Demand for cryptocurrency skills surges, but lacks cyber security expertise

Trend Micro warns the lack of cybersecurity skills in cryptocurrency environments could be dangerous for firms

Skills gap

Demand for skills in cryptocurrencies is growing, but security expertise isn't keeping up, leaving businesses open to attack, a report by Trend Micro has revealed.

In the cryptocurrency world, businesses are seeking employees with a knowledge of blockchain, finance, Java, bitcoin and Javascript, but crucially missing from the list is cybersecurity knowledge.

"Cryptocurrency has exploded as a popular way to support digital transactions, and these figures show that organisations are seeking more skills to take advantage of lower fees and instant payments," said Bharat Mistry, principal security strategist, Trend Micro.

Although it's great that businesses are adapting to changing tech trends, Mistley warned that not having sufficient cybersecurity skills could be very dangerous.

"We all know that where the money goes cybercriminals will follow. They will target business' crypto exchanges by whatever means possible to pilfer their funds or steal their personal information. Any individuals involved in running or using these systems need to be highly alert to the growing cyber risks."

And on the reverse, cryptocurrency is very low on the list of job openings for security professionals. Only 8% of the available security-focused roles mention candidates need a knowledge or cryptocurrencies.

"Cybercriminals are using a variety of tools and techniques to install miners, including server exploits, a PHP vulnerability, malvertisements and other forms of malware," Bharat continued.

"If unauthorised cryptocurrency miners make their way into the network, this is a red flag not only for the affected individual user device, but for overall network security. There needs to be a coordinated approach across the organisation, with clear roles and responsibilities to keep cryptocurrency secure."

Featured Resources

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Evaluate your order-to-cash process

15 recommended metrics to benchmark your O2C operations

Download now

AI 360: Hold, fold, or double down?

How AI can benefit your business

Download now

Getting started with Azure Red Hat OpenShift

A developer’s guide to improving application building and deployment capabilities

Download now

Recommended

The IT Pro Panel
Business strategy

The IT Pro Panel

25 Jan 2021
What is ethical AI?
artificial intelligence (AI)

What is ethical AI?

21 Jan 2021
The best big data technologies
big data

The best big data technologies

13 Jan 2021
How to protect against a DDoS attack
distributed denial of service (DDOS)

How to protect against a DDoS attack

23 Dec 2020

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
WhatsApp could face €50 million GDPR fine
General Data Protection Regulation (GDPR)

WhatsApp could face €50 million GDPR fine

25 Jan 2021
Trump pardons convicted ex-Google engineer Levandowski
intellectual property

Trump pardons convicted ex-Google engineer Levandowski

20 Jan 2021