ARTICLE

How the Great Resignation is Impacting the Cybersecurity Landscape & What Organizations Can Do to Protect Themselves

 

Starting in early 2021, a new term began to sweep the internet. “The Great Resignation,” coined by Professor Anthony Klotz of Texas A&M University, represents the economic trend in which employees are voluntarily resigning from their jobs at a significantly higher rate than normal.
“With the hiring freezes of 2020, followed by the widespread implementation of technology demanded by digital transformation, this 2021 surge in Canadian tech jobs has led to unparalleled demand and competition for talent both on and off the market. With the pandemic providing the spark for companies to increase their tech workforce, 80% of businesses are currently in need of IT workers, and 70% of all businesses are having a difficult time finding candidates with the right skillsets.”
 
Tech Salary Guide 2022

How Has The Great Resignation Impacted Technical Jobs?

The average cost of an IT resource is skyrocketing, and the turnover rate is at an all-time high.  

Microsoft wrote an excellent article on The Cybersecurity Skills Gap which shares that for every 2 cybersecurity jobs that are filled, 1 sits empty.

As a results of the Great Resignation, recruiting and retaining IT talent just got significantly harder. In an already competitive space this is no small challenge.

Even if you can recruit IT talent, we’re approaching an inflection point where the cost of IT resources is so expensive that insourcing is beginning to make less and less sense. In 2021, salaries have risen in the Information and Communication Technology job sector; with cybersecurity roles leading the pack.

Stats_IT Resources Blog_Recruitment_SMB

indeed job postings

 

Fastest Growing Salaries Blog Image

 

“Additionally, no longer limited to major tech hubs, top-paying companies in the U.S. such as Twitter, VMWare and Google are helping drive up salaries by dipping into the Canadian talent pool.”

– Tech Salary Guide 2022  

And now, we’ve reached a tipping point. The cost and difficulty of recruiting IT resources, combined with the inevitable gaps in security posture created by a forced adjustment to hybrid work, leaves organizations vulnerable (not to mention, cyber attacks are at an all-time high).

At organizations with a sufficiently staffed security team, the average cost of a data breach was lower than average by 12.8% but only 38% of organizations surveyed for the 2022 IBM Cost of a Data Breach Report felt their security team was sufficiently staffed.

Data Breach Icon

How is the Great Resignation Affecting Cybersecurity?

To answer that, we first need to look at how the cybersecurity landscape has evolved and where we are today.

We are currently amid a massive cybersecurity rethink. For the last 30-40 years the best way for organizations to protect themselves was to purchase the “best” of each security point product. However, over time this has led to disconnected security stacks with coverage gaps, unnecessary overlap, and overloading already busy IT departments. This is what we call a “Best-of-Breed” security approach and it also requires customized IT skillsets to maintain.

Here's why the Best-of-Breed is no longer the best approach

  1. Having multiple security solutions creates complexity which leads to confusion and inconsistency in applying policies and responding to threats. This is a massive risk as the greatest financial impact to an organization happens in the period of time between incident detection and containment. The larger this window is, the more detrimental and costly the attack on your business.
  2. The Best-of-Breed approach leads to blind spots. Blind spots lead to an increase in risk; you can’t mitigate the incidents you don’t know about. While the Best-of-Breed approach is the illusion of risk reduction, it does not effectively reduce an organization’s risk.
  3. Lastly, if your organization’s security posture is custom fit; so are the resources to manage it. Whether you’re a small business or an enterprise, hiring the right team to support your Best-of-Breed approach is challenging long term (we talk more about this below).
Blog Post Great Resignation

 

Best-of-Platform is the Future of Cybercrime Protection

While cybercrime has continued to significantly rise year-over-year; the necessary shift to remote or hybrid workplaces over the last two years has accelerated the risk factor amongst all industries.

The brittle and disjointed security systems that were commonplace in many organizations, are an insufficient defense against the volume and complexity of incidents organizations face today.

FBI Quote Blog Great Resignation

Overall cost of a breach graphic_Black

The fact of the matter is that if you have overlapping security products from multiple vendors, you do have security blind spots, even if you (or your MSSP) are using a SIEM to stitch all those signals together. For more information on the Best-of-Platform approach, check out this blog post. It’s about a 14-minute read, and it contains a ton of useful detail about how the Best-of-Breed approach is leaving businesses vulnerable to costly attacks.

Blog Post Graphics Great Resignation Blind Spots

In the image above, the left-hand side shows individual security products while the right-hand side shows the IT skillsets needed to maintain each product(s).

Another way to visualize the diagram is to imagine this being your IT environment, leveraging five different security products and having three different IT resources managing various areas based on their skillset. Setting up a team this way may leave room for gaps where the right resources are not readily available to mitigate blind spots.

What Happens When an IT Person Quits in a Best-of-Breed Security Environment?

The short answer is turnover on your IT team in a Best-of-Breed security environment creates gaps that increase your organization’s risk. As a business leader, you do not want custom, unpredictable resourcing–especially when recruiting IT members is so competitive.

In the recruiting world, Human Resources will often use a term to describe searching for a candidate with a very specific skillset as; “I am looking for a purple haired squirrel.” A security stack IT position that relies on custom resources is, by definition, the perfect purple haired squirrel. And it’s inherently volatile because when there’s turnover on your IT team and only a handful of people can fill those specific roles, your organization is left unprotected.

Blog Great Resignation Image Skill Set

As the diagram above shows, the longer it takes for your organization to fill the open IT position(s); the longer your organization is vulnerable to cyberattacks. Companies can’t continue to patch together security—you’ll never be protected.

What Can Organizations Do to Protect Themselves?

What we have learned–and lived–is that the true “best” security posture is one that tightly integrates to provide a complete, holistic picture of the organization, with no overlap or conflict in the process for investigation of or response to incidents.

Smart organizations are beginning to rethink their security posture. If you aren’t sure where to start, the best next step is to get an assessment to understand where your organization stands today and what security gaps currently exist for your organization.

Bulletproof CEO ebook cover v3 portrait copy checked

How exactly do you weather a perfect cybercrime storm? 

 

As the way we work has evolved, cybercrime tactics have evolved as well. How can you protect your business in an increasingly volatile cybercrime landscape? Take action with this eBook designed to help CEOs, executives, and decision-makers understand today’s cyberthreat and what they can do to tackle today’s challenges and strengthen their security posture. 

 

GET YOUR COPY

Microsoft Defend Against Threats With SIEM + XDR Workshop

Microsoft Defend Against Threats with SIEM + XDR Workshop

Gain visibility into immediate threats across email, identity, and data and demonstrate how Microsoft Sentinel and Microsoft 365 Defender help organizations use intelligent security analytics and threat intelligence to detect and quickly stop active threats.

EXPLORE THE WORKSHOP

CoSJ eBook Icon

Cyberattacks have increased by 400% compared to pre-pandemic times. Is Your business prepared?

Cybersecurity is no longer simply an issue for your IT team. It’s time for other members of your organization to start sitting at the cybersecurity decision-making table. This eBook can help you understand modern cyberthreats and their potential impact on your business.

GET YOUR COPY

Why Bulletproof?

BULLETPROOF CREDENTIALS

  • Microsoft 2021 Global Security Partner of the Year Winner
  • 5X Microsoft Canada IMPACT Award Winner.
  • Over two decades of experience in the security and compliance business.
  • Microsoft Solutions Partner for Modern Work + Security, specializing in Threat Protection and Cloud Security, and Digital & App Innovation Azure
  • Two State-of-the-art 24/7 Security Operations Centres (SOC).
  • Trusted by users on six continents to protect their data, devices, and people.
  • Holder of Microsoft’s Advanced Specialization in Threat Protection.
  • Bulletproof 365 Enterprise (B365E) is a Microsoft Verified Managed XDR Solution.
  • Member of the Microsoft Intelligent Security Association.Impact Award + Global Award Duo Logos_Full Color_Trans

Website Testimonials (19)

“Bulletproof is doing an exceptional job of listening to their customers and then going above and beyond to provide them with services to unlock all the value of their Microsoft Security investment. They are able to see the value of our Microsoft security platform and have built a managed SOC service that is driving significant customer value, allowing their customers to remain focused on their business.”

-Julie Jeffries, Modern Work & Security PMM Manager, Microsoft Canada
 
28374-1-microsoft-logo-transparent

Call Us

1.866.328.5538