The Need for Cybersecurity Education

Chad Lynch, Chief Information Officer (CIO) of Metropolitan Community College And Gary Sparks, Director of Cybersecurity program at Metropolitan Community College

Chad Lynch, Chief Information Officer (CIO) of Metropolitan Community College

People are often only a click away from their personal information. Critical information can be stored on their computers, tablets and the smartphones in their pockets.

With a rise in the amount of personal information people have on their devices, what follows is a rise of the wrong people wanting to get their hands on that information.

“Cybersecurity is a national security issue and an economic security issue,” says Gary Sparks, director of the Cybersecurity program at Metropolitan Community College in Omaha, Nebraska.

While many automatically think of the term “hacker” to describe someone trying to pry at that sensitive data, Sparks says that isn’t actually the best word, and prefers the term “attacker.”

“The term ‘hacker’ a lot of times is misused because everyone who works in information technology is kind of a hacker,” he explains. “They are trying to get under the belly of the operating system and tweak the systems out.”

Attackers are trying to find information for blackmail or fraud purposes most commonly, Sparks says.

"In cybersecurity, it’s important to notice things out of the ordinary. Integrity is a huge piece of it; too, because of the access that person has to very sensitive data"

“They are trying to get people’s money,” he explains. “Or they are trying to disrupt an operation. We are seeing a large scope of that. A nation state may target a city. If they can get access to their power grid, then at that point, they can shut down the city’s power system very quickly.”

Sparks also says that “fraud season” is the time over the holidays when attackers ramp up efforts to steal credit card numbers, personal information and more.

Chad Lynch, chief information security officer at MCC, says attackers are often trying to trick people by impersonating a company or coworker to get important information.

“With the advances in technology and the growth of personal computers, laptops, smartphones, hackers have learned to attack these personal devices. It is critical to stay informed and ahead of bad actors,” he says. “Cybersecurity training is very important to improve security awareness, data protection and verification if somebody is requesting your financial records, asking to transfer money, or to reconfirm your login and password.”

Gary Sparks, Director of Cybersecurity program at Metropolitan Community College

With attackers working any way they can to get valuable information, the need for cybersecurity jobs has grown exponentially. In 2019, there were more than 270,000 cybersecurity job openings, according to cyberseek.org, but only 112,000 were filled.

With so many jobs readily available, Sparks says cybersecurity education is extremely important now more than ever, as it can touch on multiple departments within a business.

“Cybersecurity is really everybody’s business,” Sparks says.“Some of what students learn in training programs is concept and application. They also learn how to put their mind into the mind of an attacker to see how they work. They learn to notice physical security issues or what information a company may have on their website that can be used in an attack.”

Cybersecurity education can lead to many different careers, Sparks says.

“When cybersecurity students complete their degree and look for just cybersecurity jobs, they may struggle. But if they look for something like a network administrator, they have taken a lot of those classes too. If they get hired and tell them they also specialize in cybersecurity, that is going to add value to the company. They not only have an administrator, they have someone who understands those security aspects and why it’s important.”

With all the job options available, Lynch says there are cybersecurity jobs for people with different interests and specializations.

“This new cybersecurity job market will be growing for people with experience not just in coding, but understanding human factors, financial data, cloud technology, artificial intelligence, gamification, and a layered defense strategy,” Lynch says.

For those considering a career in cybersecurity and thinking of enrolling in a program or taking classes, Sparks says they should be keen observers and trustworthy.

“In cybersecurity, it’s important to notice things out of the ordinary. Integrity is a huge piece of it, too, because of the access that person has to very sensitive data,” he explains. “The knowledge they have could do a lot of damage if it’s wrongfully used. They have to think about that.”

Lynch says even people not in the cybersecurity job field should be aware of things out of the ordinary and cautious when putting personal information on the internet, such as online banking or shopping.

“People should be aware of requests for payment or setting automatic bank withdrawals that you are unaware of. Always call the sender to verify the transaction if in doubt,” he says. “ Be vigilant and if something looks suspicious in an email or a voicemail asking for your information or to click on unknown links, call the sender or let your work’s IT security office be aware clicking on a site and enacting a virus or responding to a phishing email.”

Check out: Top Security Assessment Solution Companies

Weekly Brief

Top 10 Security Solution Companies - 2018

Read Also

The Potential of Virtual Assistants in Education

The Potential of Virtual Assistants in Education

Giovanni Duarte, Director, Academic Strategy & Innovation, Chamberlain University
Online Learning During Covid-19: Empowering Educators and Engaging Students

Online Learning During Covid-19: Empowering Educators and Engaging Students

Cheng Jack Kie, Deputy Dean (Academic & Student Affairs), Faculty of Industrial Management, Universiti Malaysia Pahang
A Time for Rethinking our Educational Experiences

A Time for Rethinking our Educational Experiences

Jonathan Hofgartner, Director—Technology, Learning Resources and Progression Skills, Weston College, Institute of Further and Higher Education, Weston-super-Mare, United Kingdom
A Virtual Classroom Aproach

A Virtual Classroom Aproach

Anne-Marie Chase, Head of Curriculum, Monash College
Considering the Real Value of Artificial Intelligence In Higher Education

Considering the Real Value of Artificial Intelligence In Higher Education

Elon Turner, Director of Infrastructure & Telecommunication Services, University of Arkansas
How advancing digital learning resources can drive student engagement in higher education

How advancing digital learning resources can drive student engagement in higher education

Adrian Gallagher, Associate University Librarian, Learning Resources, Technology and Infrastructure, Victoria University