{"id":2078,"date":"2004-11-30T00:00:00","date_gmt":"2004-11-30T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/30\/i-t-security-a-people-problem-workforce-to-nearly-double-by-2008\/"},"modified":"2021-12-30T11:40:36","modified_gmt":"2021-12-30T11:40:36","slug":"i-t-security-a-people-problem-workforce-to-nearly-double-by-2008","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/30\/i-t-security-a-people-problem-workforce-to-nearly-double-by-2008\/","title":{"rendered":"I.T. Security a People Problem; Workforce To Nearly Double by 2008"},"content":{"rendered":"<p>The protection of data is going to require more manpower, according to a study conducted by research firm IDC together with the International Information Systems Security Certification Consortium.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The research shows that enterprises worldwide will hire about 800,000 more security professionals by 2008.  The research leaves no doubt that human beings will be needed to thwart the threats caused by other human beings.<\/p>\n<p>Among other findings of the IDC\/ISC research: The compounded annual growth rate of hires worldwide between 2003 and 2008 should be 13.7 percent.<\/p>\n<p>&#8220;There are still many organizations around the globe that haven&#8217;t fully addressed their security issues,&#8221; Carey noted.  Some of the most insidious damage to data is accomplished as inside jobs.  <\/p>\n<p>When viewed from a macro level the striking characteristic of threats is change.  &#8220;It&#8217;s a continuously dynamic environment,&#8221; Carey added.<\/p>\n<p>The vulnerabilities of networks and data centers evolve, just as the methods employed by hackers do.<\/p>\n<p>The key to a successful security strategy is involvement.<\/p>\n<p>It appears the enterprises that remain the free of viruses, break-ins and thefts will be those that refrain from throwing money or software at problems, and instead bring people in to respond to the shifting sands of I.T. hazards<\/p>\n<p>http:\/\/www.cio-today.com\/story.xhtml?story_title=I_T__Security_a_People_Problem__Workforce_To_Nearly_Double_by_____&#038;story_id=28254<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2078","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2078"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2078\/revisions"}],"predecessor-version":[{"id":4565,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2078\/revisions\/4565"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}