Accessing smart cybersecurity skills

Issue 5 2023 Information Security

One of the main drivers of growth in Managed Security Services Providers (MSSPs) has been the global shortage of cybersecurity skills, as well as the prohibitive costs of building a cybersecurity team for most businesses. As a result, companies prefer to work with MSSP partners who tend to have a bigger team of security experts, with experience across a range of environments, whereas a company might only have a single person looking after cybersecurity.


Richard Frost.

A further benefit of outsourcing to a MSSP is that not only does an organisation get access to more skilled people who are able to help resolve a problem, but these experts are constantly at the forefront of security, are more accustomed to resolving issues and can do so more quickly. Think about it, if someone is a security expert in a particular industry, they will have a specific focus and outlook on security, based on the standards and requirements of that particular industry.

Meanwhile, security experts at MSSPs are often sourced from a broader skills base, exposed to a variety of incidents on a daily basis across many industries, and have copious resources from partner vendors to support them. Skill sets can be limited based on the environment; you don’t know what you don’t know, and learn from past experience – and cybersecurity experts from a competent MSSP will have this experience.

Broader range of tools

In addition to the benefit of greater expertise, MSSPs also make use of tools that most organisations don’t normally have access to. As an example, if an organisation chose to manage a firewall by itself, they would most likely struggle under the load of daily events that are logged by the device and usually can’t afford the more advanced management tools that are available.

An MSSP providing a managed firewall service can subdivide or multi-tenant tools so that they can be used to look after the firewalls of multiple customers, bringing down the per unit cost. As a result, the MSSP can offer the service at a cheaper rate than if the customer had tried to do it themselves. Not only is there a potential financial saving, but organisations mitigate against missing risks, or not taking the proper action once one has been identified.

It should be noted, however, that the cost of having these expert resources is high, and as a result cybersecurity unfortunately tends to be seen as a grudge purchase – too expensive to invest in, until an organisation is hit with a ransomware attack that costs them multiple times more than preventative measures would. It’s the same as insurance; you don’t think you need it, until the day you do.

As such, when selecting an MSSP partner, it is crucial that organisations build a holistic scorecard that looks at more than just price. What is their partner status with major security vendors? What are they delivering for that price? Can they even deliver? Ultimately, when it comes to cybersecurity, businesses need to ask themselves, ‘How much risk am I willing to take?’

For more information, contact Armata, [email protected], www.armata.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...