Mid-market Organisations At Greater Risk

In the last few years, many organisations have scaled up their cyber operations, with the rise of remote working forcing many to revise their cyber security provision as frequency of breaches increase.  

Unfortunately, e2e-assure’s recent research has found that the majority (59%) of mid-sized organisations report less confidence in detecting cyber threats compared to just over half of enterprises (52%). This is unsurprising, as the mid-market is increasingly becoming the perfect victim for cyber criminals as larger organisations shore up their cyber operations, becoming harder to bypass. 

For many small organisations, well configured and efficient cyber hygiene can be sufficient in increasing their cyber posture, offering a proficient level of defence. But sadly, the same cannot be said for the mid-market. The increased intricacies of tech stacks and policies can begin to mirror the cyber defence and monitoring needs of enterprises, but with a fraction of the available cyber security budget.

As a result, many mid-market organisations are sold ‘out of the box’ cyber solutions, with the focus of service innovation and customer-centricity solely on the enterprise level clients.

Consequently, the mid-market is commercially viewed as an easy win - minimal work with year-on-year contracts that offer favourable margins. 

What Are The Biggest Frustrations Among CISOs?

Our report unveiled that the biggest frustrations of the 500 CISOs and cyber security decision makers we surveyed are:

  • Long rigid contracts
  • The continual need to bolt on new services
  • The lack of threat hunting capabilities 

The cyber security industry is fast-paced and unforgiving. The relentless drum beat of cyber threats are exhausting, and most cyber professionals are longing for a trusted specialist they can lean on for their expertise.

Disappointingly, we have seen that customers are experiencing limited value from their current providers, with 59% reporting their provider is underperforming. Therefore, it is understandable that only 23% of our respondents state they will keep their provisions fully outsourced.

In fact, we predict a significant shift towards hybrid solutions, with 61% stating they will be looking to continue leveraging a hybrid solution. 

Why? Simply put, we think CISOs just want to be able to sleep better at night. By bringing some or all their cyber provision in-house they can have much better visibility and control of their cyber posture.

Potential For Change 

But there is still some hope for providers. Interestingly, despite underperformance, our research has found that there is still a strong desire to outsource. In fact, most respondents recognise the limitations of their in-house security teams and are happy to relinquish more control to providers in return for quicker decisions (68%) and faster response times (63%).

The question that mid-market organisations should therefore be asking is how can these be achieved if their current cyber security provision is failing?

The Move To Attack Disruption

In today’s current cyber threat landscape, it is no longer a question of whether an organisation will be compromised, but when it will happen. 

It is therefore a concern to find that over a quarter (26%) of mid-market CISOs and cyber security decision makers report that their provider is not implementing proactive measures such as threat hunting to best tune alerts and protect their environment. 

We have found SOC-as-a-service to be one of the most popular cyber security operations to outsource and used by almost a third of CISOs and cyber security decision markers (29%). But it is imperative that CISOs move away from traditional SOC models which use these ‘out of the box’ set ups that are not efficiently tuned to the environment they’re monitoring. 

With false positives a prevalent issue within outdated SOCs, already overburdened teams can become burnt out, and trust in tools can be diminished. 

Attack Disruption in modern SOCs utilises a contain first and investigate immediately approach. This approach focusses on containing machines that show suspect malicious activity, disrupting a potential attacker instantly. Threat intelligence and alert tuning are strong factors that influence the success of this approach, as weakness in either can lead to high false positives and continue analyst fatigue. But a well configured Attack Disruption model will drastically improve the detection and response times for any business.

Looking Forward To 2024’s Threat Landscape 

As we approach 2024, it’s evident that a critical shift is needed to ensure cyber defence quality is more consistent across all sizes of organisation. 

Those most in need of a change, mid-market organisations, can drive this shift by asking their current provider to set clearer KPIs around the time taken to detect and contain threats; offer clearer visibility of the proposed cyber security road map and draw up more flexible contracts then enable better cyber security agility.

These imperative steps will reduce the risk of mid-sized organisations being left behind as cyber-attacks continue to advance.

Tim Anderson is Chief Commercial Officer at e2e-assure

You Might Also Read:

Who Foots the Bill For A Data Breach?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Surging Attacks On Israeli Websites
Four Reasons To Use A Dedicated IP In 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute (BCI)

Bace Cybersecurity Institute focuses on understanding, empowering and taking action across four critical areas driving continual improvement toward a safer, more secure cyber world.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.