\u00a0<\/span><\/p>\nFrom day camps to sleepovers, middle school to high school age students and girl to boy, the camps cater to different demographics. Programming, building computers and even drone flying are some of the subject matter included in the camps. The camps are growing at rapid speed, similar to the cyber security field.<\/p>\n
Cyber camps that start at a younger age make sense. Professional soccer players and artists do not become successful overnight, he or she spends years learning, practicing and refining their skill set. By launching and growing programs like GenCyber, cyber security can generate a similar effect and inspire young people to take an interest.\u00a0<\/span><\/p>\nThe NSA expresses hope that the camps can attract young talent, grow them and as a result, he or she may continue working with the government after graduation. However, while the organizations hope for this, the camps do not require any type of commitment from the sponsoring organizations.\u00a0<\/span><\/p>\nThere is value in the camps, whether the students continue with the government, or moves to the business world. Businesses benefit because the students are knowledgeable and aware of the risks. No matter what the person\u2019s position may be, knowing the proper safeguards will assist businesses in implementing a cyber security plan and software. The awareness and ability to explain the why, what and how, can convince a company to maintain security procedures and software.<\/p>\n","protected":false},"excerpt":{"rendered":"
Cyber security and online security dominate headlines, whether the focus is on the government or private sector. Preparation, proper safeguards and training are key in preventing cyber attacks.<\/p>\n","protected":false},"author":40,"featured_media":6305,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37],"tags":[],"class_list":["post-4871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4871"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media\/6305"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}