Cyber Security Awareness Month

Cybersecurity Tip #16: Keep Your WiFi Hotspot Secure

#CybersecurityTip: Everyone and everything now has the capacity to connect to unsecured WiFi hotspots, increasing the threat risk for any organization. Risks such as vulnerable devices, corporate or personally owned, can pose as a major threat. Endpoint security alone is not enough to keep users safe. Some ways to protect your WiFi hotspot is to implement DNS protection that includes filtering and bandwidth monitoring integrated with endpoint security. Regulations such as GDPR, PCI, and HIPAA require extra security to protect sensitive data against malicious data exfiltration. Manage your WiFi hotspot and offer your clients a convenient public WiFi for their customers that they can trust.

Topics: Cybersecurity Tips

Cybersecurity Tip #15: Use Encryption Properly

#CybersecurityTip: Encryption is great, but it isn't everything. There are a number of things to be aware of. The Advanced Encryption Standard (AES) is to ensure data is encrypted in transit and at rest at 256-bit AESThis offers availability for a 48-character string to be converted into a 256-bit private encryption key that only you has access to. The catch: if the encryption keys are stored in the same location as the encrypted files, consider this security technique obsolete.

Topics: Cybersecurity Tips

Cybersecurity Tip #14: Use Multi-Factor Authentication

#CybersecurityTip: MSPs, double-up on your security. Use multi-factor authentication (MFA) in order to prevent unauthorized access to your network system accounts. Strong authentication is no longer a nice to have, it’s a must have - especially for MSPs who build their businesses on reducing risk for their clients. An MFA solution is critical to a complete managed services offering. Click here to discover 4 key benefits MSPs get when they leverage a powerful multi-factor authentication solution.

Topics: Cybersecurity Tips

Cybersecurity Tip #13: Avoid Storing Visible Credentials

#CybersecurityTip: Literally. As tempting as it is, avoid writing down your credentials and posting them on a sticky note on your computer for the world to see. Alternatively, avoid storing your credentials in a visible document to all staff. Avoid the password spreadsheet like the plague! Without appropriate access management tools will lead to a haphazard style of credential management. All users will then have access to sensitive passwords, granting unlimited access to IT assets that is not controlled. Maintaining password spreadsheets, printouts, text documents, or paper poses a serious security risk to your business and can be shared our insecurely amongst your technicians.

Topics: Cybersecurity Tips

Cybersecurity Tip #12: Change Passwords Regularly

#CybersecurityTip: For managed service providers (MSPs), a growing network infrastructure means a myriad of privileged credentials for a multitude of users. That is why having an active access management solution will help organize those credentials, offering capabilities to audit or rotate expired or soon to be expired passwords. It is best practice to rotate sensitive passwords every 90 days. An MSP should always keep in mind good password hygiene for their clients, for security is the utmost importance.

Topics: Cybersecurity Tips

Cybersecurity Tip #11: Keep An Eye On Permissions

#CybersecurityTip: Keep an eye on privileges and permissions. You have the control to give access at various capabilities. When using a access management system, the organization administration can restrict access of users from clients, folders, documents and passwords. Entire groups of users to be easily be added or removed from accessing specific records. This provides a convenient way to add new users to a previously setup access pattern.

Topics: Cybersecurity Tips

Cybersecurity Tip #10: Pay Attention to Access Management

#CybersecurityTip: Have you paid attention to who has access to what in your MSP? Are there limitations set amongst your employees and your networks? Privileged access management helps organizations reduce the risk of security breaches by controlling user permissions. Access management helps consolidate identities and control shared accounts by allocating role-based permissions to users. In return, this streamlines technician time and allows for auditing capabilities in order to provide access visibility.

Topics: Cybersecurity Tips

Cybersecurity Tip #9: Keep Cybersecurity on Your Agenda

#CybersecurityTip: Being aware of your MSP's cybersecurity protocol is necessary to maintaining good security practice. Start with a risk assessment for your MSP's internal systems. Do you have answers for questions such as:

  • How do you protect your data?
  • How confidential is it?
  • Are limits or permissions set for all levels?
  • What is your password policy?
  • How often do you change your passwords?
  • Do you use multi-factor authentication?

There are many more questions you can ask to assess how secure your MSP is. A cybersecurity breach can be a terminal event for C-Suite executives that are not aware, presenting a huge risk to the targeted organization, it's revenues, and most of all, it's reputation.

Topics: Cybersecurity Tips

Cybersecurity Tip #8: Cyber Assess Your MSP Business

#CybersecurityTip: Have you assessed your cyber resilience in your MSP business? The Cyber Resilience Review (CRR) Assessment on the Department of Homeland Security website is a no-cost, voluntary assessment to evaluate an organization’s current operational resilience and cybersecurity practices. The assessment provides a gap analysis for improvement based on officially recognized best practices. This is a good starting point to ensure your MSP business complies with current security protocols. Access the assessment below.

Topics: Cybersecurity Tips

Cybersecurity Tip #7: Protect Against Common Threats

#CybersecurityTip: Protect yourself and your clients from the most common types of threats such as phishing or social engineering attacks. Such attacks cause businesses to lose billions of dollars each year. A recent survey estimated that in 2017, 74% of threats initially entered organizations via email. Use good judgement and train your network on not to open suspicious emails from untrusted sources. Tell your SMBs to report such instances.

Topics: Cybersecurity Tips