Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cybersecurity is a Shortcoming for the DHS

Cybersecurity is a Shortcoming for the DHS

Every IT administrator today needs to be concerned about cybersecurity, as does every private business when it comes to its network. However, the same can’t really be said for the computing resources of the government and other public entities… simply due to the lack of talent available.

This lack has even been addressed by the U.S. Department of Homeland Security, and how its continuation will soon create serious issues for the government and the public sector at large. Let’s take a look at what we need to fix to help preserve the nation’s cybersecurity, and the nature of this shortage.

Shortage, According to the DHS

The mission of the Department of Homeland Security is to protect American citizens and American businesses within the borders of the United States. To accomplish this, there needs to be a collaborative effort between human security experts and systems that leverage artificial intelligence. The Assistant Director for the Cyber Security and Infrastructure Security Agency (or CISA) Jeanette Manfra, doesn’t split hairs when it comes to the shortage of cybersecurity talent.

“It’s a national security risk that we don’t have the talent,” according to Manfra. “We have a massive shortage that is expected to grow larger.” 

Missing Skills

With cybersecurity demand increasing, this shortage is a huge issue. The Center for Cyber Safety and Education has stated that the current 1.5 million available cybersecurity jobs will swell to 1.8 million by 2021… and where there’s insufficient security talent, there are more breaches in both the public and private sector.

Why is There a Shortage?

Looking at the industry, one could hypothesize that the shortage of public-sector cybersecurity employees is mostly due to the fact that the private sector is more lucrative. While there is no denying that this is how economics tend to play out, it isn’t actually the reason that there is a shortage.

Frankly, it mostly has to do with the job.

Much like other municipal positions, public-sector cybersecurity is a largely thankless industry, which isn’t exactly a selling point for it. Imagine doing critical work, but having your contributions overlooked and ignored… that is, until there was a problem. Then it’s your fault that it happened.

Education Also Needs Improvement

It also doesn’t help that there have been a lot of for-profit colleges closing their doors, meaning that the leading providers of IT training are going away as demand for cybersecurity ramps up.

Fortunately, many ethical hackers out there have picked up the slack. This group identifies vulnerabilities and serves as consultants for businesses. They are also responsible for designing the free coursework that many organizations are now pushing in the attempt to grow cybersecurity awareness. Many online tools have been published by cybersecurity firms to try and pique the interest of potential hires in the future, like Cyber Aces, Hacker101, Google Gruyere, and others.

Jeanette Manfra has also said that CISA is campaigning for grade and secondary schools to add development into their curriculum and to establish training procedures modeled to encourage more people to sign on and remain in the industry.

Improvements here could even help the cybersecurity industry as a whole. Manfra posits that if the government were to subsidize the educational costs new cybersecurity professionals incur in exchange for a few years of work in the public sector, the industry as a whole would have a better level of standardization. As a result, costs would stabilize, benefiting businesses further.

It is important to recognize that cybercrime isn’t going to go away, which means that your business needs to be protected. To learn more about cybersecurity and how it pertains to your business, keep coming back to our blog, or reach out to the professionals at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 06 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Android VoIP Upgrade Disaster Recovery Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Managed Services Gmail Budget Voice over Internet Protocol WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Big Data Managed IT Services 2FA Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Windows 11 Social Free Resource Cooperation Project Management Windows 7 Excel Going Green Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability Customer Service Solutions Vendor Management Cybercrime Physical Security Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Entertainment Administration Vulnerabilities Supply Chain Images 101 Multi-Factor Authentication Mobility Robot Telephone System Customer Relationship Management Cost Management Settings Wireless Printing Content Filtering Hacking IT Management Employees VPN YouTube Meetings Presentation Integration Cryptocurrency Wireless Technology User Tip Modem Processor Data Privacy Computer Repair Mobile Security Holidays Virtual Desktop Data storage LiFi Data Storage Word Smart Technology Outlook Video Conferencing Managed Services Provider Machine Learning Saving Time Money Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Cyber security Tech Multi-Factor Security Telework Mobile Computing Social Network CES Communitications Tablet IoT Small Businesses Search Dark Web Application Supply Chain Management Best Practice Trends Displays Alert Buisness File Sharing Regulations Term Dark Data Google Calendar FinTech Managed IT Customer Resource management IBM Data Analysis Legal IT Assessment IT solutions Star Wars Outsourcing How To Microsoft Excel Flexibility Business Growth Gamification Value Notifications Staff Travel Social Networking Workplace Legislation Organization Fileless Malware Digital Security Cameras Techology Smart Devices Google Maps Hiring/Firing Cortana Paperless Remote Working Alt Codes Content Memory Wearable Technology Data Breach Downtime Unified Threat Management Motherboard Co-managed IT Google Play Comparison Competition Health IT Directions Videos Unified Threat Management Electronic Health Records Hosted Solution Assessment Technology Care Permissions Business Communications Typing Wasting Time Trend Micro Scams Security Cameras Network Congestion Specifications Microchip Google Drive User Error User Software as a Service Internet Exlporer Hybrid Work Knowledge Fraud Managing Costs Human Resources Username eCommerce Point of Sale Cables SSID 5G Black Friday IP Address Google Docs Surveillance Unified Communications Database Virtual Assistant Experience Virtual Machine Running Cable Tech Support IT Technicians Google Apps Bitcoin Network Management Proxy Server Reviews Google Wallet Cookies IT Maintenance Medical IT Monitors Cyber Monday Recovery Development Tactics Business Intelligence Transportation Hotspot Hypervisor Laptop Websites Mirgation Shortcuts Hard Drives Windows 8 Domains Shopping Drones Optimization Nanotechnology Ransmoware PowerPoint SharePoint Addiction Vendors Employer/Employee Relationships Electronic Medical Records Language Halloween Chatbots Be Proactive Navigation Refrigeration PCI DSS Management Public Speaking Gig Economy Lenovo Screen Reader Workforce Writing Distributed Denial of Service Lithium-ion battery Internet Service Provider Service Level Agreement Threats Teamwork Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Workplace Strategies Evernote Regulations Compliance Hacks Server Management Bookmark Superfish Memes Identity Theft Smart Tech Meta Fun Net Neutrality Deep Learning Download Amazon SQL Server Twitter Alerts History Error Undo Financial Data Browsers Smartwatch IT Education Connectivity Outsource IT Social Engineering Break Fix Media Procurement Upload Environment Azure Remote Computing

Blog Archive