Monday, May 11, 2026
  • About
  • Advertise
  • Careers
  • Contact
NewsTrendsKE
  • Business
    • Deals
  • OpEds
  • Sustainability
  • Women in Business
  • Lifestyle
  • Featured
  • Technology
    • Phones
  • Sports
  • World
  • Contact Us
No Result
View All Result
NewsTrendsKE
No Result
View All Result

Home » Featured » ESET: Your cybersecurity investment reflects your approach to risk management

ESET: Your cybersecurity investment reflects your approach to risk management

2 hours ago
in Featured
Reading Time: 4 mins read
A A
Tony Anscombe, Chief Security Evangelist at ESET

Tony Anscombe, Chief Security Evangelist at ESET

Share on FacebookShare on TwitterShare on WhatsApp

Businesses routinely evolve alongside the challenges of their operating environments. If the challenge is power, they ensure they have a power backup. Organisations that cannot afford downtime invest in connectivity failover. 

And yet, when it comes to digital infrastructure, many businesses treat “security” as a separate, IT-delegated silo rather than a core pillar of operational performance and, in the worst-case scenario, survival. This is a mistake, because the era of viewing cybersecurity merely as a defensive IT function is well and truly over. Cyber risk is fundamentally a business risk, which means that true resilience demands a commercial, rather than a purely technical, approach.

Also Read

Boeing 737-700 Photo/Courtesy

Kenya Airways, Trace to bring Africa Forward Concert

11 May 2026
KCB Bank

KCB Introduces KShs. 20 Flat Fee on Pesalink, with Free Transfers Below KShs. 1,000

11 May 2026
Load More

What does this mean? If we are honest, security is often viewed as a grudge purchase. Imagine a boardroom where a Chief Information Security Officer requests a budget of about KES 77-million based on detailed threat modelling. The board reviews this and counters with approving KES 46-million. That KES 31-million difference is not a savings for the business. It is an unmitigated financial risk that the business has chosen to absorb. This is an important insight – the C-suite needs to translate technical vulnerabilities into bottom-line exposure.

Defining acceptable risk

Cybersecurity is not binary. In other words, you are not “safe” or “breached”. Cybersecurity is entirely about an organisation’s specific appetite for risk. By way of analogy, imagine two people walking into a Las Vegas casino with $200. They make their way to the roulette tables, where the first person puts the entire $200 on a single, high-risk number. That’s a high tolerance for risk. The second person spreads the bet across multiple, defensive layers.

Businesses, especially enterprise-level financial services institutions, are burdened by complex legacy systems, which work. Because of this, they cannot eliminate risk entirely. Therefore, they need to define what “acceptable risk” looks like and then strategically map out which of their systems are uniquely vulnerable. 

Remember, risk is not just about hackers – it is also about accessibility. For example, a bank or insurer’s risk profile is complicated by the need to broaden the client base and bolster social and financial inclusion. If a bank tightens security by forcing app-only biometrics in all interactions with the customer, it risks alienating its least tech-savvy customers. In many cases, this forces organisations to rely on legacy SMS, which comes with vulnerabilities, creating a permanent risk window that the board must acknowledge.

The hidden cost of friction

The whole point of cybersecurity is to try to keep digital infrastructure safe. Yet, as we all know, hyper-aggressive security can, ironically, also be damaging to the bottom line if it disrupts operations. Organisations, then, need to work with platforms and partners that are known for reducing false positives, where security software blocks legitimate business. In high-volume environments, such as trading floors or during busy periods, a system disruption of just a few minutes has a meaningful, quantifiable financial cost.

Understanding that, organisations have the blueprint for good security. It works almost invisibly, with a light touch. Disruptive security eats into profits daily, while good security boosts commercial ROI through quality threat intelligence. 

Good, or quality, security is not just about an impenetrable wall. It is also about telemetry and context. High-quality security platforms understand user behaviour. If a system detects a login from Nairobi and almost immediately from New York, it understands that no one can travel halfway around the world in three minutes and therefore flags the anomaly. This intelligence-driven approach personifies light touch because it only interrupts the user when context and behaviour is genuinely suspicious. 

Are you asking the right questions?

When organisations reframe cyber risk as business risk, the next step is to understand that risk extends beyond their own walls. Many people reading this will remember when Heathrow Airport suffered a major power outage. A major global hub was taken offline for a day, not by a direct attack on its core systems, but because a utility provider ignored an earlier alert about moisture in a nearby power substation. 

C-suites would do well to challenge their organisations to ask the right questions. Are they simply checking if the primary systems are safe, or are they interrogating the “substations” connected to their operations: their legacy applications, third-party vendors and integrated supply chains? 

The sobering truth is that risk isn’t just the lack of a firewall. It is also a technical debt. There are systems running, right now, in financial organisations that are unpatchable. And so, the cybersecurity discussion shifts away from patches to asking how to best segment and protect a vulnerable old heart with a modern shield. This is a strategic architectural decision and not a simple software install.

Cybersecurity should be a continuous, boardroom-led exercise in commercial resilience that requires working with partners who understand there is no finish line in cybersecurity. You cannot arrive. All you can – and should – do is strategically and tactically plan your race according to the risk you are willing to take on board.

By Tony Anscombe, Chief Security Evangelist at ESET

Previous Post

Kenya PMI Rises to 49.4 in April 2026 as Fuel Prices Weigh on Business Conditions

Next Post

More than 50% of leaked passwords end with a number, Kaspersky’s latest research reveals

Related Posts

Boeing 737-700 Photo/Courtesy
Culture

Kenya Airways, Trace to bring Africa Forward Concert

11 May 2026
KCB Bank
Business

KCB Introduces KShs. 20 Flat Fee on Pesalink, with Free Transfers Below KShs. 1,000

11 May 2026
Mombasa Bloomberg Philanthropies' Support
Featured

Mombasa to Continue Road Safety and Cycling Infrastructure Work With Bloomberg Philanthropies Support

11 May 2026
Absa Kenya
Women in Business

Absa Bank Kenya Urges Women to Embrace Estate Planning Early

11 May 2026
Absa Kenya

Absa Bank Kenya Partners with Transafrica Motors to Drive Growth in Transport and Logistics

14 April 2026

KCSE 2025 KNEC Results Online-Only Access

9 January 2026
EPRA Director General Mr. Daniel Kiptoo, giving his remarks during the launch of the Energy and Petroleum Sector Statistics Report for the 2024:2025 Financial Year

Kenya’s Energy Demand Hits New Peak as Clean Power Share Climbs – EPRA Report

30 September 2025
Aliko Dangote

Dangote Says IFC, World Bank Partnership Key to Africa’s Industrial Future

6 May 2026
KCB Bank

KCB Launches Mortgage Product for Kenya’s Informal Sector

1 May 2026
Kieran Godden, Group CEO, Liberty Kenya Holdings Plc, and Anjali Harkoo, Head of Insurance and Asset Management at Stanbic Bank Kenya, during the signing of a Vehicle and Asset Financing partnership between Stanbic Bank and Liberty Kenya.

Stanbic Bank Kenya Designs Enhanced Insurance Cover for Commercial Vehicles Amid Rapid SME Sector Growth

28 April 2026
NewsTrendsKE

NewsTrendsKE

A News Blog For Readers Who Want More

Follow us on social media:

  • About
  • Advertise
  • Careers
  • Contact

©2026 NewsTrendsKE.

error:
No Result
View All Result
  • Business
    • Deals
  • OpEds
  • Sustainability
  • Women in Business
  • Lifestyle
  • Featured
  • Technology
    • Phones
  • Sports
  • World
  • Contact Us

©2026 NewsTrendsKE.

Go to mobile version