Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

MSP burnout and cybersecurity — fight fire with fire

By Jeffrey Wheat
burnout-cyber-fp1170x658.png

Image by pch.vector via Freepik

August 17, 2022

Burnout is rampant in IT, with 2 in 5 professionals at high risk, according to the State of Burnout in Tech Report 2022. Managed Service Providers (MSPs) are acutely affected by the factors driving IT burnout. Cybersecurity is arguably the biggest of those factors, with one survey finding that up to 95% of cybersecurity professionals are “experiencing factors that make them more likely to resign in the next 12 months”.


Not Just Workers Are Burned Out

MSP owners are also getting burnt out. One such owner turned to Reddit to voice their frustration. “It was just a few years ago when I couldn't wait for Monday,” they said. “These days it's a different story.” 

They pointed out the stress caused by cybersecurity FUD (fear, uncertainty, and doubt). “Icing on the cake is our insurance agent is always scaring me half to death with all the stories about MSPs getting sued because they didn't install every latest and greatest cybersecurity solution for their client.”
 

Security Is ‘the Big One’ in MSP Burnout

Burnout might have reached peak public attention during the pandemic, but it hasn’t gone away. IT workers cite constantly being on call, excessive workloads, feeling a lack of control, and a lack of adequate intrinsic or extrinsic rewards as the main factors leading to burnout. In all of these aspects, cybersecurity outdoes itself.

Firstly, the consequences of failure in security are stress-inducing. The potential legal, financial, and, reputational damages can be far-reaching. Anyone who has lived through incident management following a serious breach or ransomware attack can tell you that it can be days of very little sleep and some of the highest stress levels you can experience. An unexpected alert can mean dropping whatever you are doing to start remediation.

Cybersecurity can be significantly more complex than other IT services. Many tools are complex, not intuitive, and clamor for attention with endless false alerts. Amid all the vendor over-sell, it can be hard to discern between what’s providing value and what’s just hype.

Cybersecurity is a marathon, not a sprint. Often operators need to jump between multiple screens and spend time prioritizing and researching every alert. If an operator runs this race to perfection their work goes unnoticed, while failure can be public and devastating.

 

Relieving MSP Burnout With Cybersecurity

As much as cybersecurity is emblematic of MSP burnout, it can also provide relief. Here are a few ways to fight fire with fire.

  1. Consolidate your offering. Some opportunities will deliver minuscule upsides while demanding lots of time and initial investment. Delivering every latest-and-greatest cybersecurity tool is incredibly taxing. Monitor the time you are spending on each tool and the value that it is delivering. One way you can do that is by looking at the number of compromises that the security system is producing and how that number changes over time. If you can’t measure your cybersecurity system, you can’t improve it.
  2. Set security expectations for clients. Set a baseline of what you expect your client to do to keep themselves safe, and if necessary provide training on it. Here’s an example of a baseline that an MSP sets for their clients.
  3. Look for security solutions that provide a multi-view. Many cybersecurity solutions are built for enterprises and not with MSPs in mind. MSPs need to be able to see what’s happening at all of their clients from a single screen. Screen fatigue is common in IT, but portal fatigue at MSPs is to be reckoned with. Look for tools that integrate with your existing IT service management solution. The more data on the ticket, the better.
  4. Take advantage of automation. Repetitive tasks can be automated away, but automating incident remediation can save a lot of stress. You can gain peace of mind by setting up your system so that any incoming attack is immediately blocked. For example, contact with a known bad location never ends well, so blocking that access is obvious and lends itself to automation. That means that operators can spend more time with their families before managing the mitigation of the threat during business hours.

 

Take Advantage of Technology

Cybersecurity is guilty of some of the worst trends in IT. Complexity, high stakes, and excessive support demands make it one of the leading causes of MSP burnout. Despite advances, the work of cybersecurity professionals is only getting harder. I can only urge you to take advantage of those technologies that seek to reverse the trend.

KEYWORDS: burnout cyber security risk management technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeffrey Wheat is the Chief Technology Officer at Lumu Technologies. A cybersecurity veteran with over 35 years of cybersecurity experience stretching from the Department of Defense to the boards of multinationals, Wheat takes pride in building cybersecurity solutions that integrate people, technology, and procedures — in that order.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Newswire

    Border Patrol Agent Killed During Night Fire Fight; DHS Secretary Mourns Loss

    See More
  • fire 1 feat

    Swedish Ice Hotel Rebuilt with Fire Alarms

    See More
  • Expo Seguridad Mexico to Co-Locate with NFPA, Mexico Fire Expo

    See More

Related Products

See More Products
  • highriseproductphoto

    High-Rise Security and Fire Life Safety, 3rd edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing