At the beginning of October, conveniently dubbed National Cybersecurity Awareness Month, the Auvik team descended on the city of Pittsburgh to attend Continuum Navigate East 2019.

With recent MSP-targeted ransomware attacks fresh in the minds of all attendees, cybersecurity took the event by stormโ€”from keynotes to casual conversations, there was no escaping it.

What was everyone saying? We put together a list of four key takeaways from the event to fill you in.

1) The rise in cybercrime isnโ€™t ending anytime soon

In fact, in his opening keynote, Continuum CEO Michael George labeled the rise of ransomware attacks on the MSP industry a โ€œpandemic crisis.โ€

And heโ€™s not the only person who thinks so. On the Ecosystem panel discussion with other managed services vendor executives, Stephan Tallent, Fortinetโ€™s Senior Director of MSSPs, predicted an uptick in MSPs being targeted by threat actors.

Why? โ€œThatโ€™s where the money is.โ€

Stephan says while it may take more time and effort to breach an MSPโ€™s network, itโ€™s a high return on investment for an attacker: Once an MSP is breached, the attacker has access to the MSPโ€™s entire client base, where they can extort even more money from their victims.

2) SMBs are unsuspecting prey

While MSPs understand theyโ€™re prime attack targets, their clients arenโ€™t as concerned.

Daniel Eliot, Director of Education and Strategic Initiatives at the National Cyber Security Alliance (NCSA), says itโ€™s because small- to mid-sized businesses (SMBs) donโ€™t believe theyโ€™re likely to be targeted by cyberattackers.

During his Small Business, Big Target keynote, he shared some alarming statistics:

Photo: Tim Weber via Twitter / Used with permission
Photo: Tim Weber via Twitter / Used with permission

Let that sink in: Two in three SMB decision-makers think theyโ€™re safe from cyberattack, and three in five donโ€™t have a cyberattack prevention plan in place. If youโ€™ve been having trouble selling your clients on cybersecurity, this is why.

3) Email is your biggest enemy

While we think weโ€™re immune to phishing attempts, thatโ€™s not always the case. Even though the days of the Nigerian prince are long gone (although heโ€™s still active), phishing is still alive and well.

In fact, Daniel shared a scary stat that says otherwise: Over 90% of security breaches happen through email. All it takes is one employee accidentally logging into a website that looks like the company payroll website to take down the network.

As an MSP, Daniel says, youโ€™re responsible for preventing those breaches. But the good news is: A little education can go a long way in the fight against phishing.

4) Use industry best practices to secure your client networks

During the Ecosystem panel discussion, Intermedia COO and CRO Jonathan McCormick said fulfilling the first three steps of the CIS (Center for Internet Security) Cybersecurity Controls framework would be a huge boost to an MSPโ€™s cybersecurity defense.

He then challenged the audience to fulfill the first three steps before the end of the year.

It was a convenient, completely uncoordinated lead in to Auvikโ€™s You Canโ€™t Protect What You Canโ€™t See: Network Security Through Visibility breakout session, where our CMO Jacqui Murphy explained how MSPs can use Auvik to fulfill five steps of the CIS framework.

If you missed Jacquiโ€™s talk but are up to Jonathanโ€™s challenge, hereโ€™s how Auvik can help:

  • Maintain an up-to-date inventory of all hardware assets. With Auvik, you can see which devices are connected to your clientโ€™s network, including details like make and model, serial number, and IP address, as soon as theyโ€™re added.
  • Analyze for vulnerabilities in the network. If a bug in a deviceโ€™s software or firmware goes unnoticed, it creates a huge vulnerability and leaves a device open to manipulation. Auvik identifies the current software and firmware version of every device it discovers, so you can quickly see which version itโ€™s running.
  • Keep an eye on network ports and protocols. Which devices are connected to which ports? Are only approved ports and protocols being used? If something seems suspicious, Auvik TrafficInsightsโ„ข can show you the who, what, and where of the network traffic.
  • Harden network device credentials and configurations. If your clientsโ€™ login credentials and SNMP strings are left unchanged from the device defaults, a hacker can just look up the default password for a deviceโ€™s configuration header and get full access. So get creative with your device passwords, put in validated credentials, and set up devices with SSH. Auvik will automatically authenticate you when you log in to the system.
  • Make sure you can recover network device configurations. If your client experiences a cyberattack, you need to quickly be able to reset their system and its devices to the most recent configurations before the attack. With automatic configuration backups, Auvik makes it easier than ever to get your clients back up and running.

To test Auvikโ€™s remote management features for yourself, sign up for a free 14-day trial and get full access to your network from the comfort of your desk.

Get templates for network assessment reports, presentations, pricing & moreโ€”designed just for MSPs.

Ebook cover - The Ultimate Guide to Selling Managed Network Services

Leave a Reply

Your email address will not be published. Required fields are marked *