Facebook Twitter Instagram
    Trending
    • David Marcus Talks about the Blurred Lines in Cybersecurity
    • Audi and the Massive Automotive Changes Between 2025 and 2030
    • How to Deploy Managed IT Services in a Mixed Mac and Windows Environment
    • 5 Tech Developments That Have Revolutionized Investing
    • Shashi Prakash Chats about Cryptocurrency and NFT Fraud
    • GM May Have Just Fixed the Electric Car
    • How Telemedicine Apps Affect Healthcare in a Pandemic
    • How To Improve Business IT Services to Overcome Challenges In 2021
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • News & Analysis
      Featured
      March 6, 20211

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      April 9, 2021

      CISO Panel Discussion Weighs in on Cybersecurity in the Digital Age

      April 2, 2021

      FTC vs. Qualcomm: Did Apple Illegally Influence The FTC?

      April 2, 2021

      A Look at Microsoft Mesh

    • Business
      Featured
      March 6, 20211

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      April 19, 2021

      How to Deploy Managed IT Services in a Mixed Mac and Windows Environment

      April 9, 2021

      How To Improve Business IT Services to Overcome Challenges In 2021

      April 9, 2021

      CISO Panel Discussion Weighs in on Cybersecurity in the Digital Age

    • Security
      Featured
      March 7, 20211

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      April 13, 2021

      Shashi Prakash Chats about Cryptocurrency and NFT Fraud

      March 30, 2021

      Exploiting Embedded Linux Devices Through the JTAG Interface

      March 28, 2021

      Zero Trust for Data

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      September 12, 2020

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      July 13, 2020

      Learning from the Microsoft Store Failure

      May 15, 2020

      The Microsoft Surface Earbuds: How Many Ways Can You Say “Awesome!”?

    • Podcasts
    • Technology
      Featured
      March 1, 20212

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      April 19, 2021

      Audi and the Massive Automotive Changes Between 2025 and 2030

      April 17, 2021

      5 Tech Developments That Have Revolutionized Investing

      April 13, 2021

      Shashi Prakash Chats about Cryptocurrency and NFT Fraud

    • Reviews
      Featured
      March 4, 20210

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      8.0
      March 29, 2021

      Review: Peril Protect

      10.0
      March 15, 2021

      Review: Tesla Puddle Lights

      9.0
      March 13, 2021

      Review: Ubiquiti UniFi Dream Machine Pro

    TechSpective
    You are at:Home»Business»Security»Cloud Security»Adding Security to Your MSP Business: Opportunities and Challenges
    MSP security
    Image from Pixabay

    Adding Security to Your MSP Business: Opportunities and Challenges

    0
    By Eddy Bobritsky on May 11, 2018 Cloud Security, Data Protection, Malware, Security, Security Awareness

    Managed service providers (MSPs) have proved invaluable for companies that want to focus on their core business by outsourcing IT and security needs to experts who can keep them protected from everyday threats. Your MSP clients prize the ability to avoid major capital expenses to scale their technology environment as they grow and change, and to add emerging tech capabilities when the need arises. You have most likely heard from clients, especially smaller businesses (SMBs), that they need technical help from you beyond infrastructure and applications. Among the most critical challenges they face is finding reliable assistance with cybersecurity.

    In this year’s Verizon Data Breach Investigations Report, 58 percent of the victims were classified as small businesses. A survey of small businesses (under 300 employees) by Nationwide found that 57 percent of owners do not have a dedicated employee or vendor monitoring for cyber-attacks. In the same survey, 20 percent of attack victims spent $50,000 or more to recover and required more than six months to get back to normal.

    The costs of recovery and loss of data are often insurmountable, especially for smaller companies. SMBs usually don’t have the security or public relations expertise to respond effectively to incidents, and often do not have sufficient backup and disaster recovery systems in place, making them especially vulnerable to ransomware.

    MSPs that haven’t yet built an information security practice may be subject to similar risks, and often share the responsibility and costs related to SMB clients’ vulnerabilities. A failure to protect your clients may seriously damage your MSP’s reputation and affect your business financials.

    Most MSPs settle on providing only the most essential security components to defend against everyday threats; these typically include antivirus, email scanning, network firewalls, and similar protections. You may decide to take this approach in your MSP business in order to offer a new chargeable service, to reduce the cost of remediation via a Remote Monitoring and Management (RMM) feature, or to augment service commitments.

    However, you might want to go beyond the bare essentials (i.e., AV, firewalls) to provide your customers with a more powerful combination of endpoint protection, monitoring and threat detection, compromise assessment, forensics, and incident response. If your MSP is currently focused on core IT tasks related to managing customer environments, deciding to ramp up to this next level of security offerings is no minor undertaking.

    Your MSP’s new security offerings will be most successful when your carefully considered plans account for all types of associated costs. Inevitably, there will be hidden expenses, especially when it comes time to respond to an infection that wasn’t prevented by AV. Not-so-obvious costs include, but are not limited to:

    • Time spent diagnosing the issue and performing root cause analysis
    • Time spent cleaning, reimaging, and replacing infected endpoints
    • An unhappy and unproductive customer
    • Lowered customer trust and credibility
    • Public relations, legal, regulatory, and notification costs

    Beware of assuming that you can “set it and forget it”. Deploying one or more mainstream security solutions is not sufficient to cover you or your customers. At the end of the day, signature-based solutions rely on detecting the presence of malware based on its similarity to previously seen malicious programs. What happens when malware is smart enough to avoid detection?

    The majority of malware today employs one or more techniques to avoid detection. There are hundreds of thousands of such evasive techniques; many are readily available to download from the Darknet. As these insidious methods become simultaneously more sophisticated and more widespread, the effectiveness of detection-based solutions is further undermined.

    Types of evasive techniques include:

    • Staying under the radar of security vendors by testing the target environment to see if it has certain defenses in place. If the malware sees something it doesn’t like, it just won’t run, extending its lifespan in the wild before security vendors fingerprint it.
    • Embedding itself within document files that appear to be work-related, then leveraging Microsoft Office macros and other scripted languages to execute malicious code. This allows malware to blend into its environment in a way that most AV products won’t detect.
    • Injecting itself into the memory of legitimate applications to avoid the use of files (which could be scanned) and to reside inside processes that AV considers good (thereby making the malware look like something as benign as Notepad).

    Antivirus solutions will stop nearly every routine, non-evasive malware attack. It’s the evasive malware that’s going to eat up your time, energy, and profits.

    The simplest, most effective way to avoid recovery costs is two-fold: first, ensure you have the best possible chance of malware never getting a foothold on your customers’ endpoints. Second, minimize remediation work by ensuring early detection and containment of infections, breaches, and ransomware.

    There are a few high-level ways to accomplish this:

    • Think Layered Security — A single solution or methodology is far too easy to bypass. Think along the lines of multiple solutions, such as endpoint-based AV, an email gateway, web scanning/filtering, etc. At a minimum (i.e., for an RMM offering), consider AV solutions that employ multiple approaches (signatures, heuristics, behavioral, computer-based learning, etc.) to identifying threats.
    • Address Evasive Malware – Implement a solution specifically designed to fight evasive malware. To be clear, this is not a replacement for customer endpoint protection (or any other component), but a means to strengthen AV and cover gaps created by evasion techniques in order to prevent as many malware attacks upfront rather than chase detection-based alerts.
    • Have a Response Plan Ready – MSPs intent on putting a security service offering in place need a plan of what’s going to be done when (not if) a breach or attack hits. You should have this plan ready before you define your service commitments, so that you know what you will be doing and what your customer can expect. This plan is critical to keeping the recovery workload to a minimum.
    • Include Backup and Recovery – Security solutions can fail. It’s imperative to have backups of and a recovery plan for critical endpoints, servers, applications, and data sets in the event of an attack that involves infection, encryption, or data manipulation.

    By leveraging a combination of security solutions that address both non-evasive and evasive malware, you keep malware out — resulting in a more predictable workload, an increase in your techs’ productivity, a more profitable MSP business, and happier customers.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe Lenovo Mirage Solo: Redefining Mixed Reality
    Next Article Attackers Devise Evasive Techniques to Exploit Microsoft Equation Vulnerability
    Eddy Bobritsky
    • Website

    Eddy Bobritsky is Co-Founder and CEO at Minerva Labs, a leading provider of anti-evasion technology for enterprise endpoints. Eddy is a cyber and information security domain expert. Before founding Minerva Labs, Eddy was a senior cyber security consultant for the defense and financial sectors. During his military career in the Israel Defense Forces (IDF) Navy cyber unit, Eddy was in charge of overseeing the largest Endpoint Protection project in Israel, from design, through development, to implementation and maintenance of hundreds of thousands of endpoints. Eddy’s rule of thumb is to 'keep things simple' in order to help businesses operate seamlessly, which is why he started Minerva Labs. Eddy holds a Master's degree in Business Management and Information Technology.

    Related Posts

    Shashi Prakash Chats about Cryptocurrency and NFT Fraud

    CISO Panel Discussion Weighs in on Cybersecurity in the Digital Age

    Exploiting Embedded Linux Devices Through the JTAG Interface

    Comments are closed.

    Site Sponsors
    Qualys
    Intel
    Adobe
    PopSpective
    Coffee and Politics
    DevOps.com
    • Technology
    • Popular
    • Top Reviews
    April 19, 2021

    Audi and the Massive Automotive Changes Between 2025 and 2030

    April 17, 2021

    5 Tech Developments That Have Revolutionized Investing

    April 13, 2021

    Shashi Prakash Chats about Cryptocurrency and NFT Fraud

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    Coffee and Politics
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    PopSpective
    Qualys
    Qualys
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    PopSpective
    © 2020 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.