Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Solution Provider Program
    • Technology Alliance Program
SolarWinds MSP
  • Products
    • Remote Monitoring & Management Protect your customers with a platform from the global leader in monitoring and management.
    • Backup & Recovery Manage backup for servers, workstations, applications, and business documents from one cloud-based dashboard.
    • Mail Protection & Archiving Protect users from email threats and downtime.
    • Password Management Easily adopt and demonstrate best practice password and documentation management workflows.
      • Passportal Demo
    • PSA & Ticketing Manage ticketing, reporting, and billing to increase helpdesk efficiency.
    • Threat Monitoring Detect, respond to, and report on threats across your managed networks.
    • Remote Support Help support customers and their devices with remote support tools designed to be fast and powerful.
  • Solutions

    I'm looking to...

    I'm looking for...

    • Drive Efficiency with Automation
    • Manage my MSP Business More Efficiently
    • Manage my IT Department More Efficiently
    • Layered Security
    • Data-Driven Insights
    • Cross-Platform Support
  • Resources

    Webcasts & Events

    Resource Center

    • Ask the N-Central Experts
    • Daily Live Demos
    • Backup Foundations Training
    • RMM Foundations Training
    • Upcoming Events
    • Upcoming Webcasts
    • Resource Library
      • Case Studies
      • Product Information
      • eBooks
      • White Papers
      • Infographics
    • SolarWinds MSP Free Tools
    • GDPR Resource Center
    • Security Resource Center
    • MSP Institute Webinar Series
    • MSP Advice Project
  • About
    • Contact
    • Worldwide sales and support
    • Careers
    • Awards and Recognition
    • Get A Quote
    • Newsroom
      • Press Releases
      • In The News
      • Media Contacts
    • Leadership Team
    • Legal
      • Cookie Policy
      • Privacy Notice
      • Software Services Agreement
      • Terms of Use
      • Backup Fair Use Policy
    • Security
      • SolarWinds Security Statement
      • Vendor Data Protection Requirements
    • Support
  • Blog
  • Contact Sales
    • Get A Quote
    • General Inquiry
  • TRY NOW
    • SolarWinds RMM
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Passportal
    • SolarWinds Mail Assure
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • Tips & Advice
    • Training
Home Blog MSP Business Security-series 7 WAYS TO AVOID SECURITY BREACHES—Part 7, Improve Reaction Time
Security-series

7 WAYS TO AVOID SECURITY BREACHES—Part 7, Improve Reaction Time

By Pete Roythorne
8 August, 2017

In the final part of our blog series focusing on the key points of the Solar Winds MSP Cyber Preparedness survey, we look at how “lethargy” is hindering companies’ ability to effectively combat cyberattacks.

Over the past few weeks, we have explored in-depth the seven key areas for concern highlighted in our survey. These are the important takeaways we uncovered that companies and MSPs need to focus their attention on to get their cyberdefenses up to scratch. These are: 

1. Inconsistency – In enforcing security policies

2. Negligence – In the approach to user security awareness training

3. Shortsightedness – In the application of cybersecurity technologies

4. Complacency – Around vulnerability reporting

5. Inflexibility – In adapting processes and approach after breach

6. Stagnation – In the application of key prevention technologies

7. Lethargy – Around detection and response

 

Why Incidence Response Times Are on the Rise

ontherise.jpgAs part of our report—which surveyed 400 SMEs and enterprises, split equally across the US and the UK—we found that over the past 12 months, detection times for cyberintrusion had risen for 40% of respondents, response times were up for 44%, and resolution times had increased for 46%. In contrast, in our 2016 report, detection times had risen for only 28% of respondents, response times were up for 28%, and resolution times had increased for 27%.

The big worry is this shows that the rate of decay (and complacency) is growing, which is really bad news for organizations and their data security. 

What Challenges are Businesses Facing? 

businesschallenges.jpgWhat is abundantly clear is that businesses are experiencing real challenges, and struggling to even know at the simplest level when cyberattacks are happening. This is especially true for those companies with IT departments that do not have a background in security. In these instances, they are finding it more difficult to identify a breach and more challenging to respond and recover.

This is likely to continue on as a huge challenge going forward. The reality is that attackers are getting onto end points and then exfiltrating data long before they are discovered. This means that even with ransomware attacks, a lot of damage can be done before you see any screen demanding your money.

Ransomware is Just the Tip of the Iceberg

tipoficeberg.jpgFor example, if you get infected by a ransomware attack that comes via email, initially a Trojan will be downloaded that will likely scan your networks for things such as EPOS systems or accounting software. For cybercriminals, stealing material like bank details will be a much more enticing prospect than a simple ransomware. Once this data has been located and removed, the ransomware will be released as much as a smoke screen as anything else.

The Opportunity for MSPs

With the rise in detection, response, and remediation times, MSPs have an opportunity to show how they can provide real value, especially if they have a technology stack that can be deployed to help businesses manage and monitor their networks more effectively. Bundling digital forensics and incident response, with the ability to monitor infrastructure using different SaaS or multitenant subscription software, will be a major incentive for companies struggling to secure their networks.

 

We've tailored the report to reflect your side of the industry:

  • If you're a managed service provider, click here to download the full report 
  • If you're an IT pro, you should download this version 

Click here to find out more about how SolarWinds® MSP can help you protect your customers.

 

© 2017 SolarWinds MSP UK Ltd. All rights reserved.

You might also like...

Security-series

Recent Attacks on MSPs: What You Need to Know

Cybersecurity

Top 10 Cyberattack Vectors and Mitigation Tips: Part 2

Cybersecurity

Top 10 Cyberattack Vectors and Mitigation Tips: Part 1

Security-series

7 WAYS TO AVOID SECURITY BREACHES—PART 6, MOVE WITH THE TIMES

Security-series

7 WAYS TO AVOID SECURITY BREACHES—PART 5, BE FLEXIBLE

Security-series

7 WAYS TO AVOID SECURITY BREACHES—PART 4, TIGHTEN UP ON REPORTING

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts

  • Why MSPs Should Team Up with MSSPs
  • Why Properly Documenting Non-Technical Conversations and Decisions is Essential
  • Password Stealing 101: Common Methods and Defenses
  • Imaging vs. Cloning: Key Differences
  • Should You Give Your Clients Gifts Over the Holiday Season?

Categories:

  • Business Growth (420)
  • Security (346)
  • Tips & Advice (334)
  • Managed Services (303)
  • Best Practices (247)
  • Business (214)
  • Cybersecurity (194)
  • Backup & Disaster Recovery (116)
  • IT Support (109)
  • ITSM (78)
  • Data (64)
  • Product (63)
  • Cloud Computing (61)
  • Marketing (57)
  • Mail (53)
  • Networking (34)
  • Risk Intelligence (31)
  • Customer Service (29)
  • Remote Management (27)
  • Automation (19)
  • GDPR (17)
  • Services & Support (16)
  • Operations (16)
  • Service Desk (15)
  • Research & Trends (14)
  • PSA (12)
  • Business Risk (12)
  • Internet of Things (11)
  • Mobile (11)
  • Training (11)
  • Security-series (8)
  • Cybersecurity Awareness Month (6)
  • LOGICcards (4)
  • Machine Learning (3)
Show moreless
SolarWinds MSP

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.

Products

  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Threat Monitor
  • SolarWinds Passportal

Solutions

  • How We Help MSPs
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights

About

  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Privacy
  • Legal
  • Security
  • Subscription Preferences
  • SolarWinds

Support

  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Sitemap
  • Service Status