Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected
Acer America
Acer America Corp. is a computer manufacturer of business and consumer PCs, notebooks, ultrabooks, projectors, servers, and storage products.

Location

333 West San Carlos Street
San Jose, California 95110
United States

WWW: acer.com

ChannelPro Network Awards

hello 2
hello 3

Expert Opinions

March 3, 2026 | Michael Crean

The Hard Truth About Cybersecurity: It Changed, and We All Pretended It Didn’t

Why your MSP business should be focused on security outcomes, not more features.

Cybersecurity Misconfiguration Prevention

Last month, I sat across from a small business owner who told me: “I bought everything my MSP recommended. I still got breached. So, what the hell did I pay for?”

Breaches among SMBs are climbing. Ransomware is shutting down businesses. MSPs are getting 3 a.m. calls from customers whose “fully protected” networks just went dark.

We need to admit something uncomfortable: Something is fundamentally broken and I’m tired of pretending it’s not.

The cybersecurity industry has drifted into a feature arms race that’s failing the businesses that need protection most. Every month, vendors announce new capabilities, including AI-powered detection, Zero Trust frameworks, advanced sandboxing, and real-time deep packet inspection. All valuable. All legitimate.

However, these are largely irrelevant to a business owner trying to make payroll, avoid regulatory fines, and keep operations running.

The Feature Fatigue Problem

The channel has become obsessed with cybersecurity features because features are easy to market. Press releases highlight technical capabilities, analyst reports compare checklists, and sales conversations focus on what the product can do.

But the reality within many SMB environments is that while a company buys a firewall with hundreds of configurable settings, only a handful are properly configured. The rest remain default. No one reviews them again. A year later, a breach happens.

The root cause? Cybersecurity misconfiguration. The technology had the capability to prevent the breach. It simply wasn’t configured, monitored, or maintained to deliver the intended outcome.

Having a feature and achieving protection are not the same thing. Never expect a small business owner or even a three-person IT team to operate enterprise-grade security tooling at an expert level. They’re trying to run a business, not a security operations center.

Why Features Don’t Equal Security

Throughout the industry, this pattern unfolds across multiple technology markets:

  1. Vendors compete on features.

    Michael Crean of SonicWall discusses cybersecurity misconfiguration prevention

    Michael Crean

  2. Products grow more complex.
  3. Complexity widens the gap between capability and usability.
  4. Customers fail to extract full value.
  5. The cycle restarts with the next “revolutionary” release.

In most markets, that leads to inefficiency. In cybersecurity, it leads to business failure.

According to Verizon’s Data Breach Investigations Report, 74% of breaches involve a human element, such as misconfiguration, credential misuse, social engineering, or error. Not a lack of technology or insufficient innovation. Rather, human complexity.

Most breaches happen because:

  • Technology isn’t properly configured or maintained
  • Updates are delayed to avoid downtime
  • Policies drift as businesses evolve
  • Alert fatigue results in missing real threats
  • Small teams are stretched too thin

These are delivery problems, not feature gaps. And delivery problems cannot be solved by adding more features.

What Security Outcomes Actually Mean

Business operators — not IT teams, but CEOs, founders, and CFOs — rarely ask about detection engines or encryption standards. They care about business outcomes. Chief among them:

  1. Breach Prevention: Will this stop an incident that could shut down my business?
  2. Operational Continuity: If something goes wrong, will we stay operational? Downtime costs revenue. Resilience matters more than theoretical protection.
  3. Risk Reduction: Am I less likely to face regulatory fines, lawsuits, or insurance disputes? Compliance is business survival.
  4. Audit Readiness: Can I prove I’m doing this right when regulators, customers, or insurers ask? Documentation and defensibility matter.
  5. Cost Efficiency: Am I investing wisely or just stacking tools on top of tools? Total cost includes management overhead, integration complexity, and operational burden.
  6. Reduced Human Error: Are we less likely to make mistakes that create vulnerabilities? Most failures are human failures.

These are measurable, business-relevant outcomes.

If your security conversation centers on features instead of these six outcomes, you’re having the wrong conversation.

What Needs to Change

An industry-wide shift is necessary. The industry needs greater transparency.
Look for vendors that speak honestly about what security can and cannot do.
Don’t be fooled by marketing language layered on top of the same old model.

Step 1: Focus on outcomes, not features. Ask: What measurable business outcome does this improve?

Step 2: Technology is necessary but not sufficient. Platforms should simplify MSP operations.

Step 3: Design for operational reality. Simplicity is essential for small IT teams.

Step 4: Track better benchmarks:

  • Misconfigurations prevented
  • Time to remediation
  • Downtime avoided
  • Recovery time reduced
  • Audits passed without disruption

Technology Alone Will Always Fall Short

Here’s the uncomfortable truth: Technology alone cannot deliver security outcomes. It never could.

A misconfigured firewall doesn’t prevent breaches. In fact, it can create them, especially as threat actors use automation and AI to scan for exposed configurations.

The difference between failure and protection is in how the technology is delivered, managed, and supported. That’s where the partner model is essential.

A strong MSP or MSSP doesn’t simply install technology. It combines the right technology foundation with continuous monitoring and management, along with the expertise and rapid response capabilities required to keep defenses effective over time.

When a partner says, “You’re protected,” it should mean it is actively preventing configuration drift, monitoring for emerging threats, applying updates safely and consistently, and responding quickly before suspicious activity escalates into a business-disrupting incident.

That’s an outcome. Without that active delivery layer, you just have expensive shelfware waiting for a bad day.

But this also requires accountability from vendors. If partners are expected to deliver outcomes, it’s unfair for vendors to burden them with unnecessary complexity. Handing off fragmented consoles and redundant policies is not enablement.

The Conversation We Need to Have

Cybersecurity is at a crossroads. We can continue the feature arms race, or we can focus on what actually protects businesses.

Technology innovation will not stop, threat actors will evolve, and complexity will increase. But if vendors, partners, and customers shift the conversation from “What can this product do?” to “What business outcome does this deliver?” we have a real chance to improve resilience for SMBs.

This shift requires hard conversations. But the alternative, equating more features with better security, is failing the businesses that depend on us.

It’s time for the hard conversation to begin.


Michael Crean is general manager of managed services at SonicWall. He leads the company’s strategy and execution to help partners deliver stronger, more scalable security outcomes for SMBs. Before joining SonicWall, Crean served nine years in the U.S. Army and later founded one of the industry’s early SOC-as-a-service models built for MSPs, Solutions Granted.

Featured image: puhhha — stock.adobe.com

Related Expert Opinions

Free MSP Resources

Editor’s Choice


Explore ChannelPro

Events

Reach Our Audience