From IT to Cybersecurity: Navigating the New Business Imperative
David Riedl

Jan 31, 2025
A decade ago, while working at a managed service provider (MSP), my Chief Executive Officer introduced a groundbreaking shift in our business model by emphasizing cybersecurity as a core pillar. She highlighted that clients were no longer just asking if we were doing cybersecurity but were demanding to know exactly how we were safeguarding their digital environments. This foresight has only grown more relevant with each headline-making data breach.
Inspired by this announcement, I embraced the challenge, starting with a Cyber-ops certification, progressing to a Certified Information Systems Security Professional certification and focusing my career on cybersecurity. However, despite increased security awareness among the general workforce, the complexity and sophistication of cyber threats have outpaced the average company's ability to keep up. Many businesses and individuals, feeling overwhelmed, have essentially handed over the responsibility to their Information Technology (IT) departments.
This approach has its pitfalls. A common sentiment among business owners is a false sense of security, believing they have adequate controls simply because their IT team assures them so. Here's the crux of the issue: you can manage IT with just a surface-level understanding of cybersecurity, but to truly mitigate risks, threats and vulnerabilities, one must immerse themselves in cybersecurity practices.
Understanding the Disciplines
- IT focuses on making technology work, managing hardware, software and network operations.
- Information security protects information in all its forms, ensuring confidentiality, integrity and availability.
- Cybersecurity is specifically about safeguarding digital systems and data from cyber threats.
One of the most important lessons I have learned in my journey between IT and cybersecurity is that these are distinct fields requiring unique skill sets. IT teams, often buried under tasks like desktop support, server upgrades and bug fixes, might not have the bandwidth to delve deeply into cybersecurity. Moreover, many MSPs might push industry solutions that aren't tailored to your specific environment, consuming significant security budgets without delivering optimal protection.
Strategies for Effective Cybersecurity Leadership
For cybersecurity to be truly effective, it must be championed from the top down. There are four strategies that a business leader can perform that helps ensure a strong security posture:
- Engage with IT managers: Ask pointed questions about the current threats, vulnerabilities and the controls in place to counteract them.
- Maintain comprehensive documentation: Ensure your cybersecurity program is not only documented but regularly updated to adapt to new threats.
- Follow established standards: Adhere to recognized cybersecurity standards to identify blind spots and implement controls accordingly.
- Independent evaluations: Engage a vendor-neutral cybersecurity firm for an unbiased assessment of your controls, policies, procedures and personnel. This can highlight areas where your cybersecurity might be lacking or could be enhanced.
Cybersecurity isn't just an IT concern; it's a strategic business imperative that requires involvement from senior leadership down to every employee. By understanding these nuances and actively engaging in cybersecurity governance, businesses can not only protect themselves but also position themselves as leaders in digital safety.
Sign up to receive the latest updates, news and insights from Jensen Hughes!
Connect With UsGet In Touch
ContactMore blog posts from Jensen Hughes
New Business Risk – U.S. Designation of Mexican Drug Cartels as Foreign Terrorist Organizations
Feb 27, 2025
Understand the risks of the U.S. designating Mexican drug cartels as FTOs. Learn how to mitigate compliance challenges and protect your business operations.
Fire Investigations in Alaska and the Complications of the Cold Weather
Feb 17, 2025
Fire investigations in Alaska face extreme cold, ice fog, and equipment challenges. Learn how experts navigate these harsh conditions to determine fire origins and causes.
The Adoption of NFPA 660: A New Era in Combustible Dust Safety
Feb 14, 2025
NFPA 660 unifies combustible dust safety standards, streamlining compliance and enhancing protection. Learn how Jensen Hughes can help navigate this new era in fire and explosion prevention.