Demand for cryptocurrency skills surges, but lacks cyber security expertise

Trend Micro warns the lack of cybersecurity skills in cryptocurrency environments could be dangerous for firms

Skills gap

Demand for skills in cryptocurrencies is growing, but security expertise isn't keeping up, leaving businesses open to attack, a report by Trend Micro has revealed.

In the cryptocurrency world, businesses are seeking employees with a knowledge of blockchain, finance, Java, bitcoin and Javascript, but crucially missing from the list is cybersecurity knowledge.

"Cryptocurrency has exploded as a popular way to support digital transactions, and these figures show that organisations are seeking more skills to take advantage of lower fees and instant payments," said Bharat Mistry, principal security strategist, Trend Micro.

Advertisement - Article continues below

Although it's great that businesses are adapting to changing tech trends, Mistley warned that not having sufficient cybersecurity skills could be very dangerous.

"We all know that where the money goes cybercriminals will follow. They will target business' crypto exchanges by whatever means possible to pilfer their funds or steal their personal information. Any individuals involved in running or using these systems need to be highly alert to the growing cyber risks."

And on the reverse, cryptocurrency is very low on the list of job openings for security professionals. Only 8% of the available security-focused roles mention candidates need a knowledge or cryptocurrencies.

"Cybercriminals are using a variety of tools and techniques to install miners, including server exploits, a PHP vulnerability, malvertisements and other forms of malware," Bharat continued.

Advertisement
Advertisement - Article continues below

"If unauthorised cryptocurrency miners make their way into the network, this is a red flag not only for the affected individual user device, but for overall network security. There needs to be a coordinated approach across the organisation, with clear roles and responsibilities to keep cryptocurrency secure."

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/strategy/29089/six-benefits-of-hot-desking
Business strategy

The benefits of hot desking

28 May 2020
Visit/business-strategy/31780/the-it-pro-panel
Business strategy

The IT Pro Panel

25 May 2020
Visit/machine-learning/31708/what-are-the-pros-and-cons-of-ai
machine learning

What are the pros and cons of AI?

21 Apr 2020
Visit/technology/30736/what-is-ethical-ai
Technology

What is ethical AI?

8 Apr 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020
Visit/security/vulnerability/356295/microsoft-patches-high-risk-flaws-that-can-be-exploited-with-a
vulnerability

Microsoft releases urgent patch for high-risk Windows 10 flaws

1 Jul 2020