MSP Security: Protecting Your Customers Starts by Protecting Yourself

MSP Security: Protecting Your Customers Starts by Protecting Yourself

By Bill Yates

If you’re running a Managed Services Provider (MSP), you’re on the front lines of the war against security intrusions. Cybercrooks want to infect your system, because they want access to your customers. Scary thing is, they don’t even have to access your hardware to perform their dastardly deeds.

At the MSP Cybersecurity Theater on the Expo Floor of the ITEXPO held in Fort Lauderdale, FL, Marc Laliberte, senior security analyst at WatchGuard, outlined the major security threats MSPs face today. Technologies. He began at the company in tech support about seven years ago. Of course, he’s a hacker.

Thieves using stolen credentials and exploiting vulnerabilities in managed tools. Once they’re in, they’re running malicious code on PowerShell scripts that negate the need to infect the hard drive.

And now they’ve turned to MSPs to target their clients. “Crooks have learned that if they spend a little more time, they get more return on their investment,” Laliberte says.

Excluding poor password management, the top four security threats to your network:

  1. Ransomware
  2. Fileless malware
  3. Account takeover
  4. Spear phishing

Ransomware: You’re Fired!

A great way to get fired is to let your system get held for ransom. Last year, ransomware crooks turned their attention to MSPs. Their goal is to compromise all the MSP’s customers before you know they’re there.

Cyberthieves also are targeting healthcare companies, industrial control suppliers and local and state governments. “They’re going after specific verticals that can’t have any downtime at all,” Laliberte says. He says next on their list could be cloud storage companies.

In targeting MSPs, cybercrooks have added anti-malware evasions. They’re targeting backups so you’ll have no recourse, and they’re killing security processes along the way. All with the goal of going downstream and hitting your clients.

Fileless malware:

With file-based malware, eliminating the file often removed the threat. Now, many attacks begin with a short file that initiates a PowerShell script that holds the malicious payload. “Once it starts, it doesn’t matter if you wipe your hard drive clean,” he says.

Fileless malware never touches your hard drive or storage. Last year, PowerShell-based attacks were up 460%, Laliberte says. “It’s legitimate Windows tools turned against you,” he says.

To fight fileless intrusion, you need an intrusion protection system. Advanced malware detection, such as EDR software, also helps, Laliberte says.

Account takeover:

Account takeovers usually begin with a password breach. One tactic is password spraying, a brute-force method that applies the top 1,000 passwords to the attempt to break and enter.

Laliberte cites the top two threats to your network as the lack of multi-factor passwords and the reuse of passwords by lazy employees.

Multi-factor authentication helps prevent account takeovers. Laliberte also recommends offering phishing awareness training to your staff, as well as using advanced malware protection software.

Spear Phishing:

“Most attacks the days start with a phish,” Laliberte says. Multi-factor authentication can help fight the phish.  He estimates that up to 95% of attacks begin with a successful phishing campaign.

“Phishing is the leading cause when it comes to account takeovers,” he says. Poor email decisions are usually the cause. He recommends educating users and staff on elements of an email that give it away as a phish.

“Generally, there’s some sort of tell if it’s a phish or a spoof,” he says.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Communications Correspondent

SHARE THIS ARTICLE
Related Articles

Barracuda Managed Vulnerability Security: A Proactive Shield Against Escalating Cyber Threats

By: Erik Linask    6/26/2025

Barracuda's Managed Vulnerability Security is a fully managed scanning and risk assessment service powered by its global SOC.

Read More

Can MSPs Cut Microsoft Teams Incident Management Time by 50%? Martello Says Yes

By: Erik Linask    6/18/2025

New research shows MSPs can achieve a 50% reduction in labor required for Microsoft Teams incident management by using proactive monitoring and advanc…

Read More

Supercharging Your MSP with AI at SuperSummit 2025 in Dallas

By: Erik Linask    6/18/2025

SuperSummit 2025 features targeted content and education to help MSPs capitalize on the AI revolution to improve there businesses models and operation…

Read More

Ooma AirDial Elevates POTS Replacement for Large Organizations

By: Erik Linask    6/17/2025

Ooma's new RDM features are tailored for scalability of POTS replacement projects, whether those are managed by in-house IT teams or MSP partners.

Read More

Arctic Wolf Revamps MSP Channel, adds Endpoint Security

By: Erik Linask    6/13/2025

Arctic Wolf has redesigned its MSP partner program and introduced Aurora Endpoint Security for MSPs in an effort to equip MSP with the tools to combat…

Read More