Building Blocks of Cybersecure Culture for SMBs: Part 4 – Detect, Detect, Detect – And Learn from What You Discover


Detect and DiscoverPer a recent study from research firm Gartner Inc., most corporate CIOs expect cybersecurity threats to increase in coming years. Yet, many also say their organizations don’t have cybersecurity experts.

Huh? Yes, you read that one correctly. Here’s the detail as reported by Information Management:

Gartner polled more than 3100 CIOs in nearly 100 countries as part of its 2018 CIO Agenda Survey. Researchers found that 95% of respondents anticipate cyber-threats will increase during the next three years. But only 65% percent reported that their organizations currently have a cybersecurity expert.

Not long ago, we identified two instances when leaders of small to mid-size businesses (SMBs) should not think like “Big-Time CIOs.” In short, the situations were:

  • When “Shadow IT” is SOP
  • When the Cloud Must be Grounded

For elaboration of these circumstances, read our whole post here. Meantime, let’s add a third point to the list:

  • When Your Cybersecurity Skills Gap is Obvious

How could so many big-time CIOs go without adequate support for facing one of the greatest business challenges of our times – and be so keenly aware of the deficit without acting? These conditions surely don’t synchronize with views expressed by the CompTIA Cybersecurity Advisory Board in its executive brief, “Building a Culture of Cybersecurity,” a white paper highlighting cybersecurity threats, issues, and considerations inherent in today’s digital environment. Here’s the Advisory Board’s opening premise:

“For many organizations, there needs to be an important shift in mindset: Security can no longer be thought of as a technical problem with a technical solution; it must be treated as a critical business concern.”

Here’s our spin for SMB leaders: When dealing with cybersecurity today, go looking for trouble; when you find it, study the case closely with the intent of quickly applying the proper expertise to the problem.

Part 4 – Detect, Detect, Detect – And Learn from What You Discover

“The longer it takes to detect a data breach, the more expensive the data breach becomes,” CompTIA writers stress in their “Culture” brief. So, they recommend three ways SMB execs can trim time from the detection process:

  • Internal Monitoring – Although senior leadership cannot be involved in actively detecting each security problem, execs can ensure detection is prioritized and can create incentives to encourage cybersecurity reviews.
  • 3rd-Party Audits – Ask your IT Managed Services Provider (MSP) to look from the outside in. As the senior exec, you should review reports generated from these exercises on a regular basis. Plus, build an immediate feedback mechanism so insights from these studies flow into existing processes, policies and manuals in a timely fashion.
  • Equip Support with the Right Tools -- EDR, SIEM, and other technologies that improve detection require trained, experienced cybersecurity pros to regularly analyze outputs. Ensure your security team has the necessary resources to review data adequately and to respond fully.

Finally, no need to go it alone. Your MSP can support and help with cybersecurity detection.