Delaying Security? Here Are the Conversations Your Organization Is Accidentally Having With Attackers

Blog Jonathan Kimmitt todayNovember 20, 2025

Background
share close

Every organization has reasons – sometimes practical, sometimes emotional – for delaying security investments. Budgets, convenience, and growth priorities often take center stage, while security gets pushed to “later.” But attackers don’t operate on your timeline. They don’t wait, negotiate, or care about internal challenges. In fact, the very excuses businesses use to justify inaction create the perfect conditions for exploitation.

If we could overhear the silent dialogue between organizations and the adversaries targeting them, the contrast would be striking.

Below is a point–counterpoint look at the excuses organizations make—and the answers an attacker might give if they could respond.

“It’s Not the Size That Matters…”

Organization: “We’re too small for anyone to attack us.”
Attacker: “I don’t know what size you are—I just know someone clicked the email I sent.”

Organizations often assume attackers are performing detailed economic analysis before launching an attack. In reality, most threats operate at scale. They cast huge nets, and whoever bites becomes the next victim. Attackers don’t research your revenue. They just need one credential, one click, or one misconfiguration. That’s it.

“Show Me the Money!”

Organization: “We don’t have the budget for security specialists right now.”
Attacker: “I don’t need a budget to take you down.”

Security investment is treated like a cost center. For attackers, it isn’t a cost—it’s profit. They can disrupt an entire organization with free tools, stolen scripts, or AI-generated phishing emails. The cost of a breach always dwarfs the cost of prevention. And while organizations wait for “next year’s budget cycle,” threat actors operate with zero financial friction.

“You Never Forget Your First Time.”

Organization: “We’ve never had an incident before.”
Attacker: “Perfect. That means no one’s watching.”

A clean history is not a sign of low risk—it’s often the result of luck, limited detection capability, or simply being overlooked. Attackers don’t care about your past. They care about the gap in your present.

“Badges? We Don’t Need No Stinkin’ Badges.”

Organization: “Security controls slow people down.”
Attacker: “Great. That means no one slowed down to stop me.”

Convenience is the attacker’s favorite ally. No MFA? Faster for them. Admin rights for everyone? Easier for them. Flat networks? More efficient for them. Productivity arguments often create the very conditions attackers rely on.

“The Waiting IS The Hardest Part.”

Organization: “We’re building the business right now. Security can wait.”
Attacker: “Your growth won’t matter… once I control your data.”

Early-stage companies are especially vulnerable. With minimal structure, minimal process, and high-pressure growth cycles, they become ideal targets. Attackers know small businesses store valuable data long before they mature their defenses.

“No Time Like the Present…”

Organization: “Our IT team can handle security when they have time.”
Attacker: “Great. I only need 10 minutes.”

Security isn’t a part-time job. Threat actors aren’t waiting for your IT team to catch up on tickets. They move fast, automate everything, and attack whenever opportunity appears—even at 2 a.m. on a holiday weekend.

“YOU Are the Weakest Link…”

Organization: “We trust our employees—they won’t fall for anything.”
Attacker: “I only need one who’s tired, rushed, or distracted.”

Social engineering works not because employees are unintelligent, but because people are human. Attackers count on emotions—urgency, fear, curiosity, helpfulness. A single moment of normal human behavior can override years of trust.

“Stop Harshing My Buzz.”

Organization: “We can’t enforce stronger policies. People will complain.”
Attacker: “Please keep it that way.”

Security avoided because someone might get upset is security already lost. Attackers thrive in organizations that fear internal discomfort more than external threats.

“The Best Things in Life Are Free…”

Organization: “We don’t have anything worth stealing.”
Attacker: “You have money, people, computers, and downtime. That’s enough for me.”

Every organization has something valuable:

  • data
  • credentials
  • compute resources
  • access to someone else
  • extortion leverage

Attackers don’t need your data to be special—only exploitable.

“Tomorrow is Always a Day Away…”

Organization: “We’ll handle it when we’re bigger/more stable/through this project.”
Attacker: “Thanks for the timeline.”

Attackers don’t wait for your business cycles. They don’t schedule around your projects. They strike whenever your guard is down; which is usually when you’re busy, distracted, or understaffed.

The Real Message Behind These Exchanges

Organizations often underestimate attackers because they misunderstand their motivations. Attackers aren’t strategizing like executives. They aren’t weighing budgets or office politics and they don’t care about culture, priorities, growth plans, or internal drama.

They care about opportunity.
They care about access.
They care about speed.
They care about silence.

And the excuses organizations use for delaying security strategies are exactly the conditions attackers exploit.

If we could hear the attacker’s side of the conversation, maybe we’d stop giving them the final word.

Every excuse for delaying security is an open door they’re waiting to walk through. Close it now.
Start your security strategy today — because attackers aren’t waiting for tomorrow.

Written by: Jonathan Kimmitt

Tagged as: .

Rate it

Previous post