The Nasstarian
Brought to you by

What Does the Cybersecurity Skills Gap Mean for the Industry?

In analysis / By Mark Flynn / 26 July 2018

The cybersecurity skills gap has been one of the major issues in the industry for the past few years. The shortage has a big impact on how the industry behaves as a whole as practitioners are in high demand and the tools to help lessen the issue are eagerly sought after.

But that skills gap doesn’t just affect us, it is also hitting the hackers. Unlike the rest of us, hackers can’t take part in education initiatives and as such, they are turning to other methods to recruit new hackers into their ranks.

Online grooming of children is unfortunately nothing new, however the fact that hackers have started to use these kinds of techniques is a new development. Hacking gangs use online forums in an attempt to ensnare younger minds into their way of life in order to shore up the gap in skilled hackers.

I believe that the best way to tackle such issues is to educate people about the dangers and illegality of hacking from an early age.

An interesting cyber security article in the news this week discussed how to define the different types of digital workspace. This may not seem important, however it is necessary to consider the security implications of the various options open to you when designing your modern cloud based collaborative strategy.

The first of these types is unmanaged shared devices. This is when an office will share a single computer with only one login. This is the most unsafe digital workplace in terms of cyber security as there is no way of knowing who is logged in at any one time.

Unmanaged personal devices, or BYOD, are where personal devices are used to work but aren't shared with anyone else. This can also be unsafe, however if you are using a secure cloud hosting service then your applications and data are a lot more secure.

Managed shared devices is the use of company owned devices that can have several different logins over time. This Is useful as it means your cybersecurity team can look after the device by adding any patches to it and can monitor activity to see if you have been hacked.

And finally, there are managed personal devices where the company issues all the devices you need to do your work. This option is quite expensive but the biggest advantage is that you know precisely who is using a device and removes the issue of people accidentally forgetting to log out, allowing others to use your account.

New call-to-action
Mark Flynn

Mark Flynn

Mark Flynn is Head of Sales for Nasstar. Mark has wealth of knowledge & experience within the IT industry & plays an instrumental part in defining our long-term sales & go to market strategies.

London, England
Comments powered by Disqus