{"id":6058,"date":"2017-02-07T23:17:58","date_gmt":"2017-02-07T23:17:58","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6058"},"modified":"2021-07-12T14:32:54","modified_gmt":"2021-07-12T13:32:54","slug":"are-companies-spending-their-it-security-budget-wrong-things","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things","title":{"rendered":"Are companies spending their IT Security Budget on the wrong things?"},"content":{"rendered":"<p>Newly published\u00a0<a class=\"ext\" href=\"http:\/\/dtr.thalesesecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">research<\/a>\u00a0reveals that data breaches are on the increase\u2014up 5% over the past year. That doesn\u2019t sound like much, but it equates to just over a quarter (26%) of surveyed organizations suffering a breach during 2016 and almost a third (30%) considering themselves very vulnerable to data attacks. This despite almost three quarters (73%) of the organizations surveyed reporting an increase in security spending, up from 58% the year before.<\/p>\n<p>Doing the math isn\u2019t difficult here\u2014businesses are spending their IT security budget on the wrong things.<\/p>\n<h3>Don\u2019t mis-place your IT security budget<\/h3>\n<p>The top spending priorities uncovered in the research were network and endpoint related, while data-at-rest solutions were way down the list. This seems to be rather counterintuitive when you think about it, as encrypting data-at-rest is probably the single most effective way to ensure the privacy of that information. Endpoint security isn\u2019t dead in the water, but it sure isn\u2019t the be-all and end-all of a strong security posture either.<\/p>\n<p>As former Cisco CEO, John Chambers, famously said, \u201cThere are two types of companies: those that have been hacked, and those who don\u2019t know they have been hacked.\u201d What he meant was that the time has come to stop throwing more money at trying to prevent a breach, and instead spend it on threat isolation and mitigation.<\/p>\n<p>Consider the network to be a threat sensor that provides visibility into traffic flow, and thus returns intelligence to identify security threats. Consider the network as an enforcer, backing up your security policy to define segmentation, reduce the attack surface, and prevent threats from skipping laterally across the network.<\/p>\n<h3>It\u2019s about best practice not compliance<\/h3>\n<p>In speaking with organizations, the reason for the spending mismatch is that compliance and not best practice usually heads the spending drivers. While compliance requirements are important to remember, we mustn\u2019t forget that there are other considerations when it comes to building a strong security posture.<\/p>\n<p>As Ian Trump, Global Cyber Security Strategist for SolarWinds MSP, is always keen to point out, the best security strategy is one that goes\u00a0back to basics. The UK government\u00a0<a class=\"ext\" href=\"https:\/\/www.cyberaware.gov.uk\/cyberessentials\" target=\"_blank\" rel=\"noopener noreferrer\">Cyber Essentials<\/a>\u00a0scheme is one good example of the kind of basic security controls you need. To get a Cyber Essentials certificate your organization must have boundary firewalls, a secure configuration process, user access controls, malware protection, and patch management in place.<\/p>\n<h3>Allow your security strategy to evolve<\/h3>\n<p>But it\u2019s also imperative that your security strategy is as dynamic as the threatscape it must defend against; data protection must evolve to match not only today\u2019s threats, but tomorrow\u2019s as well. What do I mean by evolving threats? Well, the two big threats that evolved into headline-spinning events last year were Denial of Service attacks and Ransomware.<\/p>\n<p>Protecting against these involves a sideways look at security spending, to include the likes of fallback broadband connectivity and multi-factor backup routines. Neither are traditionally within the security remit, but the ever-changing threatscape demands they should be. Then there\u2019s the cost of worrying about yesterday\u2019s threatscape. Ask yourself if your organization has a process to decommission old IT security products\u2014this security bloat costs money and protects very little.<\/p>\n<p>None of us inhabits that ideal world where the IT security budget is sufficient to cover all threat bases without exception. Back in the real-world, prioritizing spending to ensure the best security for your organization is an essential piece of the data protection puzzle.<\/p>\n<p>Increasingly, security spending as a capital expense is on the decline and as an operating expense it\u2019s rising. This is a good thing as it keeps your costs down and your security posture strong. After all, spending money on the latest security solutions without trained staff that can properly configure and maintain them is both a waste of money and does nothing to keep you secure. It\u2019s far better to buy into a service with trained staff, and let them do it for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With organizations under threat to sort out their cyber security, Davey Winder looks at where they should be spending their IT security budget.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6058","post","type-post","status-publish","format-standard","hentry","topic-msp-business"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Are companies spending their IT Security Budget on the wrong things? - N-able<\/title>\n<meta name=\"description\" content=\"With organizations under threat to sort out their cyber security, Davey Winder looks at where they should be spending their IT security budget.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are companies spending their IT Security Budget on the wrong things? - N-able\" \/>\n<meta property=\"og:description\" content=\"With organizations under threat to sort out their cyber security, Davey Winder looks at where they should be spending their IT security budget.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-07T23:17:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:32:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Are companies spending their IT Security Budget on the wrong things?\",\"datePublished\":\"2017-02-07T23:17:58+00:00\",\"dateModified\":\"2021-07-12T13:32:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things\"},\"wordCount\":677,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"MSP Business\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things\",\"name\":\"Are companies spending their IT Security Budget on the wrong things? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2017-02-07T23:17:58+00:00\",\"dateModified\":\"2021-07-12T13:32:54+00:00\",\"description\":\"With organizations under threat to sort out their cyber security, Davey Winder looks at where they should be spending their IT security budget.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"MSP Business\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/msp-business\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are companies spending their IT Security Budget on the wrong things?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are companies spending their IT Security Budget on the wrong things? - N-able","description":"With organizations under threat to sort out their cyber security, Davey Winder looks at where they should be spending their IT security budget.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things","og_locale":"de_DE","og_type":"article","og_title":"Are companies spending their IT Security Budget on the wrong things? - N-able","og_description":"With organizations under threat to sort out their cyber security, Davey Winder looks at where they should be spending their IT security budget.","og_url":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2017-02-07T23:17:58+00:00","article_modified_time":"2021-07-12T13:32:54+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Are companies spending their IT Security Budget on the wrong things?","datePublished":"2017-02-07T23:17:58+00:00","dateModified":"2021-07-12T13:32:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things"},"wordCount":677,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["MSP Business"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things","url":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things","name":"Are companies spending their IT Security Budget on the wrong things? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2017-02-07T23:17:58+00:00","dateModified":"2021-07-12T13:32:54+00:00","description":"With organizations under threat to sort out their cyber security, Davey Winder looks at where they should be spending their IT security budget.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/are-companies-spending-their-it-security-budget-wrong-things#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"MSP Business","item":"https:\/\/www.n-able.com\/de\/blog\/category\/msp-business"},{"@type":"ListItem","position":2,"name":"Are companies spending their IT Security Budget on the wrong things?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=6058"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/6058\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=6058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}