Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Vodacom fibre play pushes Maziv valuation above Telkom’s

      20 July 2025

      Crypto industry shoots for mainstream adoption

      20 July 2025

      Vodacom’s Maziv deal gets makeover ahead of crucial hearing

      18 July 2025

      Cut electricity prices for data centres: Andile Ngcaba

      18 July 2025

      Takealot taps Mr D to deliver toys, pet food and future growth

      18 July 2025
    • World

      Grok 4 arrives with bold claims and fresh controversy

      10 July 2025

      Samsung’s bet on folding phones faces major test

      10 July 2025

      Bitcoin pushes higher into record territory

      10 July 2025

      OpenAI to launch web browser in direct challenge to Google Chrome

      10 July 2025

      Cupertino vs Brussels: Apple challenges Big Tech crackdown

      7 July 2025
    • In-depth

      The 1940s visionary who imagined the Information Age

      14 July 2025

      MultiChoice is working on a wholesale overhaul of DStv

      10 July 2025

      Siemens is battling Big Tech for AI supremacy in factories

      24 June 2025

      The algorithm will sing now: why musicians should be worried about AI

      20 June 2025

      Meta bets $72-billion on AI – and investors love it

      17 June 2025
    • TCS

      TCS+ | Samsung unveils significant new safety feature for Galaxy A-series phones

      16 July 2025

      TCS+ | MVNX on the opportunities in South Africa’s booming MVNO market

      11 July 2025

      TCS | Connecting Saffas – Renier Lombard on The Lekker Network

      7 July 2025

      TechCentral Nexus S0E4: Takealot’s big Post Office jobs plan

      4 July 2025

      TCS | Tech, townships and tenacity: Spar’s plan to win with Spar2U

      3 July 2025
    • Opinion

      A smarter approach to digital transformation in ICT distribution

      15 July 2025

      In defence of equity alternatives for BEE

      30 June 2025

      E-commerce in ICT distribution: enabler or disruptor?

      30 June 2025

      South Africa pioneered drone laws a decade ago – now it must catch up

      17 June 2025

      AI and the future of ICT distribution

      16 June 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CambriLearn
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Building efficiency into SMEs’ cybersecurity investments

    Building efficiency into SMEs’ cybersecurity investments

    Promoted | There is an alarming tendency for smaller organisations and those operating niche sectors to believe they are somewhat immune to cyber threats.
    By Arctic Wolf30 January 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    There is an alarming tendency for smaller organisations and those operating niche sectors to believe they are somewhat immune to cyber threats. This is a particularly dangerous view – for several reasons.

    Larger organisations often have a more strategic focus on cybersecurity, as well as the massive budgets needed to have large security teams, and to implement all the tools and solutions they need to defend themselves.

    In smaller companies, too often security is an afterthought, and threat actors know this. They might have antivirus and some basic security tools in place, but when it comes to being strategic about cybersecurity, they are severely lacking.

    In smaller companies, too often security is an afterthought, and threat actors know this.

    Smaller businesses erroneously believe they will not be targeted because they are neither well known, nor have anything significant of value. This is a dangerous assumption as we are noticing that SMEs are being targeted more often, and with greater frequency.

    This is because bad actors understand that SMEs simply don’t have the same measures in place as their corporate counterparts, often lack the necessary skills, and do not know where to begin on a cybersecurity journey.

    Many of these entities might have one or two staff looking after their IT investments, and while they are capable of managing infrastructure, and manning the IT support desk, they simply lack cybersecurity skills. The challenge then becomes how can they build a strategic security framework without any of the right skills or fundamentals in place, and how can they keep up with the tools in such a rapidly changing threat landscape.

    We see this as a massive gap in the SME and midsize market, and when we talk to these customers, our aim is to help them understand that even though their business is small, they can still be vulnerable and have their systems locked, their data stolen or their systems used as a stepping stone to gain a foothold into one of their third-party partners.

    ‘Most at risk’

    Something else we see in South Africa is that there are far more SMEs than large corporates. This is backed up by McKinsey, which claims that SMEs are the “lifeblood of South Africa’s economy, and also the most at risk”. According to the management consulting firm, SMEs represent a staggering 98%-plus of businesses in the country and employ between 50% and 60% of the workforce across all sectors.

    Concurrently, SMEs are looking for ways to make their environments more operationally efficient from multiple points of view. And because the benefits of the cloud are well documented, SMEs are looking to the cloud to save costs, enhance agility and scalability, and streamline operations. However, alongside these benefits, the cloud widens their attack surface and gives cybercriminals further ways to exploit these businesses.

    The bottom line is that they need to implement strong cybersecurity measures, particularly around their core businesses, and because they don’t have the in-house skills, they need to work with a partner who can take away a lot of the excess overhead and begin helping them drive a strategic security journey without having to cough up a fortune.

    Already, we see complexity as a major concern for SMEs. When looking to protect their organisations, they tend to fall into the trap of buying whatever is being touted as the latest and greatest point solution, falsely believing that upping their investment in security means they are better protected.

    SMEs tend to fall into the trap of buying whatever is being touted as the latest and greatest point solution

    However, this is not the case, because more tools do not equal better security. In fact, the opposite might be true as the more solutions a company has, the less likely they are to interact well with each other, which results in an unmanageable level of complexity. Threat actors thrive when complexity in the infrastructure leads to confusion and inefficiency. There are also too many conversations with too many suppliers and too much going on, and no single view of their environment or a set process that needs to be followed.

    Once we start having these conversations with SME customers, they start understanding that they do not have to invest heavily in the latest tools and solutions; they simply need to work with a business that can help them get the most out of the solutions they have and focus on the operational efficiency of cybersecurity.

    When approaching a new SME customer, what is key is understanding what they have in place and where they need to get to. Once this discussion has happened, we can guide them on the next steps to take and help them to build a service offering that meets their unique requirements and works with their existing investments.

    Fortunately, Arctic Wolf has a completely different mindset when it comes to cybersecurity. We have a highly open architecture that gives us the ability to take customers on board, use their current tools and build those into their security journey to enrich those solutions to get better value out of them.

    Ultimately, it’s not only about trying to make our SME customers more operationally efficient but building efficiency into their existing cybersecurity.

    About Arctic Wolf
    Arctic Wolf is the market leader in security operations. Using the cloud-native Arctic Wolf Platform, we help companies end cyber risk by providing security operations as a concierge service. Highly trained Triage and Concierge Security experts work as an extension of internal teams to provide 24×7 monitoring, detection and response, ongoing risk management and security awareness training to give organisations the protection, resilience and guidance they need to defend against cyber threats.

    • The author, Jason Oehley, is regional sales manager for Arctic Wolf South Africa
    • This promoted content was paid for by the party concerned


    Arctic Wolf Jason Oehley
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleConvergence Partners secures R5.1-billion for infrastructure fund
    Next Article What is omnichannel customer experience analytics, and how should you use it?

    Related Posts

    Remote monitoring tools: IT lifesavers or hacker gateways?

    7 July 2025

    Key trends from Arctic Wolf’s 2024 Incident Response Report

    25 April 2025

    South African businesses must rethink cyber risk in 2025

    30 January 2025
    Add A Comment

    Comments are closed.

    Company News

    Vertiv to acquire custom rack solutions manufacturer

    18 July 2025

    SA businesses embrace gen AI – but strategy and skills are lagging

    17 July 2025

    Ransomware in South Africa: the human factor behind the growing crisis

    16 July 2025
    Opinion

    A smarter approach to digital transformation in ICT distribution

    15 July 2025

    In defence of equity alternatives for BEE

    30 June 2025

    E-commerce in ICT distribution: enabler or disruptor?

    30 June 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.