IT Security FAQ
Clear answers to every question about managed security, penetration testing, compliance, vCISO services, breach response, and what cybersecurity actually costs for a business your size.
50 questions across 8 categories
Getting Started
What is the most important first step in building a security program?
The most important first step is an honest risk assessment or gap analysis. You cannot protect what you don't know you have, and you cannot prioritize spending without understanding your specific risks. Before buying tools, map your data, understand your compliance obligations, and identify your critical business functions.
How much should a small business spend on cybersecurity?
As a general benchmark, SMBs should expect to spend 10-15% of their total IT budget on cybersecurity, or roughly $1,500 to $3,500 per employee per year depending on industry and compliance requirements. Businesses with heavy compliance needs (like healthcare or defense contractors) often spend more.
Do small businesses really get targeted by hackers?
Yes. In fact, small businesses are often the preferred targets because they typically have weaker defenses and are viewed as easy entry points to larger enterprise supply chains. Automated attacks don't discriminate by size; they look for known vulnerabilities on the internet, which small businesses frequently leave unpatched.
What is a security policy and why do I need one?
A security policy is the foundational document that defines your organization's rules and expectations regarding the protection of information assets. You need one because technology controls alone cannot enforce human behavior, and essentially every compliance framework or cyber insurance application requires written policies.
Should I hire in-house security staff or outsource?
For most businesses under 500 employees, outsourcing to a qualified MSSP or MDR provider is more cost-effective than hiring a full-time security team. A single experienced security analyst costs $120K-$180K fully loaded, while an MSSP can provide 24/7 coverage for $3K-$15K per month. Once you exceed 500 employees or have complex compliance needs, a hybrid model with a vCISO plus managed services often makes the most sense.
What are the most common ways businesses get breached?
The top three attack vectors are phishing emails (responsible for over 90% of breaches), compromised credentials (especially when multi-factor authentication isn't enabled), and unpatched software vulnerabilities. Ransomware often enters through one of these three doors. Addressing these three areas eliminates the vast majority of risk for most organizations.
Is cybersecurity insurance worth it?
Yes, but it is not a substitute for actual security controls. Cyber insurance covers financial losses from incidents like ransomware, data breaches, and business interruption. However, insurers are increasingly requiring evidence of specific controls (MFA, EDR, backups, security awareness training) before issuing policies, and claims can be denied if you misrepresented your security posture on the application.
Managed Security & MSSPs
What is the difference between an MSSP and an MDR provider?
An MSSP (Managed Security Service Provider) typically focuses on alert generation and managing tools like firewalls and SIEMs, often putting the burden of investigation back on you. MDR (Managed Detection and Response) goes a step further with dedicated human analysts who investigate threats and actively contain them (e.g., isolating an infected machine) without waiting for your approval.
What does 24/7 security monitoring actually mean?
True 24/7 monitoring means you have a Security Operations Center (SOC) staffed by human analysts watching your network continuously, capable of responding to an alert at 3 AM on a Sunday. Beware of services that merely forward automated alerts after hours or rely solely on an automated playbook without human validation.
How do I know if my MSSP is doing a good job?
A good MSSP should provide transparent reporting that shows not just alert volume, but meaningful metrics like Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR). You should also regularly conduct third-party penetration testing to validate their detection capabilities—if a pen tester breaches your network and the MSSP doesn't notice, they are failing.
What should an MSSP cost per month?
Pricing varies by scope, but legitimate MSSP services for a 50-200 person company typically range from $3,000 to $15,000 per month. Anything significantly below that range likely involves automated-only monitoring without real human analysts. Per-endpoint pricing usually runs $15-$50 per endpoint per month for comprehensive MDR coverage.
What is a SOC and do I need one?
A Security Operations Center (SOC) is a centralized team that monitors, detects, and responds to security threats around the clock. Most SMBs cannot justify building their own SOC (it requires 8-12 analysts for true 24/7 coverage), which is why outsourcing to an MSSP or MDR provider that operates a SOC on your behalf is the practical approach.
Can I use my IT provider for security too?
Your general IT MSP (Managed Service Provider) and your security provider can be the same company, but they often shouldn't be. IT operations and security have fundamentally different incentives—IT wants to keep things running smoothly, while security sometimes needs to slow things down or restrict access. At minimum, ensure whoever handles your security has dedicated security analysts and tooling separate from their helpdesk operations.
Penetration Testing
What is the difference between a vulnerability scan and a penetration test?
A vulnerability scan is an automated process that identifies known flaws in systems based on a database of signatures, typically resulting in a long, unprioritized list of potential issues. A penetration test involves a human expert actively attempting to exploit those vulnerabilities, chaining them together to demonstrate real-world business risk.
How often should I get a penetration test?
For most organizations, an annual penetration test is the baseline standard, often mandated by compliance frameworks like SOC 2 or PCI-DSS. However, you should also test immediately after any significant changes to your infrastructure, major application updates, or following a security incident.
What is the difference between black box, grey box, and white box testing?
Black box testing simulates an external attacker with no inside knowledge—the tester starts with only your company name. Grey box testing gives the tester some information like user credentials or network diagrams, simulating a compromised employee account. White box testing provides full source code and architecture documentation for the deepest possible analysis. Grey box is the most common and usually the best value for most organizations.
Why does a legitimate pen test cost $10,000 or more?
A real penetration test requires skilled human analysts spending 40-160+ hours manually testing your systems, writing custom exploits, and producing a detailed report with remediation guidance. Anything under $5,000 for a network pen test is almost certainly an automated scan relabeled as a pen test. You are paying for the expertise of the tester, not the output of a tool.
What certifications should my pen tester have?
The gold standard certifications for penetration testers are OSCP (Offensive Security Certified Professional), GPEN (GIAC Penetration Tester), and CREST. For web application testing, look for OSWE or GWAPT. CEH (Certified Ethical Hacker) alone is generally considered insufficient—it tests knowledge but not practical skill. Always ask for sample reports and references as well.
What should a good pen test report include?
A quality report includes an executive summary for leadership, detailed technical findings with CVSS severity scores, proof-of-concept evidence (screenshots, commands used), specific remediation recommendations prioritized by risk, and a retest verification process. If you receive a report that is mostly auto-generated scanner output, you did not get a real pen test.
Compliance Frameworks
What is the difference between SOC 2 Type I and Type II?
A SOC 2 Type I report assesses the design of your security controls at a specific point in time ('Are the right policies in place today?'). A Type II report evaluates the operating effectiveness of those controls over a period of time, usually 6 to 12 months, proving that you actually follow your policies consistently. Type II is what most enterprise customers require.
Do I need SOC 2 if I'm not a SaaS company?
While SOC 2 is standard for SaaS, any B2B service organization that stores, processes, or transmits sensitive customer data may be asked for one. If enterprise prospects are consistently demanding a SOC 2 report during the procurement process and you are losing deals because you don't have one, it's time to invest in it.
What does HIPAA actually require for IT security?
HIPAA's Security Rule requires administrative safeguards (policies, training, risk assessments), physical safeguards (facility access, workstation security), and technical safeguards (access controls, audit logs, encryption, integrity controls). The most commonly cited failures in HIPAA audits are lack of a current risk assessment, insufficient access controls, and missing encryption on portable devices and email.
How long does it take to achieve SOC 2 compliance?
From a standing start with no existing security program, expect 6-12 months to achieve a SOC 2 Type I report and an additional 6-12 months of operating under those controls before you can get a Type II. If you already have good security hygiene, the timeline can be compressed to 3-6 months for Type I. Budget $50K-$150K for the audit itself plus internal effort.
What is PCI-DSS and who needs it?
PCI-DSS (Payment Card Industry Data Security Standard) applies to any organization that stores, processes, or transmits credit card data. If you accept credit card payments—even through a third-party processor—you have some level of PCI-DSS obligation. The scope of your requirements depends on your transaction volume and how you handle card data.
What is the FTC Safeguards Rule and does it apply to me?
The updated FTC Safeguards Rule applies to non-banking financial institutions including auto dealers, mortgage brokers, tax preparers, real estate settlement companies, and other businesses that handle consumer financial data. It mandates specific technical controls including encryption, MFA, access controls, and a designated Qualified Individual overseeing your security program.
What is CMMC and who needs it?
CMMC (Cybersecurity Maturity Model Certification) is required for any contractor or subcontractor working with the U.S. Department of Defense that handles Controlled Unclassified Information (CUI). There are three levels, with Level 2 (based on NIST SP 800-171) being the most common requirement. Third-party assessment is required for Level 2 and above.
vCISO & Security Leadership
What does a vCISO actually do?
A vCISO (Virtual Chief Information Security Officer) provides strategic security leadership on a fractional basis. This includes developing your security strategy and roadmap, overseeing compliance efforts, managing vendor relationships, presenting risk posture to leadership and the board, leading incident response, and building your security program—without the $250K-$400K fully-loaded cost of a full-time CISO.
When does a vCISO make more sense than a full-time CISO?
A vCISO is typically the right choice when your organization has 50-1,000 employees, needs strategic security leadership but can't justify a $250K+ salary, is facing a compliance deadline or board pressure for a security program, or needs to bridge the gap while searching for a full-time hire. Once you need more than 20+ hours per week of CISO-level attention, a full-time hire becomes more cost-effective.
How much does a vCISO cost?
vCISO services typically range from $3,000 to $15,000 per month depending on hours, scope, and the provider's experience. Be skeptical of anything below $2,000/month—that's not enough time to meaningfully lead a security program. Most engagements are 10-20 hours per month with an initial ramp-up period of heavier involvement.
What is the difference between a vCISO and an MSSP?
An MSSP provides operational security services—monitoring, alerting, and responding to threats in real time. A vCISO provides strategic security leadership—deciding which risks to prioritize, what tools to buy, how to structure your security budget, and how to present security posture to the board. Most organizations need both: the MSSP runs the day-to-day, and the vCISO ensures it all fits into a coherent strategy.
Incident Response & Breach Recovery
What should I do in the first hour of a suspected breach?
First: don't panic, and don't turn off systems (you may destroy forensic evidence). Immediately activate your incident response plan, notify your IR retainer provider if you have one, isolate (not power off) affected systems from the network, preserve all logs, and begin documenting everything you observe with timestamps. Do not communicate about the incident over potentially compromised channels.
Should I pay a ransomware demand?
This is a business decision with no universally correct answer. Consider: paying does not guarantee data recovery (about 20% of companies that pay never get their data back), payment may violate OFAC sanctions if the attacker is in a sanctioned country, and payment funds future attacks. However, if your business will cease to exist without the data, paying may be the pragmatic choice. Always consult legal counsel and your cyber insurance carrier before making this decision.
What is an incident response retainer and should I have one?
An IR retainer is a pre-negotiated agreement with a specialized incident response firm guaranteeing a defined response time (typically 2-4 hours) when you experience a security incident. Without a retainer, you'll be calling firms in a panic during the worst moment of your career, negotiating rates while your network burns. Most retainers cost $3,000-$10,000 per year and are often partially covered by cyber insurance.
Do I have to notify customers after a data breach?
In the United States, all 50 states plus DC have breach notification laws with varying requirements. Generally, if personally identifiable information (PII) was accessed or exfiltrated, you must notify affected individuals within a specified timeframe (often 30-60 days). HIPAA, GDPR, and other frameworks have their own notification requirements. Always consult legal counsel immediately—notification obligations are complex and penalties for non-compliance can be severe.
How long does it typically take to recover from a ransomware attack?
The average ransomware recovery takes 22 days for organizations with good backups and an IR plan, and 60+ days for those without. Full recovery including forensic investigation, system rebuilding, policy updates, and regulatory compliance can take 3-6 months. During this time, many businesses operate at significantly reduced capacity.
What is digital forensics and when do I need it?
Digital forensics is the process of collecting, preserving, and analyzing electronic evidence after a security incident. You need forensics when you must determine how an attacker got in, what data was accessed or exfiltrated, and whether the threat has been fully contained. Forensic investigation is also typically required for cyber insurance claims, legal proceedings, and regulatory breach notifications. Never attempt to investigate on your own without preserving evidence—improper handling can destroy crucial data and complicate legal proceedings.
Security Tools & Technology
What is EDR and how is it different from antivirus?
Traditional antivirus relies on signature-based detection—it recognizes known malware but misses new or modified threats. EDR (Endpoint Detection and Response) uses behavioral analysis to detect suspicious activity patterns, can isolate infected endpoints remotely, and provides forensic investigation capabilities. In 2024, traditional antivirus alone is insufficient; EDR is the baseline expectation for any serious security program.
Do I need a SIEM?
A SIEM (Security Information and Event Management) collects and correlates logs from across your environment to detect threats. If you're a smaller organization (under 200 employees), you likely don't need your own SIEM—your MSSP/MDR provider should handle this. If you're larger or have compliance requirements demanding log retention and centralized monitoring, a SIEM becomes important, though cloud-based options have made it more accessible.
What is zero trust and should I implement it?
Zero trust is a security model based on the principle of 'never trust, always verify'—no user, device, or network segment is automatically trusted. In practice, this means implementing strong identity verification (MFA), least-privilege access, micro-segmentation, and continuous monitoring. Full zero trust is a journey, not a product you buy. Start with MFA everywhere, then move to conditional access policies and network segmentation.
Is cloud infrastructure more secure than on-premises?
Major cloud providers (AWS, Azure, GCP) invest billions in security infrastructure that no individual company can match. However, cloud security is a shared responsibility—the provider secures the infrastructure, but you're responsible for your data, access controls, and configuration. Most cloud breaches result from customer misconfiguration, not provider failures. Done correctly, cloud is generally more secure than on-premises for most organizations.
What is MFA and why is it so important?
Multi-Factor Authentication (MFA) requires users to provide two or more verification factors to access an account—typically something they know (password) plus something they have (phone app or hardware key). MFA blocks over 99% of automated credential attacks. It is the single most impactful security control you can implement and is now required by virtually every cyber insurance policy and compliance framework.
What is security awareness training and does it actually work?
Security awareness training educates employees about threats like phishing, social engineering, and password hygiene, typically through short monthly modules and simulated phishing campaigns. Research shows that organizations with consistent training programs reduce phishing click rates from 30%+ to under 5% within 12 months. The key word is consistent—a one-time annual training has minimal lasting impact.
Costs & Budgeting
What does a comprehensive security program cost for a 100-person company?
A typical 100-person company should budget approximately $150K-$300K annually for a comprehensive security program. This breaks down roughly as: MDR/MSSP services ($5K-$10K/month), annual pen test ($15K-$25K), security awareness training ($3K-$5K), endpoint protection ($5K-$8K), vCISO or security consulting ($5K-$10K/month), and compliance audit costs ($30K-$80K). The exact number depends heavily on your industry and compliance requirements.
How much does a data breach actually cost?
According to IBM's 2024 Cost of a Data Breach Report, the average total cost of a data breach is $4.88 million globally and $9.36 million in the United States. For SMBs, the average is lower but proportionally more devastating—$120K to $1.24M depending on size, often enough to threaten business viability. These costs include forensic investigation, legal fees, notification, regulatory fines, lost business, and reputational damage.
Are there any free security tools worth using?
Yes. Several free tools provide genuine value: Microsoft Defender (built into Windows), CrowdSec (community-driven intrusion prevention), OWASP ZAP (web application scanning), Have I Been Pwned (credential monitoring), and Google Workspace/Microsoft 365 built-in security features. However, free tools require expertise to configure and monitor—they don't replace a managed security service for organizations without dedicated security staff.
How do I justify security spending to my CEO or board?
Frame security as business risk management, not IT cost. Present the cost of a breach in your industry (use IBM's data), show the compliance requirements that could result in fines or lost contracts, reference cyber insurance requirements, and compare your current spending to industry benchmarks. The most compelling argument is often revenue-driven: 'We cannot close Enterprise Customer X without SOC 2' or 'Our insurance will be denied or doubled without these controls.'
What is the ROI of investing in cybersecurity?
The ROI of cybersecurity is best measured in risk reduction rather than direct revenue generation. Consider that the average cost of a data breach is $4.88M globally, while a comprehensive security program for a 100-person company costs $150K-$300K annually. Beyond breach avoidance, measurable ROI includes: reduced cyber insurance premiums (often 15-30% lower with strong controls), ability to close enterprise deals requiring compliance certifications, avoiding regulatory fines, and reduced business downtime from security incidents.
Should I bundle security services from one vendor or use best-of-breed?
For most SMBs (under 500 employees), a bundled approach from a strong MSSP is more practical and cost-effective—you get integrated tools, a single point of contact, and simpler management. Best-of-breed makes sense for larger organizations with dedicated security teams who can manage multiple vendor relationships and integrate disparate tools. The worst approach is buying best-of-breed tools without the staff to properly configure and monitor them, which creates a false sense of security.
What security spending should I prioritize if my budget is limited?
If you can only afford a few things, prioritize in this order: (1) MFA on all accounts, especially email and VPN—this is often free or very cheap and stops the majority of attacks. (2) Endpoint Detection and Response (EDR) on all devices. (3) Security awareness training with phishing simulations. (4) Automated offsite backups with tested restore procedures. (5) A basic vulnerability management program. These five controls address 80%+ of the risk landscape for most SMBs at a fraction of the cost of a full security program.
How do security costs change as my company grows?
Security costs don't scale linearly—they tend to step up at certain thresholds. At 1-50 employees, basic managed security and a few tools ($30K-$80K/year) suffice. At 50-200, you need more formal compliance, MDR, and possibly a vCISO ($100K-$300K/year). At 200-500, you typically need dedicated security staff, a SIEM, and formal compliance audits ($300K-$750K/year). Above 500, expect a dedicated security team, GRC platform, and enterprise tooling ($500K-$2M+/year). Planning for these thresholds prevents painful catch-up spending later.