Cybercriminals Target Security Team Turnover During Great Resignation, Driving $150K+ Costs Per Departure
Cybercriminals exploited security team turnover during the Great Resignation, causing organizations over $150,000 per departure due to staffing gaps and knowledge loss.

TL;DR
Cybercriminals capitalized on the Great Resignation's security team turnover, exploiting staffing gaps and knowledge loss. Organizations incurred costs exceeding $150,000 per departing security professional, exposing significant vulnerabilities.
The Great Resignation period created significant churn within cybersecurity teams, presenting a new vulnerability for organizations. Cybercriminals capitalized on this instability, actively monitoring for security staff departures. They timed their attacks to exploit the resulting staffing gaps, knowledge loss, and operational disruption.
Replacing a security professional demands substantial resources. It takes 50% longer than filling a typical IT role, often requiring a salary premium between 15% and 25%. The total financial impact of losing a single security employee reaches at least $150,000. This comprehensive figure covers direct recruitment expenses, training new hires, and the substantial costs of lost productivity and operational disruption during transitions. Beyond monetary costs, the departure of experienced personnel creates critical knowledge gaps. This includes insights into specific network configurations, alert patterns, and informal incident response processes.
These departures create immediate operational blind spots and single points of failure within security teams. When a seasoned analyst leaves, their unique understanding of an organization's threat landscape and incident response protocols often departs with them. This loss can significantly delay incident detection and breach containment. What might have taken hours for a well-staffed team could stretch into days, amplifying potential damage. Organizations face heightened risks during these transition periods. Attackers exploit the knowledge that stretched teams and missing expertise offer easier entry points.
To counter these vulnerabilities, organizations must prioritize proactive talent management. This includes implementing robust knowledge transfer protocols to document institutional expertise and cross-train team members. Fostering continuous professional development and clear career paths is also crucial for retention. Regular reviews of incident response plans must account for potential staffing changes.
Monitoring security team stability and investing in talent retention will remain critical defenses against evolving cyber threats.
Continue reading
More in this thread
Over 300,000 Interrail Users Advised to Cancel Passports After Eurail Data Breach
Peter Olaleru
Over 300,000 Interrail Users Told to Cancel Passports After Dark Web Data Sale
Peter Olaleru
Claude Mythos Breach Reveals Supply Chain Weaknesses in AI Model Access Controls
Peter Olaleru
Conversation
Reader notes
Loading comments...