TechDogs-"73% Of Security Professionals Say Theyve Missed, Ignored Or Failed To Act On A High Priority Security Alert"

Networking Solutions

73% Of Security Professionals Say Theyve Missed, Ignored Or Failed To Act On A High Priority Security Alert

By Business Wire

Business Wire
Overall Rating

New survey from Coro reveals SME security professionals are overwhelmed by their security workload; the time spent managing, monitoring, and updating multiple tools in their security stack takes focus away from critical security events

NEW YORK--(BUSINESS WIRE)--Coro, the leading cybersecurity platform for small and medium-sized enterprises (SMEs), today announced the results of its 2024 SME Security Workload Impact Report, revealing that cybersecurity professionals are overwhelmed by the complexity and demands of managing multiple tools in their security stack, leading them to miss critical severity events and weaken their company’s security posture.

The survey was conducted with 500 U.S. cybersecurity decision makers in companies of 200 to 2000 employees across a broad variety of industry sectors. SME and midmarket companies are facing increasing volumes and complexity of cyberattacks, yet lack the resources and expertise for adequate defense. Cybersecurity is typically handled by a company’s IT staff, who become quickly overwhelmed by the complexity and responsibilities of managing their company’s cybersecurity program.

According to the survey, 73% of SME security professionals have missed, ignored or failed to act on critical security alerts, with respondents noting a lack of staff and a lack of time as the top two reasons. Respondents gave feedback on the most time-consuming parts of their day, including monitoring security platforms, managing and updating endpoint devices and agents, vulnerability management or patching, and installing, configuring, and integrating new security tools.

Key findings include:

  • Respondents spend an average of 4 hours 43 minutes managing their cybersecurity tools every day, with an average 11.55 tools in their security stack
  • 52% of respondents said the most time consuming task was monitoring security platforms, followed by vulnerability patching
  • Respondents estimated it takes 4.22 months for a new cybersecurity tool to become operational; with equal time spent on installation, configuration, training staff and integration with their existing security stack
  • On average, respondents manage 2029.91 end point security agents installed across 655.92 endpoint devices
  • More than half (53%) of respondents must deal daily or weekly with vendors’ updates of these endpoint agents

The workload complexity facing security professionals, and the overwhelming demands it places on already limited resources, are driving SMEs and midmarket companies to consolidate their cybersecurity tools. A staggering 85% of respondents say they are looking to consolidate their tools in the next 12 months. The most important benefit cited was improving their security posture.

"SMEs are stuck in a cybersecurity hell, constantly overwhelmed by the thousands of alerts generated by their enterprise security tools that do not fit,” said Guy Moskowitz, Coro CEO and Co-Founder. “The reality is that enterprise security tools – designed for large teams with endless resources – have failed SMEs. With limited staff, SMEs struggle with the complexity of managing their security, torn between budget constraints, limited resources, and the need for much better security coverage -- this is mission impossible. The most effective way for SMEs to escape this cybersecurity hell is to adopt a single platform that covers the entire security span and is designed to reduce workloads through one dashboard and one endpoint agent.”

The SME Security Workload Survey was conducted on behalf of Coro by OnePoll in late 2023. The results can be found here.

About Coro

Coro, the leading cybersecurity platform for the SME market, revolutionized cybersecurity with the introduction of the world’s first modular cybersecurity platform in 2023. Coro’s platform empowers organizations to easily defend against malware, ransomware, phishing, data leakage, network threats, insider threats and email threats across devices, users, networks and cloud applications. Coro’s platform automatically detects and remediates the many security threats that today's distributed businesses face, without IT teams having to worry, investigate, or fix issues themselves. Ranked on the 2023 Deloitte Technology Fast 500, Coro is one of the fastest growing cybersecurity companies in North America today.

For more information, please visit Coro at coro.net, or via LinkedIn, Twitter or Facebook.

Contacts

Tila Pacheco
Eskenzi PR for Coro
tila@eskenzipr.com

First published on Wed, Apr 17, 2024

Enjoyed what you've read so far? Great news - there's more to explore!

Stay up to date with the latest news, a vast collection of tech articles including introductory guides, product reviews, trends and more, thought-provoking interviews, hottest AI blogs and entertaining tech memes.

Plus, get access to branded insights such as informative white papers, intriguing case studies, in-depth reports, enlightening videos and exciting events and webinars from industry-leading global brands.

Dive into TechDogs' treasure trove today and Know Your World of technology!

Disclaimer - Reference to any specific product, software or entity does not constitute an endorsement or recommendation by TechDogs nor should any data or content published be relied upon. The views expressed by TechDogs’ members and guests are their own and their appearance on our site does not imply an endorsement of them or any entity they represent. Views and opinions expressed by TechDogs’ Authors are those of the Authors and do not necessarily reflect the view of TechDogs or any of its officials. All information / content found on TechDogs’ site may not necessarily be reviewed by individuals with the expertise to validate its completeness, accuracy and reliability.

Tags:

Coro Network Security Cybersecurity Cloud Applications Cyberattacks

References:

Join The Discussion

  • Dark
  • Light