• Contact Sales
  • Resellers
  • Support
Yubico Header Text LogoYubico Header Text Logo
Why Yubicoexpand_more
Why Yubico
  • Enterprises
  • SMBs
  • Individuals
  • Developers
  • Careers
  • Partner programs
  • Affiliate program
  • Contact Sales
  • Events
  • Press room
  • Yubico Blog
  • Yubico Executive Connect
  • About us
  • The team
  • Investors
  • Innovation history
  • Secure it Forward
Man holding YubiKey
Easy-to-use, secure authentication

With YubiKey there’s no tradeoff between great security and usability

Why YubiKey
  • cybersecurity
  • security
Google headquarters
Proven at scale at Google

Google defends against account takeovers and reduces IT costs

Google Case Study
  • cybersecurity
  • security
Hand holding YubiKey behind Apple iPhone
Protecting vulnerable organizations

Secure it Forward: One YubiKey donated for every 20 sold

Learn about Secure it Forward
  • cybersecurity
  • security
Productsexpand_more
All products
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • YubiEnterprise Subscription
  • YubiEnterprise Delivery
  • Yubico Authenticator
  • Computer login tools
  • Software Development Toolkits
  • YubiCloud
  • Using YubiKey is easy
  • Find the right YubiKey
  • Works with YubiKey
  • Compare YubiKeys
Woman holding YubiKey 5ci
One key for hundreds of apps and services

YubiKey works out-of-the-box and has no client software or battery

Yubico protects you
  • cybersecurity
  • security
See YubiKeys as a Service
YubiEnterprise Subscription delivers scale and savings

Gain a future-proofed solution and faster MFA rollouts

See YubiKeys as a Service
  • cybersecurity
  • security
Solutionsexpand_more
Solutions overview
  • Zero Trust
  • Executive Order OMB M-22-09
  • Phishing-resistant MFA
  • Passwordless
  • Compliance
  • Cyber Insurance
  • Secure supply chain
  • Critical infrastructure
  • Hybrid & remote workers
  • Secure privileged users
  • Mobile restricted environments
  • Call centers
  • Shared workstations
  • Microsoft ecosystem
  • Salesforce workspace
  • IAM solutions
  • AWS environment
  • HYPR experience
Hand holding YubiKey behind Apple iPhone
The Bridge to Passwordless

Begin the journey to make your organization passwordless

Get the white paper
  • cybersecurity
  • security
Lock on a laptop
Accelerate your Zero Trust Strategy

7 best strong authentication practices to jumpstart your Zero Trust program

Get the white paper
  • cybersecurity
  • security
Government building
Federal cybersecurity requirements

See guidance for CIOs and leaders to prepare for the modern cyber threat era

Get the white paper
  • cybersecurity
  • security
Industriesexpand_more
Industries overview
  • High tech
  • Federal government
  • Federal systems integrators
  • State & local government
  • Education
  • Financial services
  • Elections & campaigns
  • Retail & hospitality
  • Telecommunications
  • Healthcare
  • Pharmaceuticals
  • Cryptocurrency
  • Energy & natural resources
  • Manufacturing
man working a manufacturing line
Manufacturing and supply chain security

Authentication best practices for manufacturing using highest-assurance security

Get the white paper
  • cybersecurity
  • security
Person looking at a computer with a government building showing
Phishing-resistant MFA: Fact vs. Fiction

Meet requirements for phishing-resistant MFA in OMB M-22-09 guidelines

Get the white paper
  • cybersecurity
  • security
Remote workers at a wind farm
Secure energy and natural resources from cyber threats

Best practices for phishing-resistant MFA to safeguard your critical infrastructure

Get the white paper
  • cybersecurity
  • security
Resourcesexpand_more
All resources
  • Yubico Blog
  • Cybersecurity glossary
  • Authentication standards
  • Resource library
  • Developer program
  • Product briefs
  • Solution briefs
  • Case studies
  • Get a pilot started
  • White papers and reports
  • Webinars
Laptop with a YubiKey inserted
BeyondTrust: secured with a subscription

A leader in Privileged Access Management simplifies YubiKey deployment

How they optimized ROI
  • cybersecurity
  • security
S&P Global Market Intelligence report: old habits die hard

Only 46% of respondents protect their applications with MFA. How about you?

Read the report
  • cybersecurity
  • security
Considering Passkeys for your Enterprise?

Learn how to avoid the common pitfalls of synced passkeys

Get the Ebook
  • cybersecurity
  • security
Supportexpand_more
Support home
  • Find the right YubiKey
  • Set up your YubiKey
  • Downloads
  • Product documentation
  • Support articles
  • Support Services
  • Professional Services
  • YubiEnterprise Subscription
  • Works with YubiKey Program
  • Buying and shipping information
  • Security advisories
  • Help center
YubiKeys in lots of form factors
How to set up your YubiKey

Follow our guided tutorials to start protecting your favorite services

Set up your YubiKey
  • cybersecurity
  • security
YubiKey on a keychain plugged into a laptop
Find the best YubiKey for your needs

Take the guided quiz and see which YubiKey best fits your or your businesses needs

Take the quiz
  • cybersecurity
  • security
Worker with a calculator and laptop with a spreadsheet
Accelerate your YubiKey deployment

Technical and operational guidance for your YubiKey implementation and rollout

Professional Services
  • cybersecurity
  • security
SubscribeStore
  • Home » Blog » People matter: How to solve security skills shortage challenges

    People matter: How to solve security skills shortage challenges

    Chad Thunberg

    Chad Thunberg

    July 19, 2021
    6 minute read
    Share on FacebookShare on TwitterShare on LinkedInShare via Email

    The skills shortage in the security industry stretches as far back as we can remember having an industry. Everyone knows it’s a challenge with no easy short-term solutions.

    The root of the security skills shortage gap remains murky, and some observers say the pandemic and reallocations of security resources could be widening that gap.

    The recent spate of high-profile breaches and ransomware attacks have made the argument that companies must make security employee recruitment a top priority if they haven’t already. Though there are many good universities graduating skilled job candidates every year, they have not kept up with surging demand. Fortune 1000 companies with deep pockets can use high salaries to attract top-tier talent while everyone else must rely on other differentiators like company mission, people, and location.

    Most companies are in a constant state of playing technical catch-up. For decades they have retained a significant amount of technical debt and manage legacy and fragile systems. The need for competent cyber security professionals grows as technical debt grows and the frequency of incidents increases.

    When I look to attract new talent at Yubico, I ask, “What’s our differentiator? What makes a person want to work here rather than anywhere else?” A candidate should never leave an interview without knowing Yubico’s mission, what makes us different, our philosophy on building a team and why we’re successful. 

    That means that when I talk to a candidate, I want to get a sense of what they want as much as I want to sell them on the Yubico mission. Through the process of asking the right questions, you’re signaling important differentiators to that job candidate.

    Example Questions for Security Industry Specialist Candidates

    • Do you want to have a material impact with the work you do?
    • Is that impact measurable across the security industry? 
    • Do you want your ideas heard and passed on to senior leadership? 
    • Is work-life balance important to you?

    If a prospect answers yes to any of these questions, you’d better be ready with all the concrete reasons why your company will help that person have a measurable impact and still have a personal life. It’s important to outline this “impact trade-off” for those candidates that are early in their career. Would you rather be one of many or do you want to be on a leaner team where you have a real impact on mission-critical initiatives every day?

    Silicon Valley culture often encourages the “turn-and-burn” model, where everyone strives to get to a FANG company, do a grueling tour of duty, and then move on because they feel they’ve burnished their resumes enough to advance somewhere else. But smaller companies can offer something better than that — a place to grow, keep a work-life balance, get promoted, and have a real impact.

    Ultimately, though, employee recruitment is about people and the relationships they have in the workplace. You go to work for a person, not a brand or a company. Most people want to work for a good leader and work with someone whose philosophy aligns with yours. Ideally, you are working for someone who you want to become someday, a true mentor. That may not be possible on every team, but honing mentorship skills is a good goal for managers that can become part of a permanent company culture over time. 

    There are a few best practices I find useful for attracting and retaining the best talent in the security industry. This won’t address the skill shortage in cyber security, but it may give you a better chance of attracting top talent.

    7 Best Practices for Attracting Talent During a Security Skills Shortage

    1. Source candidates from geographic markets that are underserved, and create remote-friendly positions so you can hire all over the world. Look outside traditional tech hubs like Silicon Valley. 
    2. Talk up your company’s outsized impact in the industry, and how an employee can be a bigger fish at a smaller company. Motivated individuals want to know that their ideas could reach the CEO. You want that motivated person!
    3. Don’t bother competing with big tech. Job candidates who already have their sights set on the giants may not be a good fit at a smaller company because they aren’t looking for those kinds of opportunities. Explain to first-job seekers that a job role with generalized duties is one where they can learn more and grow faster than they would as a specialist at a larger company. 
    4. Find people early in their careers, then invest in them. Those people with potential could turn into “A-team players” with time and be more valuable than a candidate who is already highly skilled but will only ever be a “B or C-team player.” 
    5. Sometimes aptitude and attitude traits matter more than specific skills with a set of tools. Skills can be learned on the job. But you want to start with someone who’s highly motivated, passionate, capable, curious, independent and is comfortable with ambiguity.
    6. Internal candidates that are familiar with the mission and team are a great source for new hires. Training and awareness programs can seed interest and passion in employees. Implement education programs with the intent of attracting internal transfers.
    7. High performing teams are diverse teams so interview with an open mind and check your bias. Individuals with different backgrounds and experiences will add fresh perspectives and ideas to the team. Bias about candidates may lead to assumptions about their abilities, passion, or background. Recognition of bias allows us to actively work to address them. You’ll end up with a more diverse and higher performing team with candidates that are a culture add instead of just a culture fit.

    Meet the YubiTeam! At Yubico, we believe in fostering an inclusive, supportive environment that allows our team members to collaborate closely with one another to provide innovative solutions for game-changing internet security. We thrive on curiosity and exploration, both of which are highly encouraged by our leadership team as they are the foundation of our product offerings. Interested in joining the team? Check out our careers page here.

    Share this article:

    Share on FacebookShare on TwitterShare on LinkedInShare via Email

    Recommended Posts

    • Q&A with CEO Mattias Danielsson: Yubico’s next stage of growth as a public company and what investors can expect

      Today marks an exciting, historic day in Yubico’s history: the company is now publicly traded under the ticker symbol YUBICO on Nasdaq First Growth North Market in Stockholm. As the cyber threat landscape continues to evolve rapidly through increasingly sophisticated attacks like phishing, the need for phishing-resistant MFA with the YubiKey are at an all-time […]

      Read more
      • Investors
      • Q&A
      • thought leadership
    • Five foundational cybersecurity controls to mitigate 90% of breaches

      During my 16 years in the cybersecurity industry, and after discussions with numerous CISOs and cyber security experts, they all agree that there are five easy steps all organizations can take to mitigate over 90% of all cyber breaches1.  Just like cars were not initially designed for safety, the internet was not designed for security. […]

      Read more
      • best practice guide
    • Okta + Yubico: Better together

      Modern cybersecurity needs to be phishing-resistant, but it also needs to incorporate a great user experience for employees, IT teams and customers. We know traditional authentication methods are perceived as user-friendly, but they are not secure and vulnerable to most attacks  – in fact, 59% of people still rely on username and password to authenticate […]

      Read more
      • Okta
      • Partner Program
    • Works with YubiKey Spotlight: How Yubico works with industry leaders who share the commitment to strong authentication

      As the cyber threat landscape continues to evolve rapidly in the form of more sophisticated attacks like phishing and ransomware, the need for industry collaborations and partnerships are more critical than ever to help businesses and consumers stay secure online. We first launched the Works with YubiKey (WWYK) program in 2018 with this in mind […]

      Read more
      • Works with YubiKey
      • wwyk
Yubico Text LogoYubico Text Logo
  • RSS
  • Twitter
  • LinkedIn
  • Facebook
  • Instagram
  • YouTube
  • GitHub
  • Product finder quiz
  • Find set-up guides
  • Buy online
  • Contact sales
  • Get Yubico updates
  • Careers
  • Events
  • Press room
  • About us
  • Investors
  • Partner programs
  • Affiliate program
  • YubiKey 5 Series
  • YubiKey 5 FIPS Series
  • YubiKey Bio Series
  • Security Key Series
  • YubiKey 5 CSPN Series
  • YubiHSM 2 & YubiHSM 2 FIPS
  • Yubico Authenticator
  • Zero Trust
  • Phishing-resistant MFA
  • Passwordless
  • Cyber insurance
  • More solutions
  • Industries overview
  • Yubico blog
  • Resource library
  • Cybersecurity glossary
  • Authentication standards
  • Developer program
  • Works with YubiKey
  • Help center
  • Downloads
  • Product documentation
  • Support Services
  • Professional Services
  • Contact support
Yubico © 2023 All Rights Reserved.
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Patents
  • Terms of use
  • Trust