Why Cyber Training Is So Important For Business

Experts agree that a  workforce trained in cybersecurity is the strongest weapon in any  business’s arsenal when it comes to network resilience and data protection.

While businesses spend a lot of time and effort putting up technical defenses to protect their systems, often the weakest spot is the users. Employees can do harm to the business by visiting infected websites, responding to phishing emails, using business email through public Wi-Fi and more. 

Current training should look at the things that can go wrong, including using found USB sticks, poor password habits, and falling for phishing attacks. It also looks at the effects and costs of the downtime these things can cause.
Your business cannot simply “buy in” security technology in the same way that a consumer purchases an antivirus package for a PC. 

Cyber crime is not just about software; with more and more cyber-criminals targeting workers, through phishing emails and other ploys, making sure you have a security-savvy team in place is more important than ever.

“Worldwide spending on cyber-defence products and services is forecast to exceed $1trn until 2021,” says Oyku Isik, professor of information systems management at Vlerick Business School in Belgium. 

“Yet every year we hear [of] a cyber-incident that is significantly worse than one in the previous year. This is a clear sign that all the investment in technology is necessary, but not enough. It is now time to invest in people.”

Continue Learning
Making sure you have trained experts in cyber-security is still important too, and now, more than ever, these experts also need to be strong communicators.  But recruiting talent for cyber-security roles is increasingly difficult, with Britain facing a digital skills gap that could leave up to three million jobs unfilled by 2030. 

In cybersecurity, the problem is particularly intense, with a report from the UK Parliament’s Joint Committee on the National Security Strategy suggesting that even government departments struggle to recruit talent. Research by KPMG this year found that more than half of chief information security officers (52pc) said they struggled to recruit talent.

Prioritising Skills
To address the skills gap, businesses need to rethink how they recruit and train cyber-security professionals, says Ruth Davis, head of commercial strategy and public policy for BT Security speaking to reportes.

“The idea that people need to be qualified in a STEM science, technology, engineering and mathematics subject, have five years of experience and security qualifications is outdated ... one of BT’s best graduate cryptographers studied music.”

Instead, businesses should look for people with roughly similar skill sets and the right aptitude and then rain them up,

 “The focus to date has been on building a future pipeline of talent via schools and universities. This was the right priority at the time, but we now need to broaden our focus to help those with transferable skills or aptitude move into the industry ... we need to focus on mid-career transfer, getting people with similar skill sets and the right aptitude to come and work in our sector; because we need people now.”

Telegraph:         BetaNews

You Might Also Read: 

The Global Cyber Skills & Training Shortage:

 

 

« French Cyber-Police, Avast & FBI Neutralise Global Botnet
The Digital Future Is About Disintegration »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

FlashRouters

FlashRouters

FlashRouters offers DD-WRT compatible router models with improved performance, privacy/security options, and advanced functionality.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

SQA Service

SQA Service

SQA Service provide independent software and process Quality Assurance services.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.