Mid-market Organisations At Greater Risk

In the last few years, many organisations have scaled up their cyber operations, with the rise of remote working forcing many to revise their cyber security provision as frequency of breaches increase.  

Unfortunately, e2e-assure’s recent research has found that the majority (59%) of mid-sized organisations report less confidence in detecting cyber threats compared to just over half of enterprises (52%). This is unsurprising, as the mid-market is increasingly becoming the perfect victim for cyber criminals as larger organisations shore up their cyber operations, becoming harder to bypass. 

For many small organisations, well configured and efficient cyber hygiene can be sufficient in increasing their cyber posture, offering a proficient level of defence. But sadly, the same cannot be said for the mid-market. The increased intricacies of tech stacks and policies can begin to mirror the cyber defence and monitoring needs of enterprises, but with a fraction of the available cyber security budget.

As a result, many mid-market organisations are sold ‘out of the box’ cyber solutions, with the focus of service innovation and customer-centricity solely on the enterprise level clients.

Consequently, the mid-market is commercially viewed as an easy win - minimal work with year-on-year contracts that offer favourable margins. 

What Are The Biggest Frustrations Among CISOs?

Our report unveiled that the biggest frustrations of the 500 CISOs and cyber security decision makers we surveyed are:

  • Long rigid contracts
  • The continual need to bolt on new services
  • The lack of threat hunting capabilities 

The cyber security industry is fast-paced and unforgiving. The relentless drum beat of cyber threats are exhausting, and most cyber professionals are longing for a trusted specialist they can lean on for their expertise.

Disappointingly, we have seen that customers are experiencing limited value from their current providers, with 59% reporting their provider is underperforming. Therefore, it is understandable that only 23% of our respondents state they will keep their provisions fully outsourced.

In fact, we predict a significant shift towards hybrid solutions, with 61% stating they will be looking to continue leveraging a hybrid solution. 

Why? Simply put, we think CISOs just want to be able to sleep better at night. By bringing some or all their cyber provision in-house they can have much better visibility and control of their cyber posture.

Potential For Change 

But there is still some hope for providers. Interestingly, despite underperformance, our research has found that there is still a strong desire to outsource. In fact, most respondents recognise the limitations of their in-house security teams and are happy to relinquish more control to providers in return for quicker decisions (68%) and faster response times (63%).

The question that mid-market organisations should therefore be asking is how can these be achieved if their current cyber security provision is failing?

The Move To Attack Disruption

In today’s current cyber threat landscape, it is no longer a question of whether an organisation will be compromised, but when it will happen. 

It is therefore a concern to find that over a quarter (26%) of mid-market CISOs and cyber security decision makers report that their provider is not implementing proactive measures such as threat hunting to best tune alerts and protect their environment. 

We have found SOC-as-a-service to be one of the most popular cyber security operations to outsource and used by almost a third of CISOs and cyber security decision markers (29%). But it is imperative that CISOs move away from traditional SOC models which use these ‘out of the box’ set ups that are not efficiently tuned to the environment they’re monitoring. 

With false positives a prevalent issue within outdated SOCs, already overburdened teams can become burnt out, and trust in tools can be diminished. 

Attack Disruption in modern SOCs utilises a contain first and investigate immediately approach. This approach focusses on containing machines that show suspect malicious activity, disrupting a potential attacker instantly. Threat intelligence and alert tuning are strong factors that influence the success of this approach, as weakness in either can lead to high false positives and continue analyst fatigue. But a well configured Attack Disruption model will drastically improve the detection and response times for any business.

Looking Forward To 2024’s Threat Landscape 

As we approach 2024, it’s evident that a critical shift is needed to ensure cyber defence quality is more consistent across all sizes of organisation. 

Those most in need of a change, mid-market organisations, can drive this shift by asking their current provider to set clearer KPIs around the time taken to detect and contain threats; offer clearer visibility of the proposed cyber security road map and draw up more flexible contracts then enable better cyber security agility.

These imperative steps will reduce the risk of mid-sized organisations being left behind as cyber-attacks continue to advance.

Tim Anderson is Chief Commercial Officer at e2e-assure

You Might Also Read:

Who Foots the Bill For A Data Breach?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Surging Attacks On Israeli Websites
Four Reasons To Use A Dedicated IP In 2023 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Brainwave GRC

Brainwave GRC

Brainwave GRC is a leading European software provider focused on Identity Analytics and intelligence to strengthen IT security and compliance.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Zivaro

Zivaro

Zivaro provides transformational consulting and technology services to help clients attain real business value from their technology investments.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI)

Blockchain Research Institute (BRI) is an independent, global think-tank. We bring together the world’s top global researchers to undertake ground-breaking research on blockchain technology.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.