The reasons to outsource cybersecurity

Issue 2/3 2023 News & Events, Information Security

Kaspersky’s annual IT Security Economics report revealed that the complexity of cybersecurity solutions forced companies to outsource some functions to external infosec providers; they have the relevant expertise and can manage the technologies more efficiently than company employees can.

A complex cybersecurity solution will not guarantee the best protection without a competent specialist managing it. A company’s search for such qualified workers is complicated by the global shortage of experts in this field. This situation forced businesses to outsource certain IT functions to managed service providers (MSP) or managed security service providers (MSSP) in order to get relevant expertise, and up-skill teams.

Kaspersky’s research in South Africa found that 72,7% of SMBs and corporations said that the most common reason to transfer certain IT security responsibilities to MSP/MSSP in 2022 was the efficiency external specialists provided. Among other most frequently mentioned reasons, companies also named compliance requirements (69,7%), the need for specialist knowledge (63,6%), shortage of IT employees (57,6%), and the complexity of business processes (42,4%).

In regards to the cooperation with MSP/MSSP, 69.7% of companies surveyed in South Africa stated that they usually work with two or three providers, while 24.2% deal with more than four IT security service suppliers a year.

“External specialists can either manage all the cybersecurity processes in a company, or just deal with separate tasks. It usually depends on the size of the organisation, its maturity, and management’s desire to be involved in information security tasks. For some small- and medium-sized companies it can be reasonable not to hire a full-time specialist and rather transfer some of their functions to the MSP or MSSP, as it will be more profitable in terms of cost and efficiency.

“For large corporations, outside specialists usually mean extra hands to help their own cybersecurity teams’ deal with a large volume of work. However, it is important to understand that in any case the company should have basic knowledge of information security to be able to assess the outsourcers’ work properly,” comments Konstantin Sapronov, Head of Global Emergency Response Team at Kaspersky.

To gain more insights about IT security costs and budgets in businesses in 2022 visit the interactive IT Security Calculator (https://calculator.kaspersky.com/). The full report is available to download at (https://calculator.kaspersky.com/report).




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Bosch Security renamed Keenfinity
News & Events
Globally renowned brands for video systems, access control and intrusion alarm systems, as well as communication systems, unite under the roof of the new company Keenfinity Group.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Wialon announces integration with fleet maintenance and optimisation platform
News & Events Transport (Industry) Logistics (Industry)
Fleet management software platform integrates with a fleet maintenance and optimisation platform to support mutual customers for better workflows and deeper insights into fleet operations.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Value and industry insight
Securex South Africa Training & Education News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.

Read more...
Gallagher Security achieves ISO 27001 recertification
News & Events Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.