Security News > 2024 > April > 73% of SME security pros missed or ignored critical alerts

Small and medium-sized enterprises IT staff is overwhelmed by the complexity and demands of managing multiple tools in their security stack, leading them to miss critical severity events and weaken their company's security posture, according to Coro.
According to the survey, 73% of SME security professionals have missed, ignored or failed to act on critical security alerts, with respondents noting a lack of staff and a lack of time as the top two reasons.
Respondents gave feedback on the most time-consuming parts of their day, including monitoring security platforms, managing and updating endpoint devices and agents, vulnerability management or patching, and installing, configuring, and integrating new security tools.
Respondents spend an average of 4 hours 43 minutes managing their cybersecurity tools every day, with an average 11.55 tools in their security stack.
The workload complexity facing security professionals, and the overwhelming demands it places on already limited resources are driving SMEs and midmarket companies to consolidate their cybersecurity tools.
"SMEs are stuck in a cybersecurity hell, constantly overwhelmed by the thousands of alerts generated by their enterprise security tools that do not fit," said Guy Moskowitz, Coro CEO. "The reality is that enterprise security tools - designed for large teams with endless resources - have failed SMEs. With limited staff, SMEs struggle with the complexity of managing their security, torn between budget constraints, limited resources, and the need for much better security coverage - this is mission impossible. The most effective way for SMEs to escape this cybersecurity hell is to adopt a single platform that covers the entire security span and is designed to reduce workloads through one dashboard and one endpoint agent," Moskowitz concluded.
News URL
Related news
- The ongoing evolution of the CIS Critical Security Controls (source)
- Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution (source)
- Don't Overlook These 6 Critical Okta Security Configurations (source)
- 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals (source)