Skip to main content
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
N-able
  • Request a Quote
  • Try Now
    • N-able RMM
    • N-able N-central
    • N-able Backup
    • MSP Manager
    • N-able Mail Assure
    • N-able Passportal
    • N-able Risk Intelligence
    • N-able Take Control
Request quote
N-able
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare N-able RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
SolarWinds MSP is becoming Read More
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Security Don’t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure
Security

Don’t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure

By SolarWinds MSP
10 August, 2020

An uncertain world can become a hotbed of cybercriminal activity. In situations like our current climate, users let their guards down and technicians have less control over customer environments as people work from home. The guardrails normally reducing companies’ cyber-risks start to disappear. 

In a previous post, we spoke about the challenges of the current environment and emphasized that practicing sound cyberhygiene has to remain paramount to keep your customers safe. We also gave five tips for helping prevent and deal with cyberthreats through sound foundational security practices. If you want to catch up, you can read the post here. 

Today, we’ll cover another five tips for reducing your cyber-risk. If you want to keep your customers safe, make sure to continue practicing these tactics (or start implementing them if you don’t already). 

1. Monitor for suspicious activity

You can take a lot of steps to prevent cyberattacks, from patching to firewalls to email protection. These preventive steps still need to be put in place, but prevention isn’t enough to protect your customers. You can’t just “set and forget” security—you need to actively monitor for threats and remain vigilant. This could mean monitoring network traffic for potential intrusions, using endpoint detection and response (EDR) tools to monitor for anomalous endpoint behavior, or watching for failed login attempts to prevent account takeovers. Ultimately, if you want to improve your customers’ security postures you need to put active monitoring in place. 

2. Have a backup

CTA Image

Password and Documentation Management

Request a Demo Learn More

It’s impossible to predict everything that can happen in an IT environment. Problems can occur at any time—from someone deleting critical data to natural disasters affecting either business continuity or affecting a data center. That’s why it’s absolutely critical to back up data so you’re prepared for the unpreparable. 

With ransomware threats in particular, backup is one of the main lines of defense. Yet, many ransomware attacks will first seek to delete local backups. So it’s important to have a good cloud-based backup in the event you have to restore critical data on someone’s machine. This is even more important as more workers continue operating out of home offices. Make sure to set up your backup solution to automate backups to run on a set schedule. Beyond this, make sure to periodically test your backups’ recoverability—the last thing you want is to be in a recovery scenario and find out your backups have an issue. 

3. Prevent attacks from spreading

Another important point to remember is that many of today’s attacks grow worse due to the increasing interconnectedness of modern IT environments. If ransomware lands on one machine, your goal should be to prevent it from spreading across a corporate network. This can keep a small problem from snowballing into a catastrophic one. 

To tackle this issue, make sure to reduce any unnecessary connections. Try to isolate the most sensitive devices or resources from the rest of the network. And make sure team members and end users know not to share credentials. This is particularly critical as cybercriminals target MSPs in their attacks. One account compromise could give the criminals access to multiple businesses’ sensitive data. Try getting a good password manager to help enforce strong password hygiene among your own team. 

4. Educate

Cybercriminals shift their tactics regularly. Ransomware victims now have to worry both about getting their data encrypted and potentially having that data exposed on public websites. Criminals have also changed their targets for ransomware attacks toward smaller governments, often taking those victims offline for days. More recently, criminals have sought to launch attacks by using fear around COVID-19 as a hook in phishing campaigns and scams. And malicious actors have increasingly come to rely on methods to circumvent antivirus by using malware obfuscation techniques or fileless attacks, making endpoint detection and response tools more important. 

The point here is that you want to continue educating yourself and your customers on the latest threats. Knowing the trends in cybersecurity can help you best focus your resources on threats and stay ahead of the cybercriminals. Make sure to educate your users during this time via security training and reminders as well. This gives you the opportunity to not only help them prevent attacks, but also gives you a chance to remind customers of the value you provide. 

5. Stay vigilant against spam

The previous section mentioned cybercriminals using news around COVID-19 to try to scam users. This simply underscores the importance of email security. Since many attacks begin via email, it makes sense to put in place safeguards against email-borne threats.

For starters, it helps to add an email security gateway to bolster the native security in customers’ native email solutions. For example, SolarWinds® Mail Assure uses collective intelligence from its user base combined with threat intelligence to help take email security to a new level. Additionally, use your user training opportunities to teach customers how to recognize and avoid spam and email phishing. With so many employees working remotely, email security should be thought of as the first line of defense against common threats.

Stay vigilant

Unfortunately, during times of confusion and uncertainty cybercrime can often increase. Despite this, there are still plenty of steps you can take to help keep your customers secure. So stay strong—your customers need you now more than ever. 

 

In this piece, we spoke about the importance of password security. This is particularly important for MSPs. If criminals can get the password to a technician’s account, they can often breach multiple customers. SolarWinds Passportal + Documentation Manager is a cloud-based password management system designed to help you maintain password best practices across your MSP team. Learn more about how it can help you today. 

 

You might also like...
Security

DearCry Ransomware Review 

Security

Endpoint security for Mac: What you need to know In 2021

Security

A guide to patch management policies for MSPs

Security

A Beginner's Guide to Unified Endpoint Management

Mail

How to Detect and Prevent Business Email Compromise

Security

Intrusion Detection System (IDS): Signature vs. Anomaly-Based

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • DearCry Ransomware Review 
  • PSA vs ITSM vs ESM: Part 2—Which is the right fit for your MSP?
  • 4 ways PSA software helps MSP businesses
  • PSA vs ITSM vs ESM: Part 1—What do they do? 
  • Endpoint security for Mac: What you need to know In 2021
Categories:
  • Security (252)
  • Tips & Advice (130)
  • Backup & Disaster Recovery (97)
  • Best Practices (97)
  • Managed Services (89)
  • The Head Nerds (88)
  • Business Growth (79)
  • IT Support (43)
  • Business (42)
  • Automation (41)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (37)
  • Remote Management (31)
  • ITSM (26)
  • Data (23)
  • Networking (22)
  • Cloud Computing (21)
  • PSA (16)
  • Marketing (15)
  • Product (11)
  • Service Desk (7)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • GDPR (3)
  • Internet of Things (3)
  • Customer Service (3)
  • Research & Trends (2)
  • Training (2)
  • Business Risk (1)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
Show moreless
N-able

Products
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able EDR
  • N-able MSP Manager
  • N-able Mail Assure
  • N-able Risk Intelligence
  • N-able Take Control
  • N-able Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • COVID-19 Response
Support
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able Mail Assure
  • N-able Take Control
  • N-able MSP Manager
  • N-able Risk Intelligence
  • N-able Threat Monitor
  • N-able Passportal
  • N-able Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© N-able Solutions ULC and N-able Technologies Ltd.
All rights reserved.