Banner Default Image

Trend Micro research shows soar in demand for cryptocurrency skills

over 5 years ago by Lucy Cinder

Trend Micro research shows soar in demand for cryptocurrency skills

Cyber Security

Trend Micro Incorporated, a global leader in cybersecurity solutions, has identified that UK demand for cryptocurrency skills has jumped by 1130% in the past two years. However, Trend Micro’s analysis of ITJobsWatch data also found that these positions are not being filled by candidates with cybersecurity expertise.

The data revealed a disconnect between cryptocurrency and cybersecurity professionals, with neither group taking clear ownership for securing digital transactions. While the list of the top 30 skills most commonly associated with cryptocurrency job roles is led by Blockchain (73%), finance (50%), Java (46%), Bitcoin (31%) and Javascript (28%), cybersecurity does not feature.

Cryptocurrency is similarly low on the list of priorities for cybersecurity professionals. While GDPR has broken into the list of the top 30 skills most commonly associated with cybersecurity job roles (8%), cryptocurrency does not feature.

“Cryptocurrency has exploded as a popular way to support digital transactions and these figures show that organisations are seeking more skills to take advantage of lower fees and instant payments,” said Bharat Mistry, Principal Security Strategist, Trend Micro.

“But we all know that where the money goes cybercriminals will follow. They will target business’ cryptoexchanges by whatever means possible to pilfer their funds or steal their personal information. Any individuals involved in running or using these systems need to be highly alert to the growing cyber-risks.”

Lack of ownership leaving cryptocurrency exposed

This gap in ownership could leave cryptoexchanges dangerously exposed. In fact, Trend Micro’s Mid Year Security Roundup showed that cryptocurrency mining attacks more than doubled, with the first half of 2018 seeing a 141% increase in cryptocurrency mining detections compared to the previous half year.

“Cybercriminals are using a variety of tools and techniques to install miners, including server exploits, a PHP vulnerability, malvertisements and other forms of malware,” Bharat continued. “If unauthorised cryptocurrency miners make their way into the network, this is a red flag not only for the affected individual user device, but for overall network security. There needs to be a coordinated approach across the organisation, with clear roles and responsibilities to keep cryptocurrency secure.”

Source intelligentcio

Industry: Cyber Security News

Banner Default Image

Latest Jobs