Cybersecurity spending is a complex question that really comes down to your needs. There is always a vendor waiting in the wings to sell you anything, so ask these key questions before you make any investment. rn We often hear clients and prospective clients asking “how much should I be spending on cybersecurity?” That is a very complex question and one that is not easily answered without first having an understanding of what you mean by cybersecurity. There are many different versions of cybersecurity being pushed in the market and there is no “one size fits all” solution, despite what your vendor might tell you. The key: Spending for what is right for your organization, not simply settling on a set percentage of budget. Below are some key questions that you should ask of yourself: Do I want to know the holes in my network, or do I just want to check the box for “testing done”? A full 99.9% of companies offering cybersecurity services today are using automated vulnerability scanning tools and calling it a “penetration test.” This approach is just fine if you simply need to check a box that you’ve done some testing. The problem with this approach is that the people performing the “test” are usually only mildly more qualified than you are to do this testing. Why would you pay someone thousands of dollars to press the start button on some software that you could buy yourself? This leads to what we call “good enough” cybersecurity. On the flip side, there are a few companies that go the extra mile to make sure that your system is addressed in the same way in which sophisticated attackers would interact with it. These companies are going to find the vulnerabilities that are specific to your network configuration and give you a realistic view of where your vulnerabilities are located. They’ll boast of advanced degrees in computer science or related systems and spare you the listing of certifications that anyone could get with a two-week training course. The latter is going to be more expensive, but you’ll actually be getting what you’re paying for—unless, of course, you’re looking to simply check the box. Now that I’ve done testing, what am I doing to continuously monitor my network security? This is a huge area with a new “product” hitting the market about every 10 minutes. Let me warn you here…. technology is NOT always the answer. While there are some very good products in the market, human beings that are familiar with your network are still needed to put context to the alerts. This is one of the biggest problems we’re seeing lately. Companies are installing the fancy new product, subsequently getting millions of alerts a day, and having no clue what to do with them. What is the point of having these great new devices if you come to the point of ignoring them from being overwhelmed? If your budget allows, look for a provider who can take the logs that you are already generating and put them in a form that has context and is applicable to your specific network environment. While there is generally strength in numbers, I’d also warn you to beware of the gigantic products. There is also strength in diversity, especially in the security monitoring space. There is a new article out almost weekly about how this or that software is going to end security threats. Well, guess which products attackers are going to be studying if a large percentage of companies are using that defense? You guessed it, the one they can most readily gain access by finding ways to bypass it. To summarize, if you have a sizable security team with good qualifications, you are probably right to go with a technology approach to monitoring. If your IT team is already strapped for time on daily activities before they even look at security monitoring, you are probably best to bring in a service that does that for you on a constant basis. So when considering what to spend on cybersecurity, it all comes down to what you need. So keep that top of mind. Also remember that you have to be vigilant to make sure you are actually getting what you think you are getting, as there is always a vendor waiting to sell you anything under the sun. And, if a majority of your business is done through network connected devices and applications, it also makes sense to put a priority on protecting those things. If you absolutely must judge your security spending by a percentage, I’d say that somewhere in the range of 20-25% of your IT budget is a good start. Related content brandpost Sponsored by HORNE Cyber Modern Cyberattacks: Tradecraft on Your Network Cyberattacks donu2019t always trip the sensors, alerts, and level of traffic set by network security. In reality, your most dangerous cyberattackers are likely to be operating under your radar.rn By Wesley McGrew Jul 27, 2017 3 mins Security brandpost Sponsored by HORNE Cyber Being a Compliant Victim of Cybercrime Security must extend beyond mere compliance to protect the entirety of your business. Weu2019re talking about offense-oriented testing of your whole network. rn By Wesley McGrew Jul 27, 2017 2 mins Security brandpost Sponsored by HORNE Cyber Their Breach is Your Breach As password policies become ever-stronger, users have a more difficult time committing them to memory. The most popular workaround is password reuse, a technique that hackers can leverage to breach your systems and servicesu2014as easily as those you By Wesley McGrew Jul 18, 2017 3 mins Security brandpost Sponsored by HORNE Cyber IoT: What You Need to Know About Risk and Responsibility IoT devices connect to the public Internet and communicate in ways that make them u201csmarteru201d. But smarter can mean riskier too, especially when it comes to security. By Wesley McGrew Jul 13, 2017 3 mins Internet of Things Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe