{"id":15470,"date":"2016-07-26T05:00:20","date_gmt":"2016-07-26T12:00:20","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=15470"},"modified":"2020-12-24T04:10:23","modified_gmt":"2020-12-24T12:10:23","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"<p>Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security specialists is skyrocketing, yet a shortage in candidates leaves the industry\u2014and your organization\u2014vulnerable.<a href=\"http:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/Chris_Cochran_02.jpg\" rel=\"attachment wp-att-15472\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-15472\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/Chris_Cochran_02-681x1024.jpg\" alt=\"IronNet CyberSecurity Chris Cochran\" width=\"218\" height=\"328\" \/><\/a><\/p>\n<p>Symantec <a href=\"http:\/\/www.csoonline.com\/article\/2953258\/it-careers\/cybersecurity-job-market-figures-2015-to-2019-indicate-severe-workforce-shortage.html\">reports<\/a> that the global demand for the cybersecurity workforce is expected to rise to 6 million by 2019, with a projected shortfall of 1.5 million.<\/p>\n<p>The profession is slated to grow by 36.5 percent through 2022. While that is a notable improvement, it is still woefully short. Reports by the Bureau of Labor Statistics suggest that the demand for information security specialists is expected to grow by 53 percent as soon as 2018. Currently, 209, 000 cybersecurity jobs in the U.S. remain unfulfilled.<\/p>\n<p>The result is a lack of 24&#215;7 monitoring by nearly 75 percent of security enterprises. There simply aren\u2019t enough specialists to supervise your data around the clock.<\/p>\n<p>The shortage of talent causes many security teams to fall short of their goals. A report by 451 Research compiled responses from more than 1,000 IT professionals. The outcomes revealed that 34.5 percent of security managers couldn\u2019t implement desired security projects due to a lack of staff expertise. More than 26 percent fall short of objectives due to inadequate staffing.<\/p>\n<p>To fill the void, many organizations opt to cross-train existing IT staff.<\/p>\n<p>Chris Cochran, Threat Intelligence Leader at IronNet Cybersecurity expounds: \u201cThe great thing about cross-training is that IT technicians already have a background in a cyber craft. This shortens the time it would take to make someone operational in a given task or field. The downside is that, more often than not, you find cyber experts stretched for time and expertise. They are being spread too thin across the landscape. We need resident experts. We need people that will focus on the hard problems and create solutions.\u201d<\/p>\n<p>Securing specialized talent should be a top priority for all organizations that manager sensitive data. Enterprises must get creative as they vie for the attention of limited candidates.<\/p>\n<p>Veronica Mollica, founder and executive information security recruiter at Indigo Partners regularly encounters competitive exchanges. \u201cOur candidates are facing competing offers from multiple companies with salary increases averaging over 30%. Current employers are scrambling to retain talent with counter offers including 10% and higher salary increases for information security team members to remain on board.&#8221;<\/p>\n<p>Dice technology career site <a href=\"http:\/\/media.dice.com\/report\/may-2015-top-paying-tech-security-jobs\/\">reports<\/a> that security software engineers have an average salary of $233,333. That\u2019s about $8,000 more than the average CSO salary. In addition to competitive salaries, employers will need to consider additional options with the package.<a href=\"http:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg\" rel=\"attachment wp-att-15471\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-15471\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg\" alt=\"teens and mentor learning data security\" width=\"370\" height=\"247\" srcset=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg 1000w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg?resize=768,512 768w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg?w=400 400w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg?w=500 500w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg?w=600 600w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg?w=720 720w, https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg?w=800 800w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\" \/><\/a><\/p>\n<p>\u201cAlthough salaries in our field are generally substantial, I find it is job satisfaction that reigns supreme for both recruiting and retention,\u201d says Cochran. \u201cTo make a Marine Corps analogy: It is hard to find a manning vacancy in a unit that has an awesome mission. Individuals want their work to matter. Individuals want the freedom to use their tools and skills to create innovative solutions to hard problems. Individuals want to work for an organization or mission that they care about. If companies can create a corporate culture that allows concepts like that to thrive, recruiting and retention will be much easier.\u201d<\/p>\n<p>Competitive compensation packages, creative freedom, and engaging assignments are only the first steps. Ultimately, the field needs more qualified talent.<\/p>\n<p>Existing digital security specialists within your organization can serve as instructors, volunteers, and mentors at youth <a href=\"https:\/\/niccs.us-cert.gov\/community\/community-outreach\">cybersecurity schools<\/a> throughout the U.S. Many colleges and universities are expanding their degree programs. These training grounds refine talent from an early age and present organizations with the opportunity to forge brand loyalty.<\/p>\n<p>\u201cThere are several of us in the field that are making an effort to inspire young adults to seriously consider cyber and cybersecurity as a profession,\u201d says Cochran. \u201cThe cyber world has been generous to a lot of people. I believe it to be our duty to give back and inspire our youth to carry the torch to places we haven\u2019t even dreamt of.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security specialists is skyrocketing, yet a shortage in candidates leaves the industry\u2014and your organization\u2014vulnerable. Symantec reports that the global demand for the cybersecurity workforce is expected to rise to 6 million by 2019, with [&hellip;]<\/p>\n","protected":false},"author":440,"featured_media":15471,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[1444,99,359,326],"class_list":["post-15470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-cyber-attack","tag-data-security","tag-online-security","tag-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-26T12:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-24T12:10:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erica Rasc\u00f3n\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erica Rasc\u00f3n\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/cybersecurity\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/cybersecurity\/\",\"name\":\"Cybersecurity - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg\",\"datePublished\":\"2016-07-26T12:00:20+00:00\",\"dateModified\":\"2020-12-24T12:10:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/d63afaf076d5863391dd49858ccef2ac\"},\"description\":\"Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg\",\"width\":1000,\"height\":667,\"caption\":\"teens and mentor learning data security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/d63afaf076d5863391dd49858ccef2ac\",\"name\":\"Erica Rasc\u00f3n\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09382010b8c97da56343095c2854ad7733a3c2e094f59f75eb5ef1aacf501bcf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09382010b8c97da56343095c2854ad7733a3c2e094f59f75eb5ef1aacf501bcf?s=96&d=mm&r=g\",\"caption\":\"Erica Rasc\u00f3n\"},\"description\":\"Erica Rasc\u00f3n specializes in online content creation and social media. She joined Yardi in 2011 after receiving her bachelor's degree from Kennesaw State University and serving in the Peace Corps. Erica's interests include sustainability, philanthropy, and the arts.\",\"url\":\"https:\/\/www.yardi.com\/blog\/author\/ericajarrell\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity","og_description":"Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security","og_url":"https:\/\/www.yardi.com\/blog\/cybersecurity\/","og_site_name":"Yardi Blog","article_published_time":"2016-07-26T12:00:20+00:00","article_modified_time":"2020-12-24T12:10:23+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg","type":"image\/jpeg"}],"author":"Erica Rasc\u00f3n","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Erica Rasc\u00f3n","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/cybersecurity\/","url":"https:\/\/www.yardi.com\/blog\/cybersecurity\/","name":"Cybersecurity - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg","datePublished":"2016-07-26T12:00:20+00:00","dateModified":"2020-12-24T12:10:23+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/d63afaf076d5863391dd49858ccef2ac"},"description":"Your organization manages sensitive information every day. You rely on cybersecurity specialists to protect your data from misuse. The demand for security","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/cybersecurity\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg","width":1000,"height":667,"caption":"teens and mentor learning data security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/d63afaf076d5863391dd49858ccef2ac","name":"Erica Rasc\u00f3n","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09382010b8c97da56343095c2854ad7733a3c2e094f59f75eb5ef1aacf501bcf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09382010b8c97da56343095c2854ad7733a3c2e094f59f75eb5ef1aacf501bcf?s=96&d=mm&r=g","caption":"Erica Rasc\u00f3n"},"description":"Erica Rasc\u00f3n specializes in online content creation and social media. She joined Yardi in 2011 after receiving her bachelor's degree from Kennesaw State University and serving in the Peace Corps. Erica's interests include sustainability, philanthropy, and the arts.","url":"https:\/\/www.yardi.com\/blog\/author\/ericajarrell\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2016\/06\/shutterstock_146082389.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/15470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=15470"}],"version-history":[{"count":4,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/15470\/revisions"}],"predecessor-version":[{"id":15488,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/15470\/revisions\/15488"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/15471"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=15470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=15470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=15470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}