Accessing smart cybersecurity skills

Issue 5 2023 Information Security

One of the main drivers of growth in Managed Security Services Providers (MSSPs) has been the global shortage of cybersecurity skills, as well as the prohibitive costs of building a cybersecurity team for most businesses. As a result, companies prefer to work with MSSP partners who tend to have a bigger team of security experts, with experience across a range of environments, whereas a company might only have a single person looking after cybersecurity.


Richard Frost.

A further benefit of outsourcing to a MSSP is that not only does an organisation get access to more skilled people who are able to help resolve a problem, but these experts are constantly at the forefront of security, are more accustomed to resolving issues and can do so more quickly. Think about it, if someone is a security expert in a particular industry, they will have a specific focus and outlook on security, based on the standards and requirements of that particular industry.

Meanwhile, security experts at MSSPs are often sourced from a broader skills base, exposed to a variety of incidents on a daily basis across many industries, and have copious resources from partner vendors to support them. Skill sets can be limited based on the environment; you don’t know what you don’t know, and learn from past experience – and cybersecurity experts from a competent MSSP will have this experience.

Broader range of tools

In addition to the benefit of greater expertise, MSSPs also make use of tools that most organisations don’t normally have access to. As an example, if an organisation chose to manage a firewall by itself, they would most likely struggle under the load of daily events that are logged by the device and usually can’t afford the more advanced management tools that are available.

An MSSP providing a managed firewall service can subdivide or multi-tenant tools so that they can be used to look after the firewalls of multiple customers, bringing down the per unit cost. As a result, the MSSP can offer the service at a cheaper rate than if the customer had tried to do it themselves. Not only is there a potential financial saving, but organisations mitigate against missing risks, or not taking the proper action once one has been identified.

It should be noted, however, that the cost of having these expert resources is high, and as a result cybersecurity unfortunately tends to be seen as a grudge purchase – too expensive to invest in, until an organisation is hit with a ransomware attack that costs them multiple times more than preventative measures would. It’s the same as insurance; you don’t think you need it, until the day you do.

As such, when selecting an MSSP partner, it is crucial that organisations build a holistic scorecard that looks at more than just price. What is their partner status with major security vendors? What are they delivering for that price? Can they even deliver? Ultimately, when it comes to cybersecurity, businesses need to ask themselves, ‘How much risk am I willing to take?’

For more information, contact Armata, [email protected], www.armata.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
The role of advanced technologies in ransomware recovery
Information Security
As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...