MSP Security: Protecting Your Customers Starts by Protecting Yourself

MSP Security: Protecting Your Customers Starts by Protecting Yourself

By Bill Yates

If you’re running a Managed Services Provider (MSP), you’re on the front lines of the war against security intrusions. Cybercrooks want to infect your system, because they want access to your customers. Scary thing is, they don’t even have to access your hardware to perform their dastardly deeds.

At the MSP Cybersecurity Theater on the Expo Floor of the ITEXPO held in Fort Lauderdale, FL, Marc Laliberte, senior security analyst at WatchGuard, outlined the major security threats MSPs face today. Technologies. He began at the company in tech support about seven years ago. Of course, he’s a hacker.

Thieves using stolen credentials and exploiting vulnerabilities in managed tools. Once they’re in, they’re running malicious code on PowerShell scripts that negate the need to infect the hard drive.

And now they’ve turned to MSPs to target their clients. “Crooks have learned that if they spend a little more time, they get more return on their investment,” Laliberte says.

Excluding poor password management, the top four security threats to your network:

  1. Ransomware
  2. Fileless malware
  3. Account takeover
  4. Spear phishing

Ransomware: You’re Fired!

A great way to get fired is to let your system get held for ransom. Last year, ransomware crooks turned their attention to MSPs. Their goal is to compromise all the MSP’s customers before you know they’re there.

Cyberthieves also are targeting healthcare companies, industrial control suppliers and local and state governments. “They’re going after specific verticals that can’t have any downtime at all,” Laliberte says. He says next on their list could be cloud storage companies.

In targeting MSPs, cybercrooks have added anti-malware evasions. They’re targeting backups so you’ll have no recourse, and they’re killing security processes along the way. All with the goal of going downstream and hitting your clients.

Fileless malware:

With file-based malware, eliminating the file often removed the threat. Now, many attacks begin with a short file that initiates a PowerShell script that holds the malicious payload. “Once it starts, it doesn’t matter if you wipe your hard drive clean,” he says.

Fileless malware never touches your hard drive or storage. Last year, PowerShell-based attacks were up 460%, Laliberte says. “It’s legitimate Windows tools turned against you,” he says.

To fight fileless intrusion, you need an intrusion protection system. Advanced malware detection, such as EDR software, also helps, Laliberte says.

Account takeover:

Account takeovers usually begin with a password breach. One tactic is password spraying, a brute-force method that applies the top 1,000 passwords to the attempt to break and enter.

Laliberte cites the top two threats to your network as the lack of multi-factor passwords and the reuse of passwords by lazy employees.

Multi-factor authentication helps prevent account takeovers. Laliberte also recommends offering phishing awareness training to your staff, as well as using advanced malware protection software.

Spear Phishing:

“Most attacks the days start with a phish,” Laliberte says. Multi-factor authentication can help fight the phish.  He estimates that up to 95% of attacks begin with a successful phishing campaign.

“Phishing is the leading cause when it comes to account takeovers,” he says. Poor email decisions are usually the cause. He recommends educating users and staff on elements of an email that give it away as a phish.

“Generally, there’s some sort of tell if it’s a phish or a spoof,” he says.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Communications Correspondent

SHARE THIS ARTICLE
Related Articles

ICYMI: News Around the MSP Industry

By: Greg Tavarez    5/17/2024

Here are a few articles compiled into one for readers interested in developments around the MSP space.

Read More

Wildix UK and Ireland Shake Up Leadership for Growth and Innovation

By: Greg Tavarez    5/16/2024

Wildix announced a strategic leadership transition designed to propel the company's market growth.

Read More

Are Resellers Leaving Money on the Table?

By: Special Guest    5/16/2024

The expert and correct installation of network infrastructure and other components is crucial to every IT project's success, adding tangible value by …

Read More

Bitwarden's New Standalone App Makes Two-Factor Authentication Simple

By: Greg Tavarez    5/15/2024

Bitwarden recently launched a standalone app for two-factor authentication to protect online services and applications from unauthorized access.

Read More

Cyware Quarterback: The AI Playmaker for Advanced Security Operations

By: Greg Tavarez    5/15/2024

Cyware Quarterback is a user-friendly, AI-powered interface that streamlines security tasks for enterprise clients and security information sharing gr…

Read More