Mid-market Organisations At Greater Risk

In the last few years, many organisations have scaled up their cyber operations, with the rise of remote working forcing many to revise their cyber security provision as frequency of breaches increase.  

Unfortunately, e2e-assure’s recent research has found that the majority (59%) of mid-sized organisations report less confidence in detecting cyber threats compared to just over half of enterprises (52%). This is unsurprising, as the mid-market is increasingly becoming the perfect victim for cyber criminals as larger organisations shore up their cyber operations, becoming harder to bypass. 

For many small organisations, well configured and efficient cyber hygiene can be sufficient in increasing their cyber posture, offering a proficient level of defence. But sadly, the same cannot be said for the mid-market. The increased intricacies of tech stacks and policies can begin to mirror the cyber defence and monitoring needs of enterprises, but with a fraction of the available cyber security budget.

As a result, many mid-market organisations are sold ‘out of the box’ cyber solutions, with the focus of service innovation and customer-centricity solely on the enterprise level clients.

Consequently, the mid-market is commercially viewed as an easy win - minimal work with year-on-year contracts that offer favourable margins. 

What Are The Biggest Frustrations Among CISOs?

Our report unveiled that the biggest frustrations of the 500 CISOs and cyber security decision makers we surveyed are:

  • Long rigid contracts
  • The continual need to bolt on new services
  • The lack of threat hunting capabilities 

The cyber security industry is fast-paced and unforgiving. The relentless drum beat of cyber threats are exhausting, and most cyber professionals are longing for a trusted specialist they can lean on for their expertise.

Disappointingly, we have seen that customers are experiencing limited value from their current providers, with 59% reporting their provider is underperforming. Therefore, it is understandable that only 23% of our respondents state they will keep their provisions fully outsourced.

In fact, we predict a significant shift towards hybrid solutions, with 61% stating they will be looking to continue leveraging a hybrid solution. 

Why? Simply put, we think CISOs just want to be able to sleep better at night. By bringing some or all their cyber provision in-house they can have much better visibility and control of their cyber posture.

Potential For Change 

But there is still some hope for providers. Interestingly, despite underperformance, our research has found that there is still a strong desire to outsource. In fact, most respondents recognise the limitations of their in-house security teams and are happy to relinquish more control to providers in return for quicker decisions (68%) and faster response times (63%).

The question that mid-market organisations should therefore be asking is how can these be achieved if their current cyber security provision is failing?

The Move To Attack Disruption

In today’s current cyber threat landscape, it is no longer a question of whether an organisation will be compromised, but when it will happen. 

It is therefore a concern to find that over a quarter (26%) of mid-market CISOs and cyber security decision makers report that their provider is not implementing proactive measures such as threat hunting to best tune alerts and protect their environment. 

We have found SOC-as-a-service to be one of the most popular cyber security operations to outsource and used by almost a third of CISOs and cyber security decision markers (29%). But it is imperative that CISOs move away from traditional SOC models which use these ‘out of the box’ set ups that are not efficiently tuned to the environment they’re monitoring. 

With false positives a prevalent issue within outdated SOCs, already overburdened teams can become burnt out, and trust in tools can be diminished. 

Attack Disruption in modern SOCs utilises a contain first and investigate immediately approach. This approach focusses on containing machines that show suspect malicious activity, disrupting a potential attacker instantly. Threat intelligence and alert tuning are strong factors that influence the success of this approach, as weakness in either can lead to high false positives and continue analyst fatigue. But a well configured Attack Disruption model will drastically improve the detection and response times for any business.

Looking Forward To 2024’s Threat Landscape 

As we approach 2024, it’s evident that a critical shift is needed to ensure cyber defence quality is more consistent across all sizes of organisation. 

Those most in need of a change, mid-market organisations, can drive this shift by asking their current provider to set clearer KPIs around the time taken to detect and contain threats; offer clearer visibility of the proposed cyber security road map and draw up more flexible contracts then enable better cyber security agility.

These imperative steps will reduce the risk of mid-sized organisations being left behind as cyber-attacks continue to advance.

Tim Anderson is Chief Commercial Officer at e2e-assure

You Might Also Read:

Who Foots the Bill For A Data Breach?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Surging Attacks On Israeli Websites
Four Reasons To Use A Dedicated IP In 2023 »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

Intezer Labs

Intezer Labs

The only solution replicating the concepts of the biological immune system into cyber-security. Intezer provides enterprises with unparalleled Threat Detection and accelerates Incident Response.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

Dapple Security

Dapple Security

Dapple Security is creating cutting edge technology utilizing responsible biometrics that protects people and privacy through a first-of-its-kind passwordless platform.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.