January 25, 2023 By Jennifer Gregory 2 min read

For many organizations and the cybersecurity industry as a whole, improving retention and reducing the skills gap is a top priority. Mimecast’s The State of Ransomware Readiness 2022: Reducing the Personal and Business Cost points to another growing concern — burnout that leads to attrition.

Without skilled employees, organizations cannot protect their data and infrastructure from increasing cybersecurity attacks. According to Mimecast’s report, 77% of cybersecurity leaders say the number of cyberattacks against their company has increased or stayed the same since last year. Additionally, 36% of organizations report a loss in revenue due to ransomware attacks in the past 12 months.

Considering the growing need for skilled cybersecurity workers, what can organizations do to combat burnout and prevent attrition?

Attacks negatively affect cybersecurity professionals’ mental health

The increased and seemingly constant cybersecurity threats take a personal toll on cybersecurity professionals. The majority (57%) would feel very personally responsible in the event of a ransomware attack. While this statistic has fallen from 71% in 2021 due to the higher number of threats, cybersecurity professionals still take home significant stress from their jobs —  especially those who hold themselves responsible.

After a ransomware attack, organizations often see an immediate effect on their cybersecurity team. Leaders on one-third of teams report a higher number of absences due to burnout in the months after an attack. Unsurprisingly, the stress affects employees, with 54% reporting a negative impact on mental health. Additionally, 56% say that their role becomes more stressful each year.

Burnout affects recruiting and retention

Because of the stress and burnout associated with working in cybersecurity, organizations are now struggling to retain the experienced professionals needed to protect them from future attacks. The report found that a third of cybersecurity decision-makers are thinking of leaving their roles in the next two years due to stress or burnout. Additionally, 34% of leaders reported struggling with recruiting essential IT staff after an attack.

However, organizations can help reduce burnout of their cybersecurity teams. Here are a few ways:

  • Offer flexible work arrangements to let employees find the best work/life balance for their situation. Include the option for remote and hybrid work when possible.
  • Provide training opportunities to help employees grow their careers and skill sets.
  • Create career paths to allow employees experiencing burnout to find another role in the company. Regularly discuss those opportunities to ensure employees are aware of all their options.
  • Offer employees extra time off following attacks that increase stress and overtime.

Cybersecurity is stressful. But organizations that do not work to reduce burnout among employees are likely to be less prepared for future attacks. By working proactively in partnership with employees, leaders can recognize signs of burnout and take action to reduce stress.

More from News

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally. The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets. Who is exploiting the NGFW zero-day? As of now, little is known about the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today