Access Surveillance Security Cameras Windows 8 Trends Mobile Technology Smart Technology Devices Time Management Public Cloud Managing Costs Customer Resource management Displays Fileless Malware SSID Advertising Securty Tip of the week Relocation Audit Media Spyware Development Work/Life Balance Employer/Employee Relationships Tech Support Gamification Domains Company Culture Regulations File Sharing Virtual Machine Telephone System Optimization Directions Backup and Disaster Recovery Redundancy Reviews 2FA In Internet of Things Cache Teamwork Content Desktop Electronic Medical Records Supply Chain Accountants Troubleshooting Unified Threat Management Data Storage Hacks Workers Hypervisor Network Congestion Reliable Computing Writing Medical IT Database Public Speaking Shopping Printing Paperless CCTV SQL Server Streaming Media Health IT Workplace Equifax Keyboard Touchscreen PCI DSS Licensing Scalability Humor Computer Malfunction Tactics Hard Drives Hard Drive Disposal Emergency Gig Economy Business Communications intranet Administrator Vendor Mangement Internet Service Provider Text Messaging Azure Proactive IT Username Scams Wireless Startup Shortcut Business Owner Freedom of Information Regulations Compliance Bring Your Own Device Samsung Managed IT Service Environment Uninterrupted Power Supply Memes Navigation Webcam Addiction Heating/Cooling email scam Mobile Security Human Resources Social Networking Business Mangement Net Neutrality Music Windows XP User Tip Cables Legislation News Financial Data Tablets IT Evernote Network Management Risk Management Google Calendar Google Apps Botnet Supercomputer Micrsooft Proxy Server Point of Sale Emails Inbound Marketing Fake News Virus Telework Rental Service

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?