{"id":65131,"date":"2023-03-27T16:38:13","date_gmt":"2023-03-27T08:38:13","guid":{"rendered":"https:\/\/version-2.com\/?p=65131"},"modified":"2024-09-13T16:31:24","modified_gmt":"2024-09-13T08:31:24","slug":"is-a-scarcity-of-security-experts-a-growing-global-data-risk","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2023\/03\/is-a-scarcity-of-security-experts-a-growing-global-data-risk\/","title":{"rendered":"Is a scarcity of security experts a growing global data risk?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"65131\" class=\"elementor elementor-65131\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-27d859d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"27d859d6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c076945&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b9b73be\" data-id=\"3b9b73be\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75c3e851 elementor-widget elementor-widget-text-editor\" data-id=\"75c3e851\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/images.prismic.io\/keepit\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900\" width=\"900\" height=\"900\" \/><\/p><section><h4><b>And what you can do to protect your critical SaaS data\u00a0\u00a0<\/b><\/h4><p>Cybersecurity is a critical concern for all organizations. The rapid growth of technology and the increasing sophistication of cyberthreats have made it essential to have experts in the field of cybersecurity to protect against the potential risks. Add on to this the ever-expanding compliance demands from legislation such as the <a href=\"https:\/\/www.europarl.europa.eu\/thinktank\/en\/document\/EPRS_BRI(2021)689333\" target=\"_blank\" rel=\"noopener\">NIS2 Directive<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/California_Consumer_Privacy_Act\" target=\"_blank\" rel=\"noopener\">CCPA<\/a>, it becomes even more challenging to navigate.<\/p><p>The demand for cybersecurity and IT job roles is increasing at a pace that outstrips companies&#8217; ability to recruit. Given that cybersecurity is a vital aspect of any enterprise that handles sensitive and confidential data, it is crucial to locate and retain specialized talent in this field, but how big is the problem?<\/p><p>A recent <a href=\"https:\/\/www.weforum.org\/reports\/global-risks-report-2023\" target=\"_blank\" rel=\"noopener\">report by the World Economic Forum<\/a> (WEF) has highlighted a significant shortage of security experts worldwide. They believe this shortage contributes to a growing list of global risks, including cyberattacks, data breaches, and other forms of cybercrime.<\/p><\/section><section><h4><b>The Importance of Data Protection and Management<\/b><\/h4><p><b>\u00a0<\/b><\/p><p>With the rise in cybersecurity threats, it is essential for businesses to prioritize data protection and management. This includes securing data, preventing data loss, and complying with regulations and standards. Data protection and management solutions also help businesses maintain their reputation and customer trust, as well as improve their operational efficiency.<\/p><p>According to WEF, the rapid pace of technological change has made it challenging for security experts to keep up with the latest developments, leading to this shortage of experienced professionals. WEF shares that this shortage of security experts is a major concern for organizations as it makes them vulnerable to a range of cyber threats. Cyber criminals are becoming increasingly sophisticated, and organizations need to be equipped with the necessary tools and expertise to protect themselves.<\/p><\/section><section><h4><b>What is the cybercrime situation now?<\/b><\/h4><p>The number of incidences and the costs associated with cybercrime are on a steep rise \u2013 WEF projects $10.5 trillion by 2025. Cybercrime is big business: The Conti ransomware group, according to <a href=\"https:\/\/www.reuters.com\/world\/us-offers-15-mln-reward-information-conti-ransomware-group-2022-05-06\/\" target=\"_blank\" rel=\"noopener\">Reuters,<\/a> has targeted over 1,000 victims, garnering more than $150 million in the process. Their prolific success led to the U.S. offering a $15 million reward for information.<\/p><p>Cybergangs are organized and functioning like legitimate companies \u2013 the Wired\u2019s article \u201c<a href=\"https:\/\/www.wired.co.uk\/article\/conti-leaks-ransomware-work-life%22%20\/l%20%22intcid=_wired-uk-right-rail_05a9eccf-45d5-4dce-b5fb-37ab6742d1b9_popular4-1\" target=\"_blank\" rel=\"noopener\">The Workaday life of the World\u2019s Most Dangerous Ransomware Gang<\/a>\u201d tells how the Conti ransomware gang has a CEO and even an HR department. These groups sure aren\u2019t matching the image of the hacker in a mask, in a dark room, working on a laptop computer: They\u2019re sophisticated, skilled, and clearly very successful by these dollar figures above.<\/p><p>In the face of this, companies are scrambling to protect themselves and their data, with more and more businesses understanding the risks and therefore are placing data security high on their agenda (and bolstering their security with bigger budgets). And they had better hurry: The threat environment is likely to only get worse. The World Economic Forum (WEF) <a href=\"https:\/\/www.weforum.org\/reports\/global-risks-report-2023\" target=\"_blank\" rel=\"noopener\">Global Risks Report 2023<\/a> explores some of the most serious risks coming over the next two and 10 years.<\/p><\/section><section><\/section><section class=\"inline\"><div class=\"img lazy inline\" data-src=\"https:\/\/images.prismic.io\/keepit\/2bf0c7ea-04df-4bf9-a59c-69e9cc1113fe_55_ScarcitySecurityExperts_Invisual3.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=1200&amp;h=1200|https:\/\/images.prismic.io\/keepit\/2bf0c7ea-04df-4bf9-a59c-69e9cc1113fe_55_ScarcitySecurityExperts_Invisual3.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=640&amp;h=640\" data-rel=\"1200,1200\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.prismic.io\/keepit\/2bf0c7ea-04df-4bf9-a59c-69e9cc1113fe_55_ScarcitySecurityExperts_Invisual3.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=1200&amp;h=1200\" width=\"1200\" height=\"1200\" \/><\/div><div data-src=\"https:\/\/images.prismic.io\/keepit\/2bf0c7ea-04df-4bf9-a59c-69e9cc1113fe_55_ScarcitySecurityExperts_Invisual3.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=1200&amp;h=1200|https:\/\/images.prismic.io\/keepit\/2bf0c7ea-04df-4bf9-a59c-69e9cc1113fe_55_ScarcitySecurityExperts_Invisual3.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=640&amp;h=640\" data-rel=\"1200,1200\"><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.prismic.io\/keepit\/5e2d5c2e-6693-496f-83e5-9b04f9e61afd_55_ScarcitySecurityExperts_Invisual4.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=1200&amp;h=1200\" width=\"1200\" height=\"1200\" \/><\/div><\/section><section class=\"inline\"><div class=\"img lazy inline\" data-src=\"https:\/\/images.prismic.io\/keepit\/5e2d5c2e-6693-496f-83e5-9b04f9e61afd_55_ScarcitySecurityExperts_Invisual4.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=1200&amp;h=1200|https:\/\/images.prismic.io\/keepit\/5e2d5c2e-6693-496f-83e5-9b04f9e61afd_55_ScarcitySecurityExperts_Invisual4.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=640&amp;h=640\" data-rel=\"1200,1200\">\u00a0<\/div><\/section><section><h4><b>What&#8217;s the expected global risk from cybercrime and cyber insecurity?<\/b><\/h4><p>Of the global risks expected to have the greatest impact over the next two and the next 10 years, \u201cwidespread cybercrime and cyber insecurity\u201d comes in at number eight for both timespans.<\/p><p>In the second visual, \u201ccybercrime and cyber insecurity\u201d moves all the way up to the fourth position for businesses, highlighting the heightened importance of data protection and security to companies. It\u2019s worth mentioning that in all of these, it\u2019s the only result within the Technological category, and perhaps the one with the most agency: Companies taking action and intervening with a data protection plan can mitigate their exposure. (More on this below.)<\/p><\/section><section><h4>Increased State Intervention: Is data backup now akin to compulsory auto insurance?<b>\u00a0<\/b><\/h4><p>Compliance becomes an ever increasingly important part of data protection. The trend already appears to be solidified with the European Parliament recently putting forth legislation via the NIS2 Directive which adds on increased responsibility, heightened fines toward the company and C-suite of which the latter may be subject to suspensions for failures to comply. Read blog post about the <a href=\"https:\/\/www.keepit.com\/blog\/what-is-nis2-directive\/\" target=\"_blank\" rel=\"noopener\">NIS2 Directive here<\/a>.<\/p><\/section><section><h4>\u201cRisks from Cybersecurity Will Remain a Constant Concern\u201d<\/h4><p>And here we get to the crux of the issue: According to the WEF, \u201cThese problems are compounded by a scarcity of security experts.\u201d: A challenging situation made more difficult. According to <a href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\">Cybersecurity Ventures<\/a>, there\u2019s a total of 3.5 million unfilled cybersecurity jobs.<\/p><p>How are companies expected to combat the increasing risk from cybercrimes and the increased demands from state and government while at the same time there are reports of an all-too-small pool of security candidates to hire from? One SaaS data protection provider effectively addresses these concerns by providing a service that follows data protection best practices.<\/p><\/section><section><h4><b>How Keepit can help businesses compensate for the shortage of security experts<\/b><\/h4><p>Keepit is a software-as-a-service company that provides dedicated data protection for companies relying on cloud SaaS data. By increasing cybersecurity and resiliency and increasing the impact of a company\u2019s existing workforce (all with an impressive ROI: <a href=\"https:\/\/www.keepit.com\/blog\/the-roi-of-cloud-backup\/\" target=\"_blank\" rel=\"noopener\">Read the blog post here<\/a>), Keepit supports business growth into the future by ensuring compliance and data protection. <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Cybersecurity-skills-gap-Why-it-exists-and-how-to-address-it\" target=\"_blank\" rel=\"noopener\">TechTarget<\/a> suggests enterprises should \u201csupport [their] existing talent\u201d as a means of addressing the cybersecurity skills gap, specifically to \u201cautomate routine tasks.\u201d<\/p><p>Keepit provides an intuitive interface and simplified processes, an easy-to-use data protection solution that can enable personnel with less cybersecurity expertise to manage and maintain the system effectively. This can save companies the cost and time of hiring and training specialized cybersecurity experts while increasing cybersecurity posture.<\/p><\/section><section class=\"inlinequote\"><q>We have been able to split the responsibilities for data protection among different teams. This setup allows teams to work efficiently and independently.<\/q><p class=\"small\">Michael Bojko, System Engineer at Porsche Informatik<\/p><\/section><section>By providing an easy-to-use cloud SaaS data backup and data management solution across a suite of SaaS applications including Microsoft 365, Salesforce, Google Workspace (to name but a few), Keepit enables companies to continue into the future with confidence. Businesses can even get Azure AD data protection for free with the Identity Basic offering from Keepit. Read about <a href=\"https:\/\/www.keepit.com\/services\/backup-azure-ad\/\" target=\"_blank\" rel=\"noopener\">backup and recovery for Azure Active Directory here<\/a>.<p>Compensate for the shortage of security experts by having an automated data protection and management system in place. This reduces the need for manual intervention, which can be time-consuming and requires specialized skills.<\/p><\/section><section class=\"inlinequote\"><q>Our everyday is busy enough with keeping everything up and running. Keepit&#8217;s solution does its job in the background so that we can focus on other tasks.<\/q><p class=\"small\">Ken Schirrmacher, Sr. Director of IT\/Interim CIO at Park &#8216;N Fly<\/p><\/section><section><h4>Where should you start? Learn more about data management and protection<\/h4><p>Keepit enables companies to have peace of mind, regardless of any new legislation or cybercrime events.<\/p><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bf1d6d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bf1d6d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9abbb0a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-673b1d2\" data-id=\"673b1d2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7128071 elementor-widget elementor-widget-shortcode\" data-id=\"7128071\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"50842\" class=\"elementor elementor-50842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1043a3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c1043a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c911d7d\" data-id=\"c911d7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-026fa41 elementor-widget elementor-widget-text-editor\" data-id=\"026fa41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Keepit<\/strong><br \/>At Keepit, we believe in a digital future where all software is delivered as a service. Keepit\u2019s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>And what you can do to protect your critical SaaS data\u00a0 [&hellip;]<\/p>","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[853,1075,61],"tags":[854,1076],"class_list":["post-65131","post","type-post","status-publish","format-standard","hentry","category-keepit","category-year2023","category-press-release","tag-keepit","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is a scarcity of security experts a growing global data risk? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is a scarcity of security experts a growing global data risk? - Version 2\" \/>\n<meta property=\"og:description\" content=\"And what you can do to protect your critical SaaS data\u00a0 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-27T08:38:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.prismic.io\/keepit\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/is-a-scarcity-of-security-experts-a-growing-global-data-risk\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"Is a scarcity of security experts a growing global data risk?\",\"datePublished\":\"2023-03-27T08:38:13+00:00\",\"dateModified\":\"2024-09-13T08:31:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/is-a-scarcity-of-security-experts-a-growing-global-data-risk\\\/\"},\"wordCount\":1150,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900\",\"keywords\":[\"Keepit\",\"2023\"],\"articleSection\":[\"Keepit\",\"2023\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/03\\\/is-a-scarcity-of-security-experts-a-growing-global-data-risk\\\/\",\"url\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/\",\"name\":\"Is a scarcity of security experts a growing global data risk? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900\",\"datePublished\":\"2023-03-27T08:38:13+00:00\",\"dateModified\":\"2024-09-13T08:31:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900\",\"contentUrl\":\"https:\\\/\\\/images.prismic.io\\\/keepit\\\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/scarcity-of-cybersecurity-experts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is a scarcity of security experts a growing global data risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is a scarcity of security experts a growing global data risk? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/","og_locale":"en_US","og_type":"article","og_title":"Is a scarcity of security experts a growing global data risk? - Version 2","og_description":"And what you can do to protect your critical SaaS data\u00a0 [&hellip;]","og_url":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/","og_site_name":"Version 2","article_published_time":"2023-03-27T08:38:13+00:00","article_modified_time":"2024-09-13T08:31:24+00:00","og_image":[{"url":"https:\/\/images.prismic.io\/keepit\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"versionpan","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/03\/is-a-scarcity-of-security-experts-a-growing-global-data-risk\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"Is a scarcity of security experts a growing global data risk?","datePublished":"2023-03-27T08:38:13+00:00","dateModified":"2024-09-13T08:31:24+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/03\/is-a-scarcity-of-security-experts-a-growing-global-data-risk\/"},"wordCount":1150,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keepit\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900","keywords":["Keepit","2023"],"articleSection":["Keepit","2023","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/03\/is-a-scarcity-of-security-experts-a-growing-global-data-risk\/","url":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/","name":"Is a scarcity of security experts a growing global data risk? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/#primaryimage"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keepit\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900","datePublished":"2023-03-27T08:38:13+00:00","dateModified":"2024-09-13T08:31:24+00:00","breadcrumb":{"@id":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/#primaryimage","url":"https:\/\/images.prismic.io\/keepit\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900","contentUrl":"https:\/\/images.prismic.io\/keepit\/3db23489-229e-40f1-8641-935ce5c0539e_55_ScarcitySecurityExperts.png?auto=compress,format&amp;rect=0,0,1200,1200&amp;w=900&amp;h=900"},{"@type":"BreadcrumbList","@id":"https:\/\/www.keepit.com\/blog\/scarcity-of-cybersecurity-experts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Is a scarcity of security experts a growing global data risk?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/en\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-gWv","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/65131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=65131"}],"version-history":[{"count":25,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/65131\/revisions"}],"predecessor-version":[{"id":66919,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/65131\/revisions\/66919"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=65131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=65131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=65131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}