Closing the gap: why the channel must lead on cybersecurity for the businesses that need It most

By Tuan Nguyen, vice president of channels and alliances at Huntress.

  • Wednesday, 25th March 2026 Posted 2 hours ago in by Sophie Milburn

There is a gap at the heart of the cybersecurity industry, and the channel sits squarely in the middle. On one side: the enterprise world, with its dedicated security teams, six-figure tooling budgets, and armies of analysts. On the other: the vast majority of businesses that make up the real economy, the regional firms, the growing mid-market companies, the organisations that lack the resources of a Fortune 500 but face the same threats, the same attack techniques, and increasingly, the same regulatory requirements. Bridging that gap is one of the most important jobs in technology right now. And it falls, almost entirely, to the channel.

 

The threat picture is getting worse, not better

The cybersecurity threat landscape in 2026 is not one that smaller businesses can afford to ignore. Cybercrime has become the world’s third-largest economy, with costs projected to reach $12.2 trillion annually by 2031, according to the Huntress 2026 Cyber Threat Report, which is based on telemetry from over 4 million endpoints and 10 million identities. Ransomware, business email compromise, identity-based attacks, phishing - these are not theoretical risks for enterprise security teams to stress-test. They are live, ongoing threats that are disproportionately targeting organisations with fewer defences.

The reason is simple: attackers are rational. They target where the defences are weakest, the detection is slowest, and the recovery is hardest. For many smaller organisations, a single successful attack can be genuinely existential, the kind of event that closes businesses, destroys customer relationships, and wipes out years of operational trust.

The data bears this out in stark terms. According to the Huntress 2026 Cyber Threat Report, abuse of remote monitoring and management (RMM) tools, the very software channel partners rely on to support customers, surged 277% year-over-year, accounting for 24% of all observed incidents.

Attackers are not exploiting exotic zero-days; they are weaponising trusted, legitimate tools that businesses already have running in their environments. Meanwhile, a social engineering technique called ClickFix fuelled 53% of all malware loader activity in 2025, exploiting routine user behaviour to silently install ransomware and infostealers. These are not sophisticated nation-state attacks. They are scalable, repeatable, and increasingly automated, designed to run across thousands of organisations at once.

Identity is the other front that demands attention. Access policy violations - suspicious logins from unusual locations, malicious infrastructure, and unauthorised VPNs - accounted for 37.2% of all identity-based attacks observed in the report. Mailbox manipulation and OAuth abuse, both common precursors to business email compromise, together accounted for nearly a third of identity incidents. The perimeter is no longer a firewall; it is a set of credentials, and the channel needs to have that conversation with customers who may not yet realise how exposed they are.

At the same time, the regulatory and compliance environment is tightening. Frameworks such as NIS2 in Europe, Australia's Cyber Security Strategy 2023-2030, and CMMC requirements in the US defence supply chain are raising baseline expectations for organisations of all sizes. The days of treating cybersecurity as an enterprise-only discipline are over. The question now is not whether smaller businesses need to take this seriously; it is who will help them do it.

 

The channel's unique position

The answer, overwhelmingly, is the channel. Resellers, MSPs, and technology partners are closer to their customers' day-to-day realities than any vendor ever could be. They understand the operational constraints, the budget pressures, and the IT environments that have evolved organically rather than by design. They have the trust relationships and the contextual knowledge to translate security requirements into actual outcomes.

That positioning is an enormous advantage, but it also comes with responsibility. Customers are relying on their channel partners not just to sell technology, but to guide them through an increasingly complex risk landscape. The partner who says 'you probably don't need to worry about that' is as much of a liability as the partner who sells an enterprise-grade stack that no one can manage. Getting this right means being honest about a few things.

 

The alert fatigue problem is real

One of the most common failure points in security deployment is the high volume of false positives and the resulting alert fatigue. Today’s tools, even with AI, generate hundreds of false alerts per day, leaving security teams and analysts scrambling at all hours. They are burying real signals in noise, hiding that one real threat in the queue because it looks like everything else.

The channel has a role to play in setting realistic expectations here. A security product that is difficult to manage, poorly tuned to the customer's environment, or that demands constant human attention is not a good fit for a business without large teams inside a SOC. MSPs need to have honest conversations with their customers about what 'managed' actually means in practice, and whether the solution being deployed genuinely reduces operational burden or simply shifts it from the vendor to the customer.

 

Enterprise-grade does not have to mean enterprise-priced

For a long time, the implicit assumption in the market was that enterprise-grade security was simply out of reach for organisations that fall below the Fortune 500. The tools were built for enterprise environments, priced for enterprise budgets, and required enterprise-level expertise and resources to operate. The channel's job was to make the best of what was available, not to expect parity.

That assumption is outdated. We’ve seen a maturation of agentic security offerings built from the ground up and managed, with AI-centric SOCs designed for organisations without large teams or budgets. The cybersecurity gap that was once wide is now narrowing. It is now genuinely possible to deliver continuous, expert-backed threat detection and response to businesses that couldn't have had access to anything close to it five years ago

The commercial models are catching up, too. Per-endpoint, per-identity, and per-seat pricing structures, combined with managed service layers that remove the need for in-house expertise, have enabled the channel to build security practices that are both economically viable and genuinely effective. The margin opportunity in managed security is significant, and the stickiness of the customer relationship that comes with it is unlike almost any other technology category.

 

What good looks like from a channel perspective

Partners who are building strong security practices tend to share a few characteristics. They lead with outcomes, not features. They have a clear view of the threats their customer base faces, and they position their offerings to solve those problems, not to check off compliance boxes or lock customers into a vendor. They choose vendor relationships that include real managed support, not just technology licenses. And they invest in their own knowledge, staying current on the threat landscape so they can advise credibly rather than just resell.

They also think carefully about the full stack. Endpoint protection is not enough on its own. Identity-based attacks, particularly against cloud platforms like Microsoft 365, have become a leading vector for business email compromise and account takeover. A customer with strong endpoint security but no identity threat detection has a visible gap that sophisticated attackers will find. Partners who can speak to the full picture and offer solutions that cover it are in a fundamentally stronger advisory position.

 

The opportunity ahead

The channel is at an inflection point. The combination of a worsening threat landscape, rising regulatory expectations, and genuinely improving technology means that the conversation about security has never been more urgent or more commercially relevant. Customers who have historically underinvested in this area are being forced to reckon with the consequences, and many are turning to their technology partners for guidance. 

Partners who are ready to lead that conversation, with credible advice, well-chosen vendor relationships, and a clear understanding of what their customers actually need, will find themselves in an extremely strong position. Those who wait for customers to come to them or continue to treat security as an afterthought in broader IT conversations will find the market moving without them.

The businesses that form the backbone of the global economy deserve the same level of protection that enterprise organisations have long taken for granted. The channel is the mechanism through which that becomes possible. The question is how seriously we're going to take that responsibility.

 

Insights from Louise Purdie, Head of Indirect at Abzorb.
By Sam Manjarres, Director of Product Marketing at WatchGuard Technologies.
By James Gillies, Head of Cyber Security at Logicalis UK&I.
By Penny Heyes, Chief Operating Officer and Co-Founder, and David Clarke, Chief Technology Officer...
By Linda Kerr, director of marketing, managed services at WatchGuard Technologies.
By Lorenzo Romano, CEO of GCX Managed Services
By Nadir Merchant, General Manager, IT Operations Suite, Kaseya.
Jamie Akhtar, CEO and Co-Founder of CyberSmart