Why Cyber Training Is So Important For Business

Experts agree that a  workforce trained in cybersecurity is the strongest weapon in any  business’s arsenal when it comes to network resilience and data protection.

While businesses spend a lot of time and effort putting up technical defenses to protect their systems, often the weakest spot is the users. Employees can do harm to the business by visiting infected websites, responding to phishing emails, using business email through public Wi-Fi and more. 

Current training should look at the things that can go wrong, including using found USB sticks, poor password habits, and falling for phishing attacks. It also looks at the effects and costs of the downtime these things can cause.
Your business cannot simply “buy in” security technology in the same way that a consumer purchases an antivirus package for a PC. 

Cyber crime is not just about software; with more and more cyber-criminals targeting workers, through phishing emails and other ploys, making sure you have a security-savvy team in place is more important than ever.

“Worldwide spending on cyber-defence products and services is forecast to exceed $1trn until 2021,” says Oyku Isik, professor of information systems management at Vlerick Business School in Belgium. 

“Yet every year we hear [of] a cyber-incident that is significantly worse than one in the previous year. This is a clear sign that all the investment in technology is necessary, but not enough. It is now time to invest in people.”

Continue Learning
Making sure you have trained experts in cyber-security is still important too, and now, more than ever, these experts also need to be strong communicators.  But recruiting talent for cyber-security roles is increasingly difficult, with Britain facing a digital skills gap that could leave up to three million jobs unfilled by 2030. 

In cybersecurity, the problem is particularly intense, with a report from the UK Parliament’s Joint Committee on the National Security Strategy suggesting that even government departments struggle to recruit talent. Research by KPMG this year found that more than half of chief information security officers (52pc) said they struggled to recruit talent.

Prioritising Skills
To address the skills gap, businesses need to rethink how they recruit and train cyber-security professionals, says Ruth Davis, head of commercial strategy and public policy for BT Security speaking to reportes.

“The idea that people need to be qualified in a STEM science, technology, engineering and mathematics subject, have five years of experience and security qualifications is outdated ... one of BT’s best graduate cryptographers studied music.”

Instead, businesses should look for people with roughly similar skill sets and the right aptitude and then rain them up,

 “The focus to date has been on building a future pipeline of talent via schools and universities. This was the right priority at the time, but we now need to broaden our focus to help those with transferable skills or aptitude move into the industry ... we need to focus on mid-career transfer, getting people with similar skill sets and the right aptitude to come and work in our sector; because we need people now.”

Telegraph:         BetaNews

You Might Also Read: 

The Global Cyber Skills & Training Shortage:

 

 

« French Cyber-Police, Avast & FBI Neutralise Global Botnet
The Digital Future Is About Disintegration »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

CYE

CYE

Utilizing data, numbers, and facts, CYE helps security leaders know what business assets are at risk and execute cost-effective remediation projects for optimal risk prevention.

Nemko

Nemko

Nemko offers testing, inspection, and certification services worldwide, mainly concerning products and systems, but also for machinery, installations, and personnel.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Intelidata Techedge Pvt. Ltd.

Intelidata Techedge Pvt. Ltd.

Intelidata are a Global Cyber Security Consultancy and Services firm that helps companies drive growth by minimizing risk and maximizing potential.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

Axoflow

Axoflow

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure.

METCLOUD

METCLOUD

METCLOUD is driving a cloud evolution. A cloud that promises relentless cybersecurity, performance, resilience and sustainability.

Nyx Security Solutions

Nyx Security Solutions

Nyx is committed to excellence in embedded cybersecurity, delivering top-tier secure design, development, and penetration testing services that meet and exceed industry standards.