SMEs Need To Close The Cyber Security Training Gap

In 2020 millions of UK people began working at home because of Covid and currently in 2021, the proportion of remote workers who say loneliness and cyber security problems are serious issues has significantly increased. 

Cyber criminal attackers have benefited from the uncertainty of the COVID-19 pandemic and the isolation of remote workers and have made remote worker the victims of phishing attacks.

Government research into the UK cyber security labour market carried out in 2020 estimated that  48% of UK businesses had a basic skills gap when it came to cyber security.  This year, Vodafone completed and published a similar report which found that around 30% of UK SMEs said they don’t have a cyber security strategy in place. While this suggest the gap has closed, its clear the knowledge and skills shortages remain a big problem for SMEs. 

In 2020 the government report found 64% of cyber firms faced problems with technical cyber security skills gaps among existing staff or job applicants. A recent 2021 Capterra looking at cyber security and home working demonstrated a situation that could prove even more critical. Just 19% of those questioned believed their company had no individual they could contact regarding cyber security breaches, a rise from 11% in 2020, while a little under 50% admitted they wouldn’t actually know who to contact within their organisation if such a breach occurred. Capterra's findings, which showed the number of employees who had received IT security training had risen only fractionally year-on-year, from 20% in 2020 to 22% in 2021, despite the wider security risks faced now from remote working.

This means companies are not only battling to ensure their employees understand the appropriate safety precautions while working away from the office, but they are also struggling to find the right security employees to put proper security in place.  

Mimecast research paints another worrying picture. Some seven in 10 of those questioned believed employee behaviours such as poor password hygiene put their companies at risk but only one in five organisations had provided ongoing cyber awareness training, according to the report. 

An additional problem can be when people feel disconnected from their training, so any lessons delivered don’t sink in.
Some of the biggest threats could actually be the most simple to solve. Recent research by HP's Wolf security found that 46% of office workers admitted to using their work laptop for personal “life admin”, and 30% had let someone else use their work device. 

Mimecast:      Gov.UK:      Capterra:         ITPro:      Vodafone:    HP Wolf

You Might Also Read:

How To Write Learning Objectives For Cyber Security Training:

 

« Scientists Say Social Media Is A Risk To Humanity
Artificial Intelligence Is Being Badly Used In Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Zitec

Zitec

One of Europe's largest and most prominent full-cycle software development services companies, Zitec is the digital transformation partner to companies in the EU, UK, USA, Canada and ME.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.