Recession? Do not skimp on cybersecurity

Issue 1 2023 Information Security, Security Services & Risk Management

Is the global economy headed into a recession? South Africa’s economy has been flirting with a contracting state for several years. Numerous signs point to more countries landing in the same situation, even lapsing into persistent negative growth.

While analysts are still studying their crystal balls, businesses have to prepare for the worst, and preparing for a recession means cutting costs and refocusing resources. However, while doing so, they might end up creating an enormous risk that will cost them much more than the losses of shrinking economies.

Tim Collins, Chief Financial Officer of cybersecurity provider, Performanta, says, “In tough economic and uncertain times, companies need to take stock of their financial positions and make hard choices to become even more resilient. Technology spending increased during the pandemic’s digitisation priorities to improve productivity of staff working from home and increase cybersecurity. However, as new priorities demand attention, technology resources and costs are now under pressure. Yet leaders must be careful: if they wield a sword instead of a scalpel and ignore important strategic and risk realities, they can do far more damage to themselves than they realise.”

In particular, cybersecurity is under the spotlight. KPMG International’s latest Global CEO reveals a massive drop in how companies rank cybersecurity risks, falling from first in February 2022 to not even making the top five in August 2022. Emerging/disruptive technology, operational issues, regulatory concerns, environmental/climate change and reputational risk all precede digital security.

Why such a drop in importance? Collins proposes two reasons: “Many organisations have invested in security systems, so they might feel that box is ticked, even though it contradicts the continuous operational need to mitigate cyber risks. Some might want to focus more on other risks; perhaps appreciating that cybersecurity is a factor in all of those. For example, CEOs worrying about disruptive technologies, regulations, operations and reputational damage should realise that cybersecurity heavily influences all those risks. If they do not, and start cutting back on security costs while only looking at the bottom line, they are making a big mistake.”

Cybersecurity in a recession

Cybersecurity is even more important during a recession than in good times. Although there is no definitive correlation between recessions and overall crime rates, World Economic Forum research suggests that, more challenging financial times lead to increases in career criminals and malicious insider activities.

Cybercrime is a tempting opportunity for skilled IT professionals with ambiguous morals – especially in the face of a bear market downscaling employment. Recessions grow cybercrime talent pools. The higher job pressures, resulting from fewer resources, create more disgruntled employees, who might avenge their sentiments by using their access privileges. Cutting back too much on cybersecurity budgets and personnel is more likely to increase attack risks and undermine attempts to address other major risks, such as disruption and financial losses.

Does this mean companies should spend more on cybercrime, biting the budget bullet, just because there is no alternative? They do have alternatives when they cease looking at cybersecurity only as a cost centre.

“A recession is an opportunity,” says Guy Golan, CEO of Performanta. “There has been incredible investment and growth in cybersecurity, and companies are right to expect some dividends from that. We cannot just keep saying they must spend, spend, spend, but they should then mature.

The big issue is that they still put cybersecurity on a pedestal, as an operational must-have that they do not really understand in context of their business. It is not strategic and it is not treated as an integrated business department, leading to wasted spending, poorly managed resources and under-performing security. If they look at security efficiency before making security cuts, they’ll realise significant and long-term gains.”

Bank on cyber safety

Golan calls this concept cyber-safety: the notion that cybersecurity is framed within the business context and treated like any other department. When organisations treat cybersecurity as a black box – meaning they only see input and output but not how it creates that value – they risk misinterpreting its purpose and requirements.

This can lead to unthinking budget and staff cuts that have lasting negative implications. Fixing a cyber breach often costs considerably more than preventing or limiting an attack. Notably, IBM’s 2022 report found that a breach, on average, costs $4.35 million, a substantial amount at any time, but especially in a recession.

Companies that treat cybersecurity as a business function have more opportunities to manage costs. They can focus their energy to discover and optimise under-performing systems, assess security staff for allocation of duties and career development, develop and introduce business-savvy security leaders to the top of the company, formalise processes, and strategically integrate cybersecurity around their other pressing concerns.

“The right cybersecurity partners are catalysts for this exercise,” says Golan. “It is fair to say that the security market often cares more about selling than about customer context and strategy, but the best security providers are not just about skills and technology. They have to take a real interest in your business and its security needs. A recession can put pressure on partners, on how well they perform as advisors and strategists.”

Recessions require sacrifice and compromise. Cybersecurity will not be spared from tightening belts, but beware of bluntly reducing its capacity. Use the opportunity to collaborate with your security partners, tighten controls, discover unrealised value, and integrate cybersecurity as a part of business strategy and operations. The times ahead might be tough, but improving security need not be




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
The role of drones in farm protection
Agriculture (Industry) Security Services & Risk Management
Laurence Palmer reminds us of the role drones play in agricultural security and offers a free security risk assessment template for downloading (link at the end of the article).

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.