The prevalence of could-based products and the increasing value of data are making cybersecurity more of an essential for more and more companies. Companies that don’t prepare for the security needs of the future will be vulnerable to catastrophic hacks that affect both your company and your customers.
Here are some of the major trends that will be affecting the security of companies going forward and the forces that will impact their needs for cyber security talent.
Growing Cybersecurity Demands in the Future
This past week saw Yahoo’s top Lawyer resign in the wake of massively successful hacks against the company and its users in 2014 as well as outgoing CEO, Marissa Mayer, losing her 2016 bonus. Your company and users being hacked is bad enough, but telling your users that they may have been hacked 2 years after it happened, is what took this cyber-attack to scandalous proportions.
Yahoo and Marissa Mayers were not ready for the 2014 hack and they are now paying the price. The company took massive losses following the scandal and is preparing to change its name and/or be sold to Version. Though Yahoo has not been a contender in the way that Google or Amazon have been in recent years, the company still survived long after its hay-day. All of this dogged resilience, however, did not matter in the face of this massive security breach.
All companies should look to Yahoo’s story when considering the security measures that are appropriate for their needs. While there is no guarantee that your company will be hit with a cyber-attack this year, we will only see these incidents grow in frequency and sophistication as time goes on. You already pay other forms of insurance, on your office and/or the healthcare of your employees, and investing in cybersecurity is no different. The last thing you want is for all of your hard work to be compromised by a few, malicious actors halfway around the world.
New Products, New Risks, New Consumer Demands
The expansion of “The Internet of Things” has the potential to put greater security demands on a wide range of companies. The October 2016 DDOS attack was conducted by hacking devices with built-in internet connectivity or cloud features, like cameras that can upload your pictures to the internet and even crock pots that can be controlled via Wi-Fi. As of now, there are little to no security requirements placed on manufactures of “Internet of Things” products, but, as time goes on and DDOS attacks grow in strength, these regulations are inevitable.
Tech and “Internet of Things” companies will be under pressures from regulators to beef-up security, but they will also be under pressure from customers and consumers. For instance, if you were a Yahoo user who learned that your account may have been hacked several years ago, you may be experiencing some second thoughts about using the company’s services.
As the skills and tools of hackers grow in sophistication, so too will customer demands for security. Though saying “secure” somewhere on your product may be good enough today, there may be specific safety standards that every internet-integrated product has to meet in the future.
For example, an accountant services company that takes no steps to increase their security, may find themselves unable to find clients in the future, who all prefer a competitor who has recognized security measures in place to protect their sensitive financial data.
The pressure to increase cybersecurity will come from all sides, and companies who are early adopters will be more attractive to security-minded customers and client companies.
The Cybersecurity Talent Gap
So, companies of all kinds will have greater cybersecurity demands in the not-so-distant future. However, this does not mean that these companies are going to have an easy time hiring the cybersecurity talent they need to meet new security objectives and requirements.
Cisco estimates that there are over 1 million unfilled cybersecurity positions worldwide and projects this number to increase to 1.5 million by 2019. Besides this large talent gap, a survey from Semper Secure is showing that Cybersecurity professionals are highly selective about the companies that they work for and highly loyal to those companies.
The majority of cybersecurity pros are opposed to job hopping, with 65% cybersecurity pros saying that they “have worked at two or fewer organizations throughout their career.”
This is corroborated by Lee Vorthman, CTO of NetApp’s Federal Civilian Agencies unit:
“These people aren’t jumping from job to job looking for salary bumps and signing bonuses. Many of them want to work for federal agencies and most of them tend to stick with employers for the long term. For companies, that means they better get them early or risk not getting them at all.”
So, even though you may not technically need to increase your cybersecurity staff today, companies with impending cybersecurity needs should start building connections with cybersecurity talent. If you don’t, your company may be unprepared to secure the cybersecurity talent you need, when you really need it.
Ronny Cheng is one of the Co-Founder’s of Digital Astronauts and has helped drive lead generation in the software industry for organizations of all sizes — from start-ups to Fortune 500’s. He helped build one of the first online software review websites, specializing in CRM, ERP, and HR software. He’s a nationally published author with extensive experience working with the HR/Recruiting industries largest brands. In his spare time, you can catch him on Instagram doing his best food blogger impersonation.
Thanks for visiting the SkillGigs Facebook page! By using or accessing our Facebook page, you agree to comply with Facebook's Statement of Rights and Responsibilities. As always, the content posted by fans of SkillGigs' Facebook page does not reflect SkillGigs' views or opinions. Just because you see content from other fans of SkillGigs does not mean SkillGigs confirms the accuracy that content.
Our hope is that your experience on our Facebook page is just as awesome as your SkillGigs experience on our website. That’s why we’re asking all of our fans to follow a few guidelines to help maintain this standard. Please do not post content that:
is fraudulent, deceptive or misleading;
is threatening, abusive, defamatory, obscene, indecent or objectionable;
violates any law or regulation;
violates the intellectual property rights of another;
is hateful or otherwise targets race, religion, political beliefs, ethnicity, gender, sex, or nationality;
is spamming (including link baiting) or commercial in nature; or
is otherwise offensive.
We reserve the right to remove any posts that violate these guidelines or that we otherwise determine are not appropriate. By posting content on our page, you hereby grant to SkillGigs a worldwide, royalty-free license to use and fully exploit the content in any manner or media, forever, without any obligation to you. This includes the right to use any ideas you submit (including ideas about our products or advertising campaigns) in any manner that we choose, without any obligation to you.
https://buff.ly/2uYBLup Candidates are typically on their best behavior during interviews. Check out this Society of Human Resource Management article where Dr. John Sullivan does a great job of explaining methods for catching candidates when they aren't being their authentic selves - even in an interviewing atmosphere.
Employers or hiring managers, you may know to make a good first impression with potential #talent by sharing the company benefits & activities, but how do you get them excited for the actual job? As we are in #tech, we are passionate about providing innovation junkies. Check out a few of my methods for charging up the talent. #hackathons
Our tool offers candidates with all kinds of job type preferences. We know startups need to grow and the need to grow fast. Check out George Deeb's advice on when to hire #employees, #contractors or crowdsources for your #startup.
Lesson #30: When to Hire Employees vs. Contractors vs. Crowdsources
Now, when is it best to use employees vs. contractors vs. crowdsources? The answer typically comes down to: (i) is the position long term in nature, or temporary; and (ii) does the complexity of the work require onsite management or not.