Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

Network security implications of the Great Resignation

By Tracy Collins
Man with suitcase walking toward sunrise

Image via Unsplash

August 13, 2024

Despite the joy younger generations derive from poking fun at the older cohorts of the population, the inevitable retirement of these veteran professionals — particularly in technical roles like network engineers, IT, cybersecurity, etc. — will create serious security implications.

A 2023 study of this impending wave of retirements (aptly dubbed the Great Resignation) surveyed CIOs and network engineers in multiple Western countries, discovering that 86% of US-based CIOs expect that at least 25% of their network engineers will retire in the next five years. 

The loss of these experienced individuals will compromise an organization’s ability to adequately manage networks, highlighting the need for greater network resilience and process automation. 

Why shorthanded network teams can be a security risk  

Experienced network professionals, due to their proximity and understanding of the network’s potential weaknesses, are the most qualified to optimize uptime and minimize downtime. However, with these network engineers retiring in droves, 95% of CIOs report that this shortfall has negatively affected their remaining people’s ability to manage networks. In addition to improper setups and other inefficiencies, a shortage of human oversight can make networks more susceptible to cybercriminal exploitation. 

If cybercriminals successfully infiltrate a business environment, there could be network outages. During cyberattack-induced network downtime, employees will be unable to access critical services and applications, nor will they be able to connect with each other and their customers. Every second that diminished networking teams struggle to restore operations is lost revenue and void productivity, not to mention degraded customer and partner relations as well as employee burnout and turnover.  

Safeguarding network security with out-of-band management

Businesses must do what they can to assist their remaining network personnel. One method is implementing solutions like out-of-band (OOB) management to help bolster network resilience. OOB management provides a secure, remote connection to IT network environments, allowing engineers to manage and remediate network assets from any location. Specifically, network engineers can use serial console servers to open up an alternative path through a separate management plane, enabling them to access physical and virtually connected network devices even during outages or disruptions from cyberattacks. 

Moreover, OOB management permits engineers to lock down affected network elements and restrict access. For example, should malware or ransomware cause a breach, engineers can utilize the console port to disable access to impacted network equipment. Likewise, they can shut down servers and disconnect wide-area network connections to isolate a breach. The console port even allows engineers to rebuild and reconfigure devices to factory default. 

Improving everyday process and supporting remote workforces 

If the mass retirement of veteran engineers and IT professionals wasn’t challenging enough, figures indicate companies today struggle to find technical talent. According to a Deloitte survey, almost 90% of technology industry leaders say recruiting and retaining talent is a moderate or major challenge. Unsurprisingly, the study of the Great Resignation points out that 98% of surveyed engineers said they had to achieve more with fewer resources. With feelings of burnout on the rise, businesses need a way to protect their teams from getting overwhelmed. 

Thankfully, depleted engineering teams can leverage OOB management to not only boost network resilience against cyberattacks but also automate various networking processes such as configurations, first-day deployments and day-to-day operation of network infrastructure. Automating everyday management tasks is particularly vital for under-pressure engineers, easing the large load left on their shoulders from the departure of their more experienced coworkers. 

Because OOB management allows for the remote deployment, monitoring and management of networking devices, it reduces the need for engineers to visit remote sites to perform manual remediation amid cyberattacks. These remote remediation tools and capabilities provide opportunities for upskilling and — more importantly — support remote and hybrid working practices, which is ideal for expanding recruiting efforts. 

Cybersecurity is a perennial challenge  

Returning to that analysis of the Great Resignation, one will find that 22% of US-based CIOs anticipate that 75% of their workforce will retire within the next several years, which was much higher than any other surveyed country. As experienced and skilled professionals retire across positions, cybercrime continues to grow in the number of victims and the amount of money stolen each year.   

With less personnel available to devote to cybersecurity, it is paramount that companies invest in emerging technologies like artificial intelligence tools and 5G-powered networks. To that end, businesses must find and deploy an OOB management solution capable of incorporating and streamlining these advanced technologies not only to strengthen security but also to enhance everyday network efficiency. 

KEYWORDS: security career security problems security professionals talent gap

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tracy collins

Tracy Collins is Vice President of Sales, America. Image courtesy of Collins

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • the Great Resignation

    The Great Resignation poses security concerns for organizations

    See More
  • resignation-freepik1170.jpg

    3 tips to offset security challenges created by the Great Resignation

    See More
  • resignation

    Third-party risk challenges presented by the Great Resignation

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • Career Network (60 days)

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing