October is National Cyber Security Awareness Month (NCSAM) in the U.S., and IBM isn’t just a corporate champion of the annual event, but also a strong believer in the community forum of threat intelligence sharing as a means of security awareness. The Internet is a big place, and it is our shared responsibility to keep it safe for all users.

Today’s Cybersecurity Challenges

Today, 80 percent of cybercrime is committed by organized crime rings — people who work together in offices, with bosses, Monday through Friday. They buy and sell attack platforms, use analytics to target their attacks and collaborate with one another on best practices. All told, cybercriminals profited nearly $500 billion in the last year.

And with growing digital trends like mobile, cloud and the Internet of Things (IoT), there are simply more potential weaknesses for cybercriminals to exploit. Organizations need to stay vigilant with new threats constantly being released, and sharing collective knowledge with others is a great place to start.

Planning for the Future

As the avenues and methods that cybercriminals use grow, the number of professionals needed to counter the attacks is shrinking. One study by Frost and Sullivan, “The 2015 Global Information Security Workforce Study,” predicted a shortfall of 1.5 million trained cybersecurity professionals in the workforce by 2020.

But there are ways this skills gap can be closed. Two important initiatives will require:

  1. Organizations to attract a more diverse workforce; and
  2. Universities and educators to equip their students with modern training and tools.

With these actions, organizations can expand the potential pool of qualified hires and make sure these individuals are being trained in areas that need attention. Collaboration and ongoing security education must evolve and keep up with the ever-accelerating pace of cybercriminals.

How Everyone Can Participate in National Cyber Security Awareness Month

The National Cyber Security Alliance sponsors two websites, each with its own security awareness goals. The first, StaySafeOnline, provides educational content and communities for securing digital assets and cultivating a safer connected society. Then there’s Stop.Think.Connect., which has a partnership with the Anti-Phishing Working Group and helps users understand Internet risks and the importance of practicing safe online habits.

Businesses can share these tips and resources with their employees, who in turn can ensure they have higher levels of security awareness. That should lead to making better choices with regard to their online habits and even individual safety. In the end, we all need to understand that cybersecurity is our shared responsibility.

More from Risk Management

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today