Recession? Do not skimp on cybersecurity

Issue 1 2023 Information Security, Security Services & Risk Management

Is the global economy headed into a recession? South Africa’s economy has been flirting with a contracting state for several years. Numerous signs point to more countries landing in the same situation, even lapsing into persistent negative growth.

While analysts are still studying their crystal balls, businesses have to prepare for the worst, and preparing for a recession means cutting costs and refocusing resources. However, while doing so, they might end up creating an enormous risk that will cost them much more than the losses of shrinking economies.

Tim Collins, Chief Financial Officer of cybersecurity provider, Performanta, says, “In tough economic and uncertain times, companies need to take stock of their financial positions and make hard choices to become even more resilient. Technology spending increased during the pandemic’s digitisation priorities to improve productivity of staff working from home and increase cybersecurity. However, as new priorities demand attention, technology resources and costs are now under pressure. Yet leaders must be careful: if they wield a sword instead of a scalpel and ignore important strategic and risk realities, they can do far more damage to themselves than they realise.”

In particular, cybersecurity is under the spotlight. KPMG International’s latest Global CEO reveals a massive drop in how companies rank cybersecurity risks, falling from first in February 2022 to not even making the top five in August 2022. Emerging/disruptive technology, operational issues, regulatory concerns, environmental/climate change and reputational risk all precede digital security.

Why such a drop in importance? Collins proposes two reasons: “Many organisations have invested in security systems, so they might feel that box is ticked, even though it contradicts the continuous operational need to mitigate cyber risks. Some might want to focus more on other risks; perhaps appreciating that cybersecurity is a factor in all of those. For example, CEOs worrying about disruptive technologies, regulations, operations and reputational damage should realise that cybersecurity heavily influences all those risks. If they do not, and start cutting back on security costs while only looking at the bottom line, they are making a big mistake.”

Cybersecurity in a recession

Cybersecurity is even more important during a recession than in good times. Although there is no definitive correlation between recessions and overall crime rates, World Economic Forum research suggests that, more challenging financial times lead to increases in career criminals and malicious insider activities.

Cybercrime is a tempting opportunity for skilled IT professionals with ambiguous morals – especially in the face of a bear market downscaling employment. Recessions grow cybercrime talent pools. The higher job pressures, resulting from fewer resources, create more disgruntled employees, who might avenge their sentiments by using their access privileges. Cutting back too much on cybersecurity budgets and personnel is more likely to increase attack risks and undermine attempts to address other major risks, such as disruption and financial losses.

Does this mean companies should spend more on cybercrime, biting the budget bullet, just because there is no alternative? They do have alternatives when they cease looking at cybersecurity only as a cost centre.

“A recession is an opportunity,” says Guy Golan, CEO of Performanta. “There has been incredible investment and growth in cybersecurity, and companies are right to expect some dividends from that. We cannot just keep saying they must spend, spend, spend, but they should then mature.

The big issue is that they still put cybersecurity on a pedestal, as an operational must-have that they do not really understand in context of their business. It is not strategic and it is not treated as an integrated business department, leading to wasted spending, poorly managed resources and under-performing security. If they look at security efficiency before making security cuts, they’ll realise significant and long-term gains.”

Bank on cyber safety

Golan calls this concept cyber-safety: the notion that cybersecurity is framed within the business context and treated like any other department. When organisations treat cybersecurity as a black box – meaning they only see input and output but not how it creates that value – they risk misinterpreting its purpose and requirements.

This can lead to unthinking budget and staff cuts that have lasting negative implications. Fixing a cyber breach often costs considerably more than preventing or limiting an attack. Notably, IBM’s 2022 report found that a breach, on average, costs $4.35 million, a substantial amount at any time, but especially in a recession.

Companies that treat cybersecurity as a business function have more opportunities to manage costs. They can focus their energy to discover and optimise under-performing systems, assess security staff for allocation of duties and career development, develop and introduce business-savvy security leaders to the top of the company, formalise processes, and strategically integrate cybersecurity around their other pressing concerns.

“The right cybersecurity partners are catalysts for this exercise,” says Golan. “It is fair to say that the security market often cares more about selling than about customer context and strategy, but the best security providers are not just about skills and technology. They have to take a real interest in your business and its security needs. A recession can put pressure on partners, on how well they perform as advisors and strategists.”

Recessions require sacrifice and compromise. Cybersecurity will not be spared from tightening belts, but beware of bluntly reducing its capacity. Use the opportunity to collaborate with your security partners, tighten controls, discover unrealised value, and integrate cybersecurity as a part of business strategy and operations. The times ahead might be tough, but improving security need not be




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.