- Community Home
- >
- Servers and Operating Systems
- >
- Servers & Systems: The Right Compute
- >
- How IT managers can sell cybersecurity to business...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
How IT managers can sell cybersecurity to business owners
There's more to cybersecurity than devices and services; it should be intertwined with business operations. But to make that happen, IT managers must speak the business owner's language.
Cybersecurity is often a puzzle for small and midsize businesses (SMBs). It's a challenging subject for business owners and executives who are unfamiliar with data protection, and leaders who are intimidated by it may end up overlooking vulnerabilities within their companies.
Cybersecurity shouldnโt be thought of as necessary evil, nor as an ever-growing cost center that returns little in the form of measurable value. Getting security right is a difficult undertaking, but it's crucial to protecting small and midsize businesses from cyber threats and securing customer data. It's far too big a problem for small businesses to ignore, writes The Atlantic. And it's up to IT managers help inform business owners' mindsets.
A lack of understanding among business leaders often hinders IT managers from properly securing systems and getting the funding, support, and direction needed to protect company assets and intellectual property. However, IT managers might share the blame; IT staff canโt always speak the executivesโ language, the vernacular of which is built upon concepts of costs, profits, and lossesโconsiderations often regarded as outside the realm of IT.
IT managers need to translate the language of cybersecurity into something that the business owner can comprehend. Here are a few ideas to get you started.
Actions speak louder than words
Many business owners put cybersecurity on the back burner to delay the cost of implementing a strong security plan. But procrastination can run up the tab even further, as a breach can cause irreversible damage, no matter the business's size. On average, it costs an SMB around $38,000 to recover from a breach, according to a Kaspersky Lab report. And 34% of breaches cause downtime, which Kaspersky estimates results in an average loss of $66,000.
Simply telling the business owner that cybersecurity is important may not have much of an effect. However, using the experiences of other SMBs as examples and citing stats like those mentioned above is likely to get their attention.
Cybersecurity requires the right tools
Some CEOs think that cybersecurity is all about active response, which translates to hours spent keeping SMBs secure. However, IT staffs also need to be equipped with passive tools to help them perform their duties. No business would hire a security guard and not spend money on locks, alarms, and fences.
Cybersecurity is a way of doing business
There's more to cybersecurity than devices and services. Security must be intertwined with business operations. Everyone who interacts with sensitive informationโwhether IT staff or end userโneeds to be properly trained in how to handle it.
Threats come from all directions
Many executives focus mainly on threats to IT security come from the outsideโhackers looking to compromise systems. But that ignores inside threats and compromises caused by unpatched systems or malware incursions. Cybersecurity must take a holistic approach that identifies all possible threat vectors and reacts to each threat accordingly.
Risk management and cybersecurity go hand in hand
Many executives focus on risk management but leave cybersecurity out of the equation. Loss of data services or proprietary information must be added to the concept of risk and calculated accordingly.
By acknowledging these points and taking action, IT managers at SMBs can change management's mindset and create an environment where cybersecurity rates as highly as any other business concern. It all comes down to speaking the right language and backing that language up with facts that demonstrate the benefits cybersecurity brings to any business.
Looking for more small-business solutions? Here's how HPE can help.
Ready to take the next step? Check out the SMB Hybrid IT for Dummies Guide. Because there are no "dumb" questions!
Learn more about HPE Small Business Solutions.
Or are you ready to purchase? Visit the HPE Store.
RobertChecketts
Robert has over 25+ years of IT Marketing and Product Management leadership experience spanning country, Regional and WW organizations. Robert is a marketing executive with extensive experience in field marketing, channel marketing and product marketing on a global basis and is driven to deliver SMBโs end-to-end affordable infrastructure thatโs secure from the start, optimized for every workload, packaged for many consumption models, ready to scale, and easy to manage.
- Back to Blog
- Newer Article
- Older Article
- Dale Brown on: Going beyond large language models with smart appl...
- alimohammadi on: How to choose the right HPE ProLiant Gen11 AMD ser...
- Jams_C_Servers on: If youโre not using Compute Ops Management yet, yo...
- AmitSharmaAPJ on: HPE servers and AMD EPYCโข 9004X CPUs accelerate te...
- AmandaC1 on: HPE Superdome Flex family earns highest availabili...
- ComputeExperts on: New release: What you need to know about HPE OneVi...
- JimLoi on: 5 things to consider before moving mission-critica...
- Jim Loiacono on: Confused with RISE with SAP S/4HANA options? Let m...
- kambizhakimi23 on: HPE extends supply chain security by adding AMD EP...
- pavement on: Tech Tip: Why you really donโt need VLANs and why ...
-
COMPOSABLE
77 -
CORE AND EDGE COMPUTE
146 -
CORE COMPUTE
130 -
HPC & SUPERCOMPUTING
131 -
Mission Critical
86 -
SMB
169