Skip to main content
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
N-able
  • Request a Quote
  • Try Now
    • N-able RMM
    • N-able N-central
    • N-able Backup
    • MSP Manager
    • N-able Mail Assure
    • N-able Passportal
    • N-able Risk Intelligence
    • N-able Take Control
Request quote
N-able
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare N-able RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
SolarWinds MSP is becoming Read More
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Security 5 Ways to Help Prevent Insider Threats 
Security

5 Ways to Help Prevent Insider Threats 

By Marco Muto
20 June, 2019

There is no getting away from the fact that insider threats are a very real risk for companies. While malicious threats from disgruntled employees exfiltrating data and selling it do happen, by far the biggest insider threat comes from employee and contractor negligence. A survey conducted by IDC on behalf of SolarWinds found that over 60% of respondents said insider mistakes were their biggest threat. Ponemon’s Insider Threat Statistics showed that accidental insider threats cost roughly $283,000 per incident; due to their frequency, these incidents wrack up around $3.8 million per year. 

Elsewhere, a Crowd Research Partners survey found that privileged users are the biggest source of concern for organizations. Fifty-five percent of companies responding cited this as their biggest insider threat risk. Many high-profile breaches happen as a direct result of inadequate management of privilege access and unintentionally exposed administrative credentials.

As a managed services provider (MSP) this is definitely an area you need to be focusing on with your customers. Here are five tips to help you help your customers reduce the insider threat risk. 

1/ Educate Your Potential Customers

As a service provider, you’ll likely run into customers with a varying level of understanding about the potential of insider threats. Some may completely understand the risk, while others may naturally trust their employees (especially if they passed a basic background check). 

Due to this, it’s important to get your customers on the same page about the potential risks of an insider attack. Start that communication early during the sales process. Make sure to put information in your sales pitch about protecting against insider threats, and why it’s so important. You may consider making an insider threat prevention program a non-negotiable service as part of the deal, and walk away from customers who don’t see the need. Ultimately, it’s not just their reputation on the line after a breach—it’s yours as well. 

With data breach increasingly likely to be caused by insiders, find out how to make your approach to security more proactive… DONWLOAD our free eBook.

10 Steps to Proactive Security

2/ Implement Strong HR Policies

You can’t fully control this element, but your customers’ HR policies can make a huge difference in reducing their insider attack risk. Your job is to persuade them to take these policies seriously. 

For starters, they should perform background checks on new hires. Hopefully, they do this already, but make sure to stress the importance of this before they hire someone. Next, they should have a plan in place for employee turnover. When an employee leaves, they should be required to hand over all equipment and keys, and the customer should communicate their departure to you promptly so you can revoke access to important accounts or data. While many employees leave amicably, it only takes one disgruntled former employee to wreck a company’s reputation. Don’t let them take that risk. 

3/ Zero Trust

When you start to focus on securing your customers’ networks against insider threats, make sure to implement and police a zero-trust identity policy. The zero-trust identity model claims that access to resources and systems should be denied by default. Only when users meet certain characteristics will they be granted access to specific systems or resources, and only for a limited period of time.

For example, let’s say someone needs to access the accounting database for one of your clients. You could set up the environment so it checks that the user has the proper role in the accounting department, is using a known computer, and is doing so from a known, safe location. If one of those attributes doesn’t check out, the system could prompt the user for more information, such as a temporary code sent via text or email. 

4/ Identity Management

Another important part of this plan involves implementing strong identity management and implementing least privilege. When setting up user accounts for your customers, make sure they can access only the data and resources they absolutely need for their jobs. Any additional privileges they have represent considerable risks to the business. 

When you first take on a new client, audit their existing users and permissions to make sure no one has more privileges than they need. You may be surprised how often one user ends up with administrator privileges on key systems simply because no one enforced access controls as the company grew. Once you have this audit in place, work on reducing access rights to the minimum needed for employees to do their jobs.

However, this goes beyond initial setup. You have to actively manage user permissions and access. If someone moves departments, you should revoke access to their old systems. For example, if someone from the human resources department switches career paths and joins the marketing team, it would be risky for them to still be able to access sensitive employee information. Remember, if someone doesn’t need access to a resource to do their job, don’t let them. 

5/ RMM Checks

Finally, in today’s ever-changing threat landscape, anything that can help you get ahead of the game is hugely important. This is where your existing technology comes into play. Some remote monitoring and management solutions, like SolarWinds® RMM, allow you to create checks to indicate a potential threat. 

For example, SolarWinds RMM would let you set up a check for changes to Active Directory that could indicate someone attempting to modify permissions. Or you could set up a check looking for mass file deletions, which could indicate someone attempting to damage important, business-critical information. If your RMM tool alerts you to something like this, then you can respond accordingly.

Conclusion

Unfortunately, employees can and do cause data breaches. As an MSP, you’re responsible for preventing these. So make sure to implement the right steps. 

Remember, a well-maintained environment is a secure one. 

 

Marco Muto, Director, Business Development at SolarWind

 

To find out how the SolarWinds security suite can help you protect your customers, click here 

 

Additional reading

Why your layered security strategy starts and ends with BDR
Moving to the cloud: Help ensure your cloud-based web security
How to Have a Security Conversation with the Small Business That Doesn’t Want to
You might also like...
Security

DearCry Ransomware Review 

Security

Endpoint security for Mac: What you need to know In 2021

Security

A guide to patch management policies for MSPs

Security

A Beginner's Guide to Unified Endpoint Management

Mail

How to Detect and Prevent Business Email Compromise

Security

Intrusion Detection System (IDS): Signature vs. Anomaly-Based

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • DearCry Ransomware Review 
  • PSA vs ITSM vs ESM: Part 2—Which is the right fit for your MSP?
  • 4 ways PSA software helps MSP businesses
  • PSA vs ITSM vs ESM: Part 1—What do they do? 
  • Endpoint security for Mac: What you need to know In 2021
Categories:
  • Security (252)
  • Tips & Advice (130)
  • Backup & Disaster Recovery (97)
  • Best Practices (97)
  • Managed Services (89)
  • The Head Nerds (88)
  • Business Growth (79)
  • IT Support (43)
  • Business (42)
  • Automation (41)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (37)
  • Remote Management (31)
  • ITSM (26)
  • Data (23)
  • Networking (22)
  • Cloud Computing (21)
  • PSA (16)
  • Marketing (15)
  • Product (11)
  • Service Desk (7)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • Customer Service (3)
  • GDPR (3)
  • Internet of Things (3)
  • Training (2)
  • Research & Trends (2)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
  • Business Risk (1)
Show moreless
N-able

Products
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able EDR
  • N-able MSP Manager
  • N-able Mail Assure
  • N-able Risk Intelligence
  • N-able Take Control
  • N-able Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • COVID-19 Response
Support
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able Mail Assure
  • N-able Take Control
  • N-able MSP Manager
  • N-able Risk Intelligence
  • N-able Threat Monitor
  • N-able Passportal
  • N-able Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© N-able Solutions ULC and N-able Technologies Ltd.
All rights reserved.