https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

From the Industry


Getty Images

Sponsor Content

security best practices

MSPs: Security Best Practices for Staying out of Cybercriminals’ Crosshairs

  • Written by Barracuda MSP Guest Blogger
  • July 27, 2021
MSPs are ripe targets for ransomware and other attacks; here are seven security best practices to protect yourself and your clients.

Ransomware and other cyberattacks are increasing in frequency and cost, and MSPs are now often the target of these attacks. Because MSPs provide a gateway into the networks of dozens or hundreds of clients, attackers can use compromised credentials to move freely among MSP and customer networks. Applying security best practices is key to staying out of cybercriminals’ crosshairs.

In 2018, the U.S. Department of Homeland Security issued a warning about the threat to MSPs and cloud service providers, noting that “MSPs generally have direct and unfettered access to their customers’ networks, and may store customer data on their internal infrastructure. By servicing a large number of customers, MSPs can achieve significant economies of scale. However, a compromise in one part of an MSP’s network can spread globally, affecting other customers and introducing risk.”

A recent CRN article provided several examples of how quickly a ransomware attack can spread from client to client once an MSP is compromised. Additionally, the article noted that poor internal cyber-hygiene practices among MSPs could lead to these vulnerabilities.

While many MSPs offer cybersecurity solutions and consulting services, they need to be just as vigilant about their own devices and networks. A breach can lead to a cascading series of compromised client networks resulting in a lot of unpaid labor spent repairing the damage followed by a loss of reputation and likely a diminished client list.

However, an MSP that follows security best practices internally can protect itself and its clients and provide a way to differentiate the security-centric MSP from competitors.

Those security best practices include:

Secure remote access tools against malware. Remote access has become a bigger target thanks to increased work-from-home scenarios (for both MSPs and their clients). Keeping these solutions safe should involve updating remote monitoring and management (RMM) tools with the latest patches/fixes; enforcing multifactor authentication rules internally; implementing IP restrictions on remote admin tools (when possible) and making sure that Windows Remote Desktop Protocol (RDP)—a common target in ransomware attacks—has been secured.

Restrict network access. Stolen credentials are typically the gateway for MSP-based cyberattacks, so there should be protection in place to minimize the damage if an account is compromised. For example, rights and permissions for staff should be limited based on roles and requirements, and MSPs should employ MFA, password managers, and robust password processes. Additionally, password management, MFA, network segmentation and app whitelisting can help prevent lateral movement across the network when there is a breach.

Use strong email and endpoint security. Ransomware and most other attacks typically originate from malicious emails. Leverage robust email security tools (including new solutions that employ artificial intelligence to monitor and identify unusual activity), as well as DMARC, SPF and SKIM methods. Malware protection at the endpoint is another critical defense.

Establish internal backup and recovery protocols. Many MSPs already provide backup and data recovery services for their clients. They should make sure they are using these tools effectively for their internal operations. Effective backup is an essential part of ransomware mitigation. There should be multiple backups (for both local and cloud-based systems) on different storage media, and at least one of these should be isolated from the network. In the case of a ransomware attack that compromises the RMM, network-accessible backups are likely in danger, as well. Also, regularly test and verify those backups. While this approach to backing up data is more intensive, the increase in ransomware activity makes it worth the effort.

Provide security awareness training for staff and clients. Ensure everyone can spot phishing emails and knows the proper protocols for reporting suspicious activity and alerting managers and clients after a breach. Most end users are just trying to do their jobs as quickly and efficiently as possible, so reminding them of the importance of these security practices can help reduce the possibility of a successful attack. Simulations can also help identify employees who need additional training.

Conduct regular security assessments. Security-centric MSPs are likely already doing this for their existing clients. But they should also perform regular internal security assessments to ensure their security posture keeps up with new and emerging threats.

Create (and periodically test) a disaster recovery plan. If there is a breach, who needs to respond internally? How will you notify clients quickly to minimize the damage? Who will deal with the attackers if there is a ransom demand? What process will you use to get your applications and your clients up and running as quickly as possible?

As MSPs increasingly become cybercriminals’ prime targets, their ability to protect themselves is a top priority. By creating strong internal defenses by following security best practices, MSPs can ensure their data and applications are safe and avoid becoming the nexus of a widespread ransomware event.

Chris Crellin is Senior Director of Product Management for Barracuda MSP, a provider of security and data protection solutions for managed services providers, where he is responsible for leading product strategy and management.

 This guest blog is part of a Channel Futures sponsorship.

Tags: MSPs Best Practices From the Industry Intelligence Security Barracuda MSP Sponsor Content

Most Recent


  • Cyber insurance
    Now Is the Time to Consider Cyber Insurance for Your Business
    If your business is online and accesses sensitive data, the need for cyber insurance is becoming critical.
  • Telarus leadership team
    Images: Telarus Hosts Partner Summit, Gives Partner, Supplier Awards
    See who landed Telarus' top partner award.
  • Making Waves
    7 Channel People Making Waves This Week at Kaseya, AT&T, Cohesity, More
    Cloud-managed service is the fastest-growing area one analyst said in response to an MSP acquisition this week.
  • Microsoft Adds Threat Intelligence, Proactive Hunting to Defender
    The new Microsoft Defender offerings come as the company encourages partners to offer more security.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • remote work
    Remote Work: Converting Digital Transformation into MRR
  • cloud communications
    3 Top Cloud Communications Opportunities for Channel Partners
  • Opportunity
    SolarWinds’ Head Geek on IT Trends Report: MSSP ‘Opportunities Ahead’
  • IT operations
    Annual IT Operations Survey Reveals Opportunities for MSPs

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

Images: Telarus Hosts Partner Summit, Gives Partner, Supplier Awards

August 5, 2022

7 Channel People Making Waves This Week at Kaseya, AT&T, Cohesity, More

August 5, 2022

The Gately Report: Zscaler Tracks New, Increasingly Dangerous Ransomware Group, Most Targeted Types of People

August 5, 2022

Industry Perspectives

View all

Seize the Application Modernization Opportunity

August 2, 2022

A Growth Mindset: Your Organization’s Strategic Differentiator

August 1, 2022

Timely Tips for Non-Negotiable Patch Updates

July 29, 2022

Webinars

View all

Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

August 23, 2022

Why it is Important to Upgrade Aging Servers and How to use Live Optics to Upgrade Efficiently

August 25, 2022

Executives at Home are Not Alright: An Intro to Digital Executive Protection

September 8, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

Vonage a ‘Single Communications Stack Provider’ for Partners, Customers

IBM, Partners and the $1 Trillion Hybrid Cloud Opportunity

June 26, 2022

Agents Share ‘Secrets,’ Industry Opportunity

May 11, 2022

AT&T, Microsoft, Cisco, ThreatLocker on Unlocking Partner Potential

May 6, 2022

Twitter

ChannelFutures

.@ConnectWise says use #cyberinsurance policies to protect from worst of cyberattack repercussions, but first beef… twitter.com/i/web/status/1…

August 8, 2022
ChannelFutures

Check out our pictures from the #TelarusPartnerSummit that @telarus hosted in Salt Lake City.… twitter.com/i/web/status/1…

August 5, 2022
ChannelFutures

Channel People Making Waves This Week Include: @spoonen, @RoyArsan, @TheAnneChow, @AnuragTechaisle… twitter.com/i/web/status/1…

August 5, 2022
ChannelFutures

.@RingCentral plans #layoffs after strong Q2 earnings. dlvr.it/SW7kd5 https://t.co/OIlLuYgyLJ

August 5, 2022
ChannelFutures

.@msftsecurity makes upgrades to #MicrosoftDefender. dlvr.it/SW7cpg https://t.co/KbPsyM8eYe

August 5, 2022
ChannelFutures

.@ZeroFox goes public after #SPAC merger. #cybersecurity dlvr.it/SW7NjC https://t.co/IhaO9vgDh7

August 5, 2022
ChannelFutures

.@Mitel's new developer portal, and integration into CloudLink, creates a "vibrant" communications developer commun… twitter.com/i/web/status/1…

August 5, 2022
ChannelFutures

Boost security, secure #SoftwareSupplyChain in light of #Log4Shell breach, says @synopsys. dlvr.it/SW7GbT https://t.co/NlKeEFUlMS

August 5, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X