{"id":43686,"date":"2020-09-03T14:34:39","date_gmt":"2020-09-03T10:34:39","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=43686"},"modified":"2023-03-20T15:31:53","modified_gmt":"2023-03-20T11:31:53","slug":"every-month-is-cybersecurity-awareness-month","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/every-month-is-cybersecurity-awareness-month\/","title":{"rendered":"Every Month Is Cybersecurity Awareness Month"},"content":{"rendered":"<p>October is known as National Cybersecurity Month in the US. Due to the accelerated growth of cybersecurity risks, this sounds appropriate for end or home users but, at the same time, the situation is equally dangerous for any knowledgeable managed IT provider.<!--more--><\/p>\n<p>The malefactors have turned their attention not only to companies but also to MSPs. So it is obvious that September should also be known and publicized as Cybersecurity Month -- as well as, quite frankly, any other month of any upcoming year.<\/p>\n<p>In this article, we will provide some statistics about the latest cybersecurity incidents and risks, and define what you should do to protect both yourself, as an MSP, and your clients.<\/p>\n<h2>Cybersecurity Statistics<\/h2>\n<h3>Ransomware Hits 51% of All Companies<\/h3>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/Gated-Assets\/white-papers\/sophos-the-state-of-ransomware-2020-wp.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">According to Sophos<\/a>, 51% of companies were hit by ransomware during the last year, 73% of these attacks being successful. According to Sophos, that 51% is a slight decrease compared to 54% the previous year; but it\u2019s still huge.<\/p>\n<p><strong>It's all about people.<\/strong> According to IBM, user error is the cause of 95% of cybersecurity breaches. That figure is doubled in the report of the <a href=\"https:\/\/www.ncsc.gov.uk\/news\/most-hacked-passwords-revealed-as-uk-cyber-survey-exposes-gaps-in-online-security\" target=\"_blank\" rel=\"noopener noreferrer\">National Centre for Cyber Security<\/a>, which states that 45% of users are reusing their email passwords on other services. (And, the worst fact of all is that \u201c<strong>123456<\/strong>\u201d is the most popular password in the world.)<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/17-convincing-msp-statistics\/\" rel=\"bookmark\">17 MSP Statistics to Show the Value of Managed Services<\/a><\/p>\n<h3>Lack of Backups<\/h3>\n<p>It seems a bit weird to be talking about the necessity for backups in 2020, and yet, <a href=\"https:\/\/phoenixnap.com\/blog\/disaster-recovery-plan-checklist\" target=\"_blank\" rel=\"noopener noreferrer\">75% of small businesses have no disaster recovery plan<\/a> in place.<\/p>\n<h3>The Obvious Help of Backups<\/h3>\n<p>According to the same report, 96% of companies with a trusted backup and disaster recovery plan were able to successfully recover after <a href=\"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/\">ransomware attacks<\/a>.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/using-backup-to-elevate-a-cybersecurity-offering-to-a-cyber-resilience-offering\/\" target=\"_blank\" rel=\"noopener\">Using Backup to Elevate a Cybersecurity Offering to a Cyber Resilience Offering<\/a><\/p>\n<h3>MSPs Under Attack<\/h3>\n<p>The US Secret Service released a note in 2019 for public and governmental organizations that MSPs are now the prime target for cybercriminals. While there are no solid statistics on successful attacks on MSPs, there is the <a href=\"https:\/\/www.msp360.com\/resources\/blog\/louisiana-law-requires-msp-registration-with-the-state\/\">recent law in Louisiana<\/a> obliging MSPs to register with the state, the order to register each public or governmental data breach that happens under managed IT surveillance. Also, if you imagine that ransomware is basically about paying half a Bitcoin for your data, you are in for a surprise. In June 2019, an MSP paid a hacker <a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/msp-pays-150000-to-recover-data\/\" target=\"_blank\" rel=\"noopener noreferrer\">more than $150,000<\/a> to recover data after a ransomware attack. Learn <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-respond-to-cyberattacks\/\">how to to respond to cyberattacks on your business<\/a> in our article.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/takeaways-from-2019-ransomware-attacks-on-msps\/\">Takeaways From 2019 Ransomware Attacks on MSPs<\/a><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 55%;\">\n<div class=\"call-to-action__title\">The MSP\u2019s Response Guide to a Ransomware Attack [PDF]<\/div>\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 45%;\">\n<p style=\"text-align: center;\"><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a2062ec-621f-4c77-8987-132c5b498734\" data-portal=\"5442029\" data-id=\"4a2062ec-621f-4c77-8987-132c5b498734\"><span class=\"hs-cta-node hs-cta-4a2062ec-621f-4c77-8987-132c5b498734\" id=\"hs-cta-4a2062ec-621f-4c77-8987-132c5b498734\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a2062ec-621f-4c77-8987-132c5b498734\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a2062ec-621f-4c77-8987-132c5b498734\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a2062ec-621f-4c77-8987-132c5b498734.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<\/div>\n<\/div>\n<h2>Securing Your MSP: Best Practices<\/h2>\n<p>Managed IT providers are a really enticing target for malefactors. They basically own keys from their clients\u2019 tens and hundreds of IT infrastructures. In 2019, <a href=\"https:\/\/www.zdnet.com\/article\/us-secret-service-reports-an-increase-in-hacked-managed-service-providers-msps\/\" target=\"_blank\" rel=\"noopener noreferrer\">according to Huntress Labs<\/a>, in the US alone there were at least 63 successful reported MSP attacks which resulted in ransomware in their clients' networks.<\/p>\n<p>On the other hand, there is a second, more discreet attack vector. In the same 2019, <a href=\"https:\/\/www.zdnet.com\/article\/connectwise-warns-of-ongoing-ransomware-attacks-targeting-its-customers\/\">ConnectWise reported<\/a> that, due to an exploit in their massively popular RMM, hackers were able to spread crypto lockers across end-users.<\/p>\n<p>All that resolves to a single conclusion. Before securing your clients, you, as an MSP, should perform an <a href=\"https:\/\/www.msp360.com\/resources\/blog\/it-security-audit-guide\/\">IT security audit<\/a>, find all pain points, and eliminate all possible attack vectors.<\/p>\n<p>The single best practice is to perform a security audit on a monthly basis. It should be based upon a checklist of your software and hardware solutions. All changes during the previous months should be carefully noted. Here are some cybersecurity basics to include in your list:<\/p>\n<h3>Manage Passwords<\/h3>\n<ul>\n<li>Don't store your passwords in plain text; use a password manager.<\/li>\n<li>Don't share your password by copy\/paste in chats or emails.<\/li>\n<li>Don't reuse any previously created passwords.<\/li>\n<li>Create different passwords for different users and don't ever use the same passwords for several users or platforms.<\/li>\n<li>Create a guideline on how to create secure passwords and monitor monthly to check it's being used.<\/li>\n<\/ul>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/password-management\/\">Password Management Best Practices<\/a><\/p>\n<h3>MFA<\/h3>\n<p>Enable <a href=\"https:\/\/www.msp360.com\/resources\/blog\/mfa-for-msps\/\">multi-factor authentication<\/a> for all platforms you use, including PSA, RMM, emails, documentation platforms, and all others.<\/p>\n<h3>Keep in Contact with Your Vendors<\/h3>\n<p id=\"last\">You need to know about their exploits. Also, you should keep an eye on <a href=\"https:\/\/www.msp360.com\/resources\/blog\/msp-peer-groups\/\">MSP peer groups<\/a>. Typically, fellow MSPs find out about exploits and other vendor issues faster than the latter send out press releases.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-e6824cd7-ceb3-465a-9f93-4509b71ce559\" data-portal=\"5442029\" data-id=\"e6824cd7-ceb3-465a-9f93-4509b71ce559\"><span class=\"hs-cta-node hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\" id=\"hs-cta-e6824cd7-ceb3-465a-9f93-4509b71ce559\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-e6824cd7-ceb3-465a-9f93-4509b71ce559\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/e6824cd7-ceb3-465a-9f93-4509b71ce559.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<h3>Authenticate Callers<\/h3>\n<p>Don't blindly reset passwords or start remote sessions for anyone by request. You need to create a solid <a href=\"https:\/\/www.msp360.com\/resources\/blog\/customer-verification-for-msps\/\">end-user authentication policy<\/a>.<\/p>\n<h3>Basic Security<\/h3>\n<ul>\n<li>Ask your team to lock their computers when they leave the desk. Make the rule to auto-lock machines when idle for 15-20 minutes.<\/li>\n<li>Don't use open Wi-Fi networks.<\/li>\n<li>Encrypt your staff members\u2019 hard drives.<\/li>\n<li>Block ports 443, 80 for remote connections.<\/li>\n<li>Connect anywhere only with a VPN or other tunneling solution.<\/li>\n<li>Perform antivirus checks for each machine daily.<\/li>\n<li><a href=\"https:\/\/www.msp360.com\/resources\/blog\/guide-to-creating-msp-documentation\/\">Document<\/a> all network, security, and backup changes, and keep your documentation clean, concise, and in one place.<\/li>\n<li>Patch your systems whenever the patches come out. However, for Windows boxes, create a sandbox environment where you can test the updates. Microsoft tends to have buggy releases.<\/li>\n<li>Create a security manual for your team. Organize <a href=\"https:\/\/www.msp360.com\/resources\/blog\/guide-to-cybersecurity-training-programs\/\">cybersecurity training programs<\/a>, and test their knowledge monthly or quarterly.<\/li>\n<\/ul>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 50%; text-align: center;\">\n<p><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/05\/IT-Security-Assessment-1.png\" alt=\"Whitepaper icon\" \/><\/p>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" data-portal=\"5442029\" data-id=\"6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><span class=\"hs-cta-node hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" id=\"hs-cta-6cae84c3-fb62-47b1-a1f2-6744125b00e5\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-6cae84c3-fb62-47b1-a1f2-6744125b00e5\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/6cae84c3-fb62-47b1-a1f2-6744125b00e5.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 50%;\">\n<div class=\"call-to-action__title\">IT Security Assessment Checklist<\/div>\n<div class=\"call-to-action__text\">\n<p>Assess vulnerabilities and threats, network security, workspace and equipment security, documentation, and more. The pack includes:<\/p>\n<ul>\n<li>a ready-to-print PDF file<\/li>\n<li>an Excel file to help create a customizable assessment resource<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<h3>Cyber Insurance and Contracts<\/h3>\n<ul>\n<li>You need insurance. Discuss what exactly is needed with a company that is oriented towards IT insurance.<\/li>\n<li><a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-msps-can-limit-liability\/\">Limit your liability<\/a> in your contracts as much as possible. Check them with your attorney.<\/li>\n<\/ul>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/cyber-liability-insurance\/\">Do You Really Need a Cyber Liability Insurance?<\/a><\/p>\n<h2>Providing Managed Security to Your Clients<\/h2>\n<p>Nowadays, client cybersecurity protection is a must. You don't have to enable full-on SIEM for all clients and repurpose your MSP towards <a href=\"https:\/\/www.msp360.com\/resources\/blog\/providing-managed-security-services\/\">MSSP<\/a>, but antivirus, a firewall, a password policy, 2FA, backups in place, <a href=\"https:\/\/www.msp360.com\/resources\/blog\/network-audit-guide\/\">network audit<\/a>, email filtering, and spam protection are, again, a must. Here's a brief list of what you need to cover for your clients' basic protection:<\/p>\n<ul>\n<li><strong>The same policy as yours<\/strong>. All the basics we've outlined before that you must implement at your workplace should also be implemented at your clients\u2019.<\/li>\n<li><strong>Infrastructure<\/strong>. Monitor your clients\u2019 networks and connections. Perform a security audit monthly to find any unexpected changes in the configuration. Install antivirus and firewall for all devices.<\/li>\n<li><strong>Data protection<\/strong>. Create a solid backup and disaster recovery policy. You should understand how fast you can recover in different cases, starting with a faulty deletion and on up to a full-on ransomware attack on the network. Also, think about <a href=\"https:\/\/www.msp360.com\/resources\/blog\/introduction-to-bitlocker-for-msps\/\">protecting the users' hard drives with BitLocker<\/a>, for example.<\/li>\n<li><strong><a href=\"https:\/\/www.msp360.com\/resources\/blog\/cloud-iam\/\">Identity and access management<\/a>.<\/strong> Don't allow your users to create or change passwords. Only change passwords after an authenticated call. Make sure all users are using MFA on all systems.<\/li>\n<li><strong>Train and educate<\/strong>. Create videos and presentations about cybersecurity in general, <a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing-training-importance-explained\/\">anti-phishing training<\/a>, and <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-are-you-talking-to-customers-about-ransomware\/\">ransomware awareness training<\/a>. Make sure that your end-users understand how to act in the event of data breaches or hacks. (They need to contact you immediately and provide details.)<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>Cybersecurity is a must, and you must have solid security policies in place before it\u2019s too late. And, although it <em>might<\/em> happen that you or your clients never become a victim of a data breach or a hack, governments will at some point create further security compliance regulations for all MSPs managing user data. So, start today, and check your security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is known as National Cybersecurity Month in the US. Due to the accelerated growth of cybersecurity risks, this sounds appropriate for end or home users but, at the same time, the situation is equally dangerous for any knowledgeable managed IT provider.<\/p>\n","protected":false},"author":59,"featured_media":43688,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884,885],"tags":[],"class_list":["post-43686","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles","category-other"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/43686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=43686"}],"version-history":[{"count":3,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/43686\/revisions"}],"predecessor-version":[{"id":55538,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/43686\/revisions\/55538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/43688"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=43686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=43686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=43686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}