#Cyber #security: A must-have for MSPs

The International Information System Security Certification Consortium – also known as (ISC)² – recently released a study revealing a 498,000-person shortfall within cyber security roles in North America.

The 2018 (ISC)2 Cybersecurity Workforce Study shows 63 percent of organizations have a shortage of IT staff dedicated to cyber security. And, as a result, 59 percent say their companies are at moderate or extreme risk of cyber security attacks.

With this obvious deficit in knowledge and skills – particularly within SMBs – it is increasingly falling to MSPs to step in to bridge the gap.

Today, security is often listed as one of the most important weapons in an MSP’s arsenal. IDC’s Worldwide Semiannual Security Spending Guide says managed security services will be the largest technology category in 2018, with firms spending nearly $18 billion for these services.

Fielder Hiss, VP of marketing and product management at software vendor Continuum, takes the argument one step further – he believes in these times of increasingly frequent and complex cyber attacks, MSPs will go out of business if they fail to offer managed security services to their customers.

“Security has become the path upon which businesses will evolve or die,” he told Channelnomics at the firm’s Navigate 2018 customer event in Boston last month. “This is now the pre-eminent problem that SMBs are facing.”

Alex Joy, VP of operations at Danvers, MA-based MSP Network Coverage, agrees. “Two years ago, you’d be hard pressed to get a meeting with a C-level in most SMBs to strictly discuss cyber security and the necessary investments in to it,” he tells Channelnomics.

“Fast forward to today and cyber security has become door openers for any MSP that understands the importance and is driving that importance to their customers… SMBs are absolutely feeling the urgency to protect themselves and their businesses, understanding that while they may not be large enough to incur headlines in the event of a data breach, they are certainly large enough to brought to their knees by a significant penetration and data theft.”


. . . . . . . .

Leave a Reply