Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • SolarWinds N-central Automate what you need. Tackle complex networks. Try this remote monitoring and management solution built to help maximize efficiency and scale.
    • SolarWinds RMM Start fast. Grow at your own pace. Try this powerful but simple remote monitoring and management solution.
    • SolarWinds EDR Defend against ransomware, zero-day attacks, and evolving online threats with Endpoint Detection and Response
    • SolarWinds Backup Manage data protection for servers, workstations applications, documents and Microsoft 365 from one SaaS dashboard.
    • Mail Protection & Archiving Protect users from email threats and downtime.
    • Password Management Easily adopt and demonstrate best practice password and documentation management workflows.
      • Passportal Demo
    • PSA & Ticketing Manage ticketing, reporting, and billing to increase helpdesk efficiency.
    • Remote Support Help support customers and their devices with remote support tools designed to be fast and powerful.
  • Solutions

    I'm looking for...

    • Security Solutions
    • Monitoring Solutions
    • Efficiency Solutions
  • Resources
    • Blog
    • Webcasts & Events
    • Ask the N-central Experts
    • Daily Live Demos
    • RMM Foundations Training
    • Upcoming Events
    • Upcoming Webcasts
    • Resource Center
    • COVID-19 Resources
    • Resource Library
      • Case Studies
      • Product Information
      • eBooks
      • White Papers
      • Infographics
    • SolarWinds MSP Free Tools
    • GDPR Resource Center
    • Security Resource Center
    • MSP Institute Webinar Series
    • MSP Advice Project
  • About
    • Contact
    • Customer Success
    • Worldwide sales and support
    • Careers
    • Awards and Recognition
    • Get A Quote
    • Newsroom
      • Press Releases
      • In The News
      • Media Contacts
      • COVID-19 Response
    • Leadership Team
    • Legal
      • Cookie Policy
      • Privacy Notice
      • Software Services Agreement
      • Terms of Use
      • Backup Fair Use Policy
    • Security
      • SolarWinds Security Statement
      • Vendor Data Protection Requirements
    • Support
  • IT Departments
  • Contact Sales
    • Get A Quote
    • General Inquiry
  • TRY NOW
    • SolarWinds RMM
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Passportal
    • SolarWinds N-central
    • SolarWinds Mail Assure
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Are companies spending their IT Security Budget on the wrong things?
MSP Business

Are companies spending their IT Security Budget on the wrong things?

By Davey Winder
7 February, 2017

Newly published research reveals that data breaches are on the increase—up 5% over the past year. That doesn’t sound like much, but it equates to just over a quarter (26%) of surveyed organizations suffering a breach during 2016 and almost a third (30%) considering themselves very vulnerable to data attacks. This despite almost three quarters (73%) of the organizations surveyed reporting an increase in security spending, up from 58% the year before.

Doing the math isn’t difficult here—businesses are spending their IT security budget on the wrong things.

Don’t mis-place your IT security budget

The top spending priorities uncovered in the research were network and endpoint related, while data-at-rest solutions were way down the list. This seems to be rather counterintuitive when you think about it, as encrypting data-at-rest is probably the single most effective way to ensure the privacy of that information. Endpoint security isn’t dead in the water, but it sure isn’t the be-all and end-all of a strong security posture either.

As former Cisco CEO, John Chambers, famously said, “There are two types of companies: those that have been hacked, and those who don’t know they have been hacked.” What he meant was that the time has come to stop throwing more money at trying to prevent a breach, and instead spend it on threat isolation and mitigation.

Consider the network to be a threat sensor that provides visibility into traffic flow, and thus returns intelligence to identify security threats. Consider the network as an enforcer, backing up your security policy to define segmentation, reduce the attack surface, and prevent threats from skipping laterally across the network.

It’s about best practice not compliance

In speaking with organizations, the reason for the spending mismatch is that compliance and not best practice usually heads the spending drivers. While compliance requirements are important to remember, we mustn’t forget that there are other considerations when it comes to building a strong security posture.

As Ian Trump, Global Cyber Security Strategist for SolarWinds MSP, is always keen to point out, the best security strategy is one that goes back to basics. The UK government Cyber Essentials scheme is one good example of the kind of basic security controls you need. To get a Cyber Essentials certificate your organization must have boundary firewalls, a secure configuration process, user access controls, malware protection, and patch management in place.

Allow your security strategy to evolve

But it’s also imperative that your security strategy is as dynamic as the threatscape it must defend against; data protection must evolve to match not only today’s threats, but tomorrow’s as well. What do I mean by evolving threats? Well, the two big threats that evolved into headline-spinning events last year were Denial of Service attacks and Ransomware.

Protecting against these involves a sideways look at security spending, to include the likes of fallback broadband connectivity and multi-factor backup routines. Neither are traditionally within the security remit, but the ever-changing threatscape demands they should be. Then there’s the cost of worrying about yesterday’s threatscape. Ask yourself if your organization has a process to decommission old IT security products—this security bloat costs money and protects very little.

None of us inhabits that ideal world where the IT security budget is sufficient to cover all threat bases without exception. Back in the real-world, prioritizing spending to ensure the best security for your organization is an essential piece of the data protection puzzle.

Increasingly, security spending as a capital expense is on the decline and as an operating expense it’s rising. This is a good thing as it keeps your costs down and your security posture strong. After all, spending money on the latest security solutions without trained staff that can properly configure and maintain them is both a waste of money and does nothing to keep you secure. It’s far better to buy into a service with trained staff, and let them do it for you.

You might also like...
MSP Business

Operation Cloud Hopper-A wake-up call for MSPs and IT service providers

MSP Business

Do we go overboard with security?

MSP Business

Security Awareness Training Tips

Best Practices

Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity

MSP Business

MSP Password Management

MSP Business

Using managed antivirus solutions in your MSP

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • What the Head Nerds Were Up to in 2020
  • RMM and PSA Tools: How to Make the Most of Both
  • How to Empower an IT Help Desk Team for Success
  • Six Tips That Will Make Managing Your MSP Company Easier
  • January 2021 Patch Tuesday: One Actively Exploited Vulnerability and a Few Likely to Be
Categories:
  • Security (230)
  • Tips & Advice (122)
  • Best Practices (94)
  • Managed Services (86)
  • Backup & Disaster Recovery (83)
  • The Head Nerds (75)
  • Business Growth (75)
  • IT Support (42)
  • Business (39)
  • Automation (37)
  • Cybersecurity (37)
  • Operations (34)
  • Mail (33)
  • Remote Management (28)
  • ITSM (25)
  • Cloud Computing (21)
  • Networking (21)
  • Data (21)
  • Marketing (14)
  • Product (11)
  • PSA (11)
  • Service Desk (5)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • Internet of Things (3)
  • Customer Service (3)
  • Research & Trends (2)
  • Training (2)
  • GDPR (2)
  • Business Risk (1)
  • LOGICcards (1)
Show moreless
SolarWinds MSP

Products
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.