ZDNet published an eye-opening – but at the same time very understandable – article that outlined why the Coronavirus pandemic is seeing cybersecurity teams struggling with burnout as time goes on. With the second wave hitting many countries, and further lockdowns occurring, this has forced many security operation centres (SOCs) to work remotely while dealing with the new threats that the Work From Home (WFH) environment has introduced. Not surprisingly, this is leading to higher workloads and an increase in burnout for cybersecurity staff.
According to research from the Ponemon Institute, the current pandemic has increased the hours and workload of information security staff, which was already a high intensity / high stress environment to begin with. The shift that many organizations saw in 2020, going from mainly office-based to working from home, was also mirrored by a significant number of cybersecurity personnel having to do the same, with over 1/3 of SOC environments shifting to work remotely.
As we’ve mentioned in earlier posts, the big shift to WFH has exacerbated the problems for cybersecurity staff. Before, when they just had to secure an office environment, they dealt with a wide range of threats such as phishing, malware, ransomware, etc. Now that a large portion of their organizations are in an WFH environment, it adds an additional layer of complexity and more challenges as they must now also protect those outside of the fortified office network environment from these threats and other ones that are introduced by employees working remotely.
As employees connect to work systems from their home internet connections (and often from their own personal computers), this opens up additional attack vectors that cyber criminals can use to enter corporate networks. Again, all of these changes have made it even harder for cybersecurity staff, who themselves are now working remotely at home with potentially less resources available to them. Just like other staff, cybersecurity teams are having to do their jobs while also dealing with the additional pressures and distractions of the work from home environment. With these additional distractions, it can be hard for cybersecurity analysts to stay productive and focus on defending the networks that they have been tasked with protecting.
The same Ponemon survey has spotlighted that the additional pressures of working in the cybersecurity field while having to work remotely has lowered staff moral to the extent that 3/4 have stated they have experienced burnout from the job. This has led to some security analysts leaving their positions, further increasing the shortage of these analysts and leading to an increase in the average salary for these positions; which has risen to $111,000, up from $102,000 just prior to the start of the pandemic a year ago.
Although, like many other jobs, SOCs can optimally operate when their staff can meet in-person. However, SOCs may not be going back to becoming an in-person entity any time soon with potentially other disasters, physical or otherwise, forcing a similar pattern of working remotely in the future. Organizations need to learn how to manage their cybersecurity staff remotely when events occur that prevent them from working from the office.
And this is where Wedge Networks comes in with its Wedge Absolute Real-time Protection platform (WedgeARP), a deep content inspection-based solution that orchestrates best-in-breed security services along with Ai / Machine learning We have been keenly aware of the expanding security gap (where rapidly expanding security workloads are greatly outpacing enterprise security capacity) and have tailored our platform to help alleviate this issue. Not only is WedgeARP effective in providing automated real-time PREVENTION of advanced threats, but it also has detailed analytics built-in to its “single-pane-of-glass” user interface; providing security teams with actionable intelligence that can aid them in further fortifying their networks. By helping to reduce cybersecurity teams’ workloads – stopping threats before they can cause damage corporate networks – and then by providing them with easy-to-use tools that can reduce the “alert noise” that their other solutions are generating, WedgeARP is an effective solution that can actually help to close the security gap. By allowing cyber security teams to work smarter and not harder, this can reduce burnout in the employees and help organizations retain these highly skilled staff members.
To learn more about how WedgeARP and its automated real-time threat prevention can help your cybersecurity team work more efficiently in these ever-stressful times, contact us at: info@wedgenetworks.com.
Main Website Links
Wedge DCI Search
Wedge Calendar
-
Recent Posts
- vKey and Wedge: Protect and Extend Device Life in an Education Environment Webinar
- Wedge Networks Inc. Selected for Government of Canada Innovations Direct Buy Program
- Prevent the Rooting of Rootkits: The Critical Role of Real-time Threat Prevention
- Navigating the Digital Minefield: A Closer Look at Cybersecurity in 2023
- Wedge Networks announces its partner DLS has been awarded the Government of Canada SLSA for 5 years
Recent Comments
- Ram Bathala on Calgary’s Wedge Networks Looks to Channel for Enterprise Push with Malware-Blocking Product
- Eva on Milliseconds Versus Minutes – The Difference Between Prevention and Remediation
- Smithb on Wedge Adds AI for Better Malware Blocking
- Abram on Wedge Joins MEF to Boost World’s Third Network Security
- David Millar on 5G & IoT Dominate MWC16
Archives
- June 2024
- March 2024
- February 2024
- December 2023
- October 2023
- June 2023
- May 2023
- February 2023
- January 2023
- November 2022
- September 2022
- August 2022
- July 2022
- June 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- September 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- October 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- March 2018
- February 2018
- July 2017
- June 2017
- May 2017
- April 2017
- February 2017
- November 2016
- October 2016
- September 2016
- May 2016
- April 2016
- March 2016
- February 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- June 2015
- May 2015
- April 2015
- March 2015
- December 2014
- November 2014
- October 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- April 2013
- November 2012
- October 2012
- September 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- June 2011
- May 2011
- February 2011
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
Categories
Meta
Kaspersky ThreatPost
- Student Loan Breach Exposes 2.5M Records August 31, 2022
- Watering Hole Attacks Push ScanBox Keylogger August 30, 2022
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms August 29, 2022
- Ransomware Attacks are on the Rise August 26, 2022
- Cybercriminals Are Selling Access to Chinese Surveillance Cameras August 25, 2022
- Twitter Whistleblower Complaint: The TL;DR Version August 24, 2022
- Firewall Bug Under Active Attack Triggers CISA Warning August 23, 2022
- Fake Reservation Links Prey on Weary Travelers August 22, 2022
- iPhone Users Urged to Update to Patch 2 Zero-Days August 19, 2022
- Google Patches Chrome’s Fifth Zero-Day of the Year August 18, 2022