Planning Your Cybersecurity Budget for 2023

For many organizations, this is the time of year for forecasts and budgets for the upcoming year. From an IT perspective there are many considerations but there is no denying that cybersecurity is top of mind for 2023, as it has been for the last several years. 

Let’s look at some of the considerations as organizations plan and budget from a cybersecurity perspective. 

The Basics 

A large majority of cyberthreats can be mitigated by having what experts refer to as good cybersecurity hygiene. Simply described, these are a set of tools and practices that are performed on a regular basis to maintain the security of an organization’s users, devices, networks, and data.  

Let’s look at some of these basic cybersecurity hygiene practices. 

Firewalls and routers

These are the most basic tools in cybersecurity. However, some of the problems we see as IT Service Providers are: 

  • Consumer grade solutions in business environments. The needs of organizations are very different from those of individuals or home users. The consequences of a cyber incident can also be very different for organizations versus individuals. Business grade solutions for organizations are a must. 
  • Misconfiguration – Organizations can have the best business grade solutions in the market but if they are not set up and configured properly, the organization remains at risk. Also, it is imperative that you have a look at the configurations from time to time to ensure they still meet the needs of the organization. 

Password Policies

Organizations must have strong password policies. Simple passwords, passwords that are recycled or passwords that are being used for personal and business purposes are an open door for cybercriminals to walk into an organization’s environment. Current standards dictate having passwords that are at least 12 characters long and include numbers, upper and lowercase letters, and symbols. However, as cyber criminals use more evolved tools to hack passwords, organizations will need to update their password strategy to keep up to date on the latest standards and trends. 

Patch Management

Again, this is a basic function that helps mitigate risk. Having a patch management process to prioritize patching of equipment, applications and tools, especially when they involve known security flaws, should be a critical part of your cybersecurity hygiene. 

Endpoint Detection and Response (EDR)

Antivirus solutions of old are now obsolete and useless against today’s sophisticated threat actors and their tools. EDR solutions that combine real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities are now part of the basic cybersecurity toolset.  

Multifactor Authentication (MFA)

We have heard a lot about the importance of MFA over the last few years. MFA requires multiple authentications of access to systems and applications. The reason for that is that it has proven to be effective in preventing the majority (98% according to Microsoft) of account-compromising attacks. It is not 100% foolproof but continues to be an excellent tool in mitigating cyberattacks. 

Cybersecurity Awareness Education and Testing

A cyber incident can be as close as someone clicking on a malicious link or visiting a malicious website. Educating the team members of organizations, from the executives to the office administrators, helps reduce the risks of a cyber breach and again is a basic cybersecurity hygiene requirement. 

Network Segmentation

Again a basic process which involves dividing a network into multiple segments, each acting as its own small network. This limits the damage and scope of a cyberattack should a threat actor get into an organization’s environment. 

Privileged Access Management

The restriction of access rights and permissions for users, accounts, applications, systems, devices, and computing processes to the absolute minimum necessary to perform routine, authorized activities. Restricting access rights and permissions helps organizations reduce their attack surface and mitigate the damage that can be caused by external attacks as well as from insider threats or negligence. 

Data Encryption

Protect sensitive, private, and confidential information by ensuring that you use data encryption solutions on devices and files and that the data is encrypted both as it moves inside and outside the organization (in transit) as well as when it is not in use (at rest). 

Backup

Having a backup strategy ensures that critical information is regularly duplicated and stored in a secure location. It is also important that the data is available and accessible should it be necessary to retrieve it due to a cyber incident, an error (mistakenly deleting a file) or a disaster, natural or otherwise (fire, hurricane, etc.). Best practices for backups include the following: 

  • Always have three copies of your data. Your production (in-use) data and 2 additional copies. 
  • Two additional copies which should be on different media ex: Cloud, external drive, Network Attached Storage (NAS) 
  • One offsite copy which can be cloud-based data replication or an external drive that is taken offsite 
  • One offline copy. This is also referred to as an air-gapped or immutable backup. This means that there is no connection between the Offline backup and the network 
  • Ensuring zero errors after data recovery which entails the ability to restore files and folders correctly. This means backups should be monitored and verified on a regular basis to ensure recoverability. 

The above are the basics when looking at your cybersecurity plan and budget for 2023. If any of these are missing or not implemented, they should be prioritized, planned, and budgeted for implementation without delay. 

Other Considerations for Cybersecurity Planning and budgeting for 2023 

Some of the other considerations for cybersecurity planning and budgeting, if the basics are covered, may involve: 

  • Compliance or privacy requirements based on your industry or market you are in. 
  • The evolution of cybercriminal tools, technology, and business models such as ransomware-as-a-service  
  • New or updated cybersecurity insurance requirements 
  • Geo-political or supply-chain considerations 

The thing that must be kept in mind about cybersecurity is that it is a journey. The best approach is to develop a process that continuously assesses the cybersecurity posture of organizations and adapts to the evolving landscape.  

MicroAge can help you with your cybersecurity journey. Contact us today to see how we can assist you. 

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

cybersecurity myths banner, mythes cybersécurité

Top 5 Cybersecurity Myths

The digital world has offered small businesses around the world with numerous options for growth and protection. However, it has also allowed myths and lies…

Read More
suspicious email suspect

5 Tips To Avoid Clicking On Suspicious Email Links

When it comes to emails, it can be easy to click on dubious links that install malware or unwittingly share your personal information. For this…

Read More
IT staffing

The Advantages of IT Resourcing Services for SMBs

Leveraging technology to achieve business goals is essential to SMBs. Technology helps businesses differentiate and compete in their respective industries and markets. It enables them…

Read More

How to Prepare for a Cybersecurity Incident

A recent report by research firm, CyberEdge Group, found that 85.7% of Canadian organizations experienced at least one cyberattack within a 12-month period in 2021….

Read More
Infrastructure informatique, IT infrastructure

5 Benefits of an Optimized IT Infrastructure

Is your current IT infrastructure helping your business thrive in its industry or creating obstacles for growth? If you’re still not using cloud technologies to…

Read More