https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • EMEA
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 501 Reports
    • MSPmentor Education
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • Awards
    • Back
    • European Partners 51 (EP 51) Awards
    • Excellence in Digital Services
    • MSP 501 Rankings
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Industry Events
    • Webinars
  • More
    • Back
    • About Us
    • Advertise on Channel Futures
    • Contact Us
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • EMEA
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 501 Reports
    • MSPmentor Education
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • Awards
    • Back
    • European Partners 51 (EP 51) Awards
    • Excellence in Digital Services
    • MSP 501 Rankings
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Industry Events
    • Webinars
  • More
    • Back
    • About Us
    • Advertise on Channel Futures
    • Contact Us
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

From the Industry


Sponsor Content

Planner book open on top of desk

Make Security Part of Your Daily Routine

  • Written by Barracuda MSP Guest Blogger
  • March 20, 2019
MSPs need to scrutinize their internal security posture as they increasingly find themselves targets of attacks.

Managed services providers (MSPs) that want to establish a reputation as a reliable partner and a go-to source for security services and technology need to practice what they preach–and that means making security part of your daily routine, not just for your customers, but also internally.

MSPs are currently in the crosshairs of organized cybercriminals, and the U.S. Department of Homeland Security (DHS) and other security agencies have taken notice. DHS warned MSPs last year that hackers are targeting them because of their interest in leveraging MSP networks to breach multiple companies simultaneously.

To protect themselves and their clients, MSPs must implement and follow the same best practices they advise for their customers. And, more specifically, they must monitor their network activity to ensure their systems aren’t inadvertently being used as a launching pad for malware, ransomware or other kinds of attacks.

Security Best Practices MSPs Should Follow

Examine the security tools and practices you recommend to your clients. Do you also use them internally? This not only makes your sales pitch stronger for potential clients, but it also gives staff an intimate knowledge of exactly where protection begins and ends within those products.

Develop security policies that match the current threat landscape, and make sure they are clear and easy to follow. As part of that process, evaluate your current access management and administrative procedures. You’ll want to limit permissions and access as much as is possible or practical (to reduce the scope of any potential breach), and make sure everyone understands why this is important.

Use multifactor authentication for your customers and your internal staff. Also, ensure that the vendors you work with have implemented proper security measures; otherwise, your hard work can be undone by the poor password practices of a third-party vendor or a poorly trained helpdesk employee.

Restrict access to public file share sites and use a VPN for your MSP connections.

Implement a security awareness and training program internally that includes regular updates, alerts and phishing simulations. This will help shore up any potential gaps and enable you to work with customers to correct risky employee behaviors. If you’re not feeling ready to offer this type of service to customers, get started by deploying such a program for your staff. It can be a great way to develop their own security awareness. This will position you to have more effective educational discussions with your customers and their employees.

Establish a robust incident response protocol that includes clear direction on who gets notified when there’s a problem and who’s responsible for taking action. This will eliminate costly delays and help reduce the damage when there’s an attack.

Put protocols in place to revoke privileges, remove password access and shut down accounts when an employee is terminated. Idle accounts are a disaster waiting to happen, even when an employee parts on good terms. In some cases, the email accounts of deceased employees have been used to access a network.

Have regular security conversations with your clients, and be sure to include an overview of what you’re doing internally to keep your network safe in addition to protecting their data. This not only helps customers increase their awareness of current threats, but it also improves your status as a trusted expert and advisor and can open up conversations about additional services.

  • Page 1
  • Page 2
Tags: MSPs Best Practices From the Industry Intelligence Security Strategy Barracuda MSP Sponsor Content

Related


  • Barracuda February MSSP Blog Image
    IoT Security: A Winning Strategy for MSSPs
    Don’t let your clients’ IoT initiatives make them vulnerable to cyber attacks.
  • Barracuda February Blog image
    3 Steps to Building a Successful Sales Pipeline
    Growth-oriented MSPs can’t just rely on referrals; they must optimize their sales process and strategy to maintain a steady stream of prospects.
  • email-phishing-conceptual-weerapatkiatdumrongthinkstock_0.jpg
    Social media and email phishing: How to protect financial information from fraudsters
    Available On Demand Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of […]
  • Barracdua MSSPInsiders Blog Image
    Tips for Launching an Actionable Cloud Security Framework
    To successfully launch an actionable cloud security framework--and avoid missing key elements-- providers should sequentially focus on five key areas.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Timely Tips for Choosing the Right RMM Tool
  • Providing More Value to Your Customers over Time
  • Inefficient Incident Response Times Are Costing Businesses Billions
  • Strengthen Your Patch Management Processes

Galleries

Images: Channel Evolution Europe Featuring Avant, 8×8, Sophos, CenturyLink, More

December 5, 2019
view all

From the Industry

The Importance of Strengthening Your Cyber Security Culture

December 4, 2019

Don’t Let Lack of HIPAA Compliance Make Your Business Sick

December 4, 2019

Using ADR to Help Secure Your Business First

December 4, 2019
view all

Webinars

How Your MSP Can Deliver the Ultimate Customer Experience

December 10, 2019

Edge of Tomorrow: Network Security in the Age of Data-Driven Business

December 11, 2019
view all

White Papers

Secrets to Sustainable Growth – for MSPs, by MSPs

December 4, 2019

Why Managed Security Presents A Golden Opportunity for MSPs

November 26, 2019

The Ultimate Guide to On-Site Managed Services

November 26, 2019
view all

Events

Channel Partners Conference & Expo

March 9, 2020 - March 12, 2020
view all

Videos

FASTCHAT: Why an MSP Needs to Extend Detection and Response Beyond Endpoint Security

October 22, 2019

Ingram Micro: It’s Up to Our MSP Partners to Keep Clients ‘Out of the Headlines’

October 14, 2019

Liongard: Here’s How We ‘Roar’ for the MSP Community

October 14, 2019
view all

Twitter

ChannelFutures

.@SlackHQ CEO @stewart Butterfield says #Office365 users put #MicrosoftTeams aside to use #slack… twitter.com/i/web/status/1…

December 6, 2019
ChannelFutures

Integrating managed services into your existing agent business model sounds great in theory, but can be difficult t… twitter.com/i/web/status/1…

December 6, 2019
ChannelFutures

This #501er Friday we chat with #MSP501 winner @qosnetworks about #IoT, #AI & the increased adoption of SD-WAN.… twitter.com/i/web/status/1…

December 6, 2019
ChannelFutures

.@AWS CEO Andy Jassy: JEDI not ‘adjudicated fairly’ #AWSreInvent dlvr.it/RKp6wJ https://t.co/vcOZ6fnjMZ

December 6, 2019
ChannelFutures

An increase in the use of #collaborationapps may be making employees more productive, but just like #email there's… twitter.com/i/web/status/1…

December 5, 2019
ChannelFutures

#Datastorage vendor @WekaIO launches its inaugural channel partner program to drive AI and ML storage.… twitter.com/i/web/status/1…

December 5, 2019
ChannelFutures

Look for vendor red flags as you evaluate #datacenter #hardware performance and cost, says @GetInterconnect.… twitter.com/i/web/status/1…

December 5, 2019
ChannelFutures

Great pics here from the inaugural #EvolutionEU feature @Avant_CCC @CenturyLinkBiz @8x8 and more.… twitter.com/i/web/status/1…

December 5, 2019

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Cookie Policy
  • Privacy
  • Terms
Copyright ©2019 Informa PLC. Informa Telecoms & Media Limited is a company registered in England and Wales with company number 00991704 whose registered office is 5 Howick Place, London, SW1P 1WG. VAT GB365462636. Informa Telecoms & Media Limited is part of Informa PLC.
✕

channel futures Logo

Want to stay updated? Sign up for our Channel Futures newsletters today.

Websites are now required by law to gain your consent before applying cookies. We use cookies to improve your browsing experience. Parts of the website may not work as expected without them. By closing or ignoring this message, you are consenting to our use of cookies.
X