Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceCybersecurity News

Security budget battles in the age of COVID-19

By JJ Cranford
SEC1219-cyber-Feat-slide1_900px
November 17, 2020

Budget bandwidth is often a strong contention point for businesses. And even with the increase in cybercrime threats, some firms still struggle to allocate proper budget allowances to meet security and regulatory requirements. According to a recent report by Accenture, organizations face on average 22 legitimate security breaches each year and the average cost of a single cyberattack is $380,000.

While the majority of business leaders and organizations understand the risks and potential impacts of cybercrime, oftentimes it is not prioritized from a budget perspective. Perpetual budget concerns have combined with the global pandemic, the strained global economy and the nearly overnight shift to remote work to produce two major challenges for security teams.

The first challenge presented by COVID-19 was a reduction in budgets for the majority of businesses. A recent global survey revealed two in five organizations opted to reduce cybersecurity budgets in order to cut costs as a result of COVID-19.

Secondly, COVID-19 caused the majority of organizations to shift to remote working in uncontrolled environments from more traditional working environments in which employees connected to their company networks via controlled office spaces.

This shift to remote significantly increased the number and variety of devices, connections and third-party services used by employees. Although many organizations had technology in place for remote work implementation (i.e. collaboration tools and teleconferencing) there is still added risk for security due to difficult-to-control remote working environments.

 

Understanding your cyber risk

In order for organizations to successfully manage and protect their data, it is necessary to understand the intricacies of their information and how it is stored. The following questions should be addressed in order to properly do this:

  • How and where is the company’s sensitive information stored?
  • What types of data are considered sensitive?
  • Who has access to the sensitive data?
  • What circumstances determine how sensitive data is accessed?
  • What procedures are in place to alert the appropriate teams and individuals when pertinent information moves locations?
  • What systems are in place to defend against unauthorized use (i.e. by potential cybercriminals) attempting to breach sensitive information?

Organizations that work to answer these questions will ideally then have the knowledge to accurately assess risk, create a plan and determine the most effective approaches in managing their information now and in the future. Additionally, answering these questions will provide a better understanding of data locations, security posture and access, which in turn establishes the foundation to managing both security and risk.

 

Adopting an on-defense mentality

The majority of organizations have adopted “defense-in-depth” strategies, which is a multilayer defense approach that analyze perimeters, network streams and accounts for endpoints and devices. This type of strategy has been adopted to improve the overall resilience of an organization. Organizations that have adopted these types of strategy are on the right path to securing their businesses; but they must realize and understand that while the technology to stop attacks at the perimeter is, it is not sufficient and not proven to completely protect against advanced and targeted cyberthreats and attacks. Endpoint visibility and control is essential in discovering and mitigating the impact and long-term effects of active and ongoing breaches as they may have already penetrated standard firewalls and anti-virus technologies.

More so than before due to reduced budgets and skilled labor shortages, organizations are recognizing the automation and efficiency gains provided by endpoint detection and response solutions. It is important to use multiple data analytics techniques and modern EDR tools to detect any suspicious system behaviors. EDR tools provide contextual information to security teams by automatically blocking malicious activity and proactively providing remediation suggestions and workflows to reduce downtime of impacted systems.

Finally, the continuous loop of endpoint data collection and analysis is critical for any organization to understand what is happening if a breach threat occurs. Additionally, the endpoint data will also be vital to ensuring ongoing regulatory compliance, reporting and verification should an incident occur.

 

What’s next for enterprise security

While the post-pandemic world seems closer in some regards, COVID-19 still presents a lot of uncertainty for organizations as the spike in cybercrime will likely continue. Organizations will need to either further embrace or transition to digital-first mentalities and with this business priorities must include cybersecurity prevention measures.

Notably, given the growing rate of cybercrime and cyber risks, there is a real need to prioritize education around cybersecurity for the next generation of IT and security professionals. This is especially needed due to the prominent and ongoing skilled labor shortages.

Digitization continues to bring the world closer and connect the world far more than ever before. While technology provided enterprise resilience in the midst of the COVID-19 pandemic, it has also increased cybersecurity risks. Along with this increase in connectivity, the ever-growing value of privacy and data protection has grown and exposed the great need for enterprise-grade endpoint detection and response solutions to reduce cyber risk and address threats before a breach occurs.

KEYWORDS: budget cuts cyber security information security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

JJ Cranford is OpenText's Senior Product Marketing Manager.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Risk Management, Insider Threats and Security Leaders in the Age of COVID-19

    See More
  • video management

    Video technologies help retailers deliver a safe in-store shopping experience in the age of COVID-19

    See More
  • mass notification freepik

    How to optimize critical communications in the age of COVID-19 (and beyond)

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing