One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8358177
Date de publication 2023-07-18 10:00:00 (vue: 2023-07-18 10:06:51)
Titre Gérer efficacement les budgets de sécurité dans une récession
Effectively managing security budgets in a recession
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  How can you effectively manage a security budget in a recession? An economic downturn will likely impact your team, so you must prepare to balance your cybersecurity needs with your spending limits. How will a recession impact security teams? Cyber attacks become more common during recessions because potential insider threats and fraud cases increase. On top of the risks, you likely must deal with reduced budgets and staff. Less flexible spending usually means you have to take on larger workloads. In addition, you face increased risk from anyone who was let go due to the economic downturn. They know your organization’s security vulnerabilities and how to exploit them if they want to retaliate. Cybercrime also gives them an opportunity to utilize their skills for financial gain. You must effectively manage your budget to prepare for such effects. Preparing security budgets for a recession Your organization will likely cut or limit your security budget, so you must prepare to handle increased security threats with less flexible spending. The key to an adequate long-term solution is to consider the returns you’ll get for each investment.  Consider a loan Getting a loan to boost your security budget may be a good approach if you need more flexibility with your expenses. However, you must be aware of transaction types to navigate the complexities of borrowing adequately. For example, hindering is the practice of keeping assets from creditors, which is fraud. Establish a relationship with a trustworthy lender before committing. In addition, you should ensure you fully understand your contract and repayment responsibilities.  Get cyber insurance Cyber insurance is a great consideration. You can justify the expense because a recession puts you at greater risk for data breaches and network intrusions. Since it typically covers damages, information restoration and incident response, it can put you in a better place financially.  Prioritize spending Prioritizing cybersecurity spending is the first step you should take to prepare your team for an economic downturn. Identify your compliance and essential security needs, and determine how to support them with a smaller budget. You can then take inventory of your technology and labor necessities and decide how to allocate funds properly.  Analyze technology needs You can only effectively manage your security budget if you fully understand what you’re working with. Take inventory of the hardware and software you possess, and categorize it. Even if you don’t have to cut your existing equipment, doing so may give you future spending flexibility. Identify what is essential to your team and isn’t, then decide what you can efficiently operate without. In addition to potentially saving you money in the long term, taking note of your equipment can inform your security decisions. For example, your cloud platform may be helpful for storage purposes but can also open you up to unique risks. Since everything is a potential attack surface, you may be better off operating with only the essentials. Assessing your technology may help you optimize spending, as well. You can recognize security gaps more quickly when you have an accurate inventory. It also allows you to patch, update and manage devices,
Envoyé Oui
Condensat  analyze  consider  focus  get  increase  leverage  prioritize  reconsider accurate addition adequate adequately adjust adopt affordable align allocate allocating allows also any anyone approach architecture are article artificial assessing assets assistance at&t attack attacks author automating automation aware balance balancing because become becomes before benefits better boost borrowing breach breaches budget budgeting budgets burnout but can cases categorize causes challenge chance cloud committing common complete complexities compliance compromises consider consideration content continue continuous contract controlled cost could covers creditors critical crucial cut cyber cybercrime cybersecurity damages data days deal dealing decide decisions department’s despite determine devices does doing don’t downturn downturns driven due during duties each earlier economic effective effectively effects efficiently employee endorse ensure equipment error essential essentials establish even everything example excellent existing expense expenses expensive experiencing exploit face factor feel financial financially first flexibility flexible focusing fraud from fully funds future gain gaps get getting give gives goes good great greater handle handling hardware have help helpful high hindering how however human identify impact incident increase increased inform information initial initially input insider insurance intelligence intrusions inventory investment involvement isn’t issues it’s its justify keep keeping key know labor large larger layered lender less let likely limit limited limits loan long longer main make making manage manageable management managing many may means million mitigate money more most multi must navigate necessary necessities need needs network not note off only open operate operating opportunity optimize organization organization’s organizations outsource over own party patch place platform platforms positions possess post potential potentially practice preparation prepare preparing prioritize prioritizing productive properly provide provided purposes put puts quickly recession recession’s recessions recognize reconsider reduce reduced reducing reevaluate relationship relationships repayment require respond response responsibilities responsibility restoration retaliate retention returns risk risks role routinely run save saved saving scale seconds security see services shortage should significant simplifying since situations skills smaller software solely solution some speed spend spending stabilize stacks staff step storage strategy such support surface systems take taking tasks team team’s teams tech technology term than them then they’re third those threaten threats top toward training transaction trustworthy types typically understaffing understand unique update upskilling use using usually utilize vendor vendors views vulnerabilities want ways well what when which who will without workflows working workload workloads worth you’ll you’re your
Tags Vulnerability Cloud
Stories
Notes ★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: