Skip to main content
SolarWinds MSP
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
SolarWinds MSP
  • Products
    • SolarWinds N-central Automate what you need. Tackle complex networks. Try this remote monitoring and management solution built to help maximize efficiency and scale.
    • SolarWinds RMM Start fast. Grow at your own pace. Try this powerful but simple remote monitoring and management solution.
    • SolarWinds EDR Defend against ransomware, zero-day attacks, and evolving online threats with Endpoint Detection and Response
    • SolarWinds Backup Manage data protection for servers, workstations applications, documents and Microsoft 365 from one SaaS dashboard.
    • Mail Protection & Archiving Protect users from email threats and downtime.
    • Password Management Easily adopt and demonstrate best practice password and documentation management workflows.
      • Passportal Demo
    • PSA & Ticketing Manage ticketing, reporting, and billing to increase helpdesk efficiency.
    • Remote Support Help support customers and their devices with remote support tools designed to be fast and powerful.
  • Solutions

    I'm looking for...

    • Security Solutions
    • Monitoring Solutions
    • Efficiency Solutions
  • Resources
    • Blog
    • Webcasts & Events
    • Ask the N-central Experts
    • Daily Live Demos
    • RMM Foundations Training
    • Upcoming Events
    • Upcoming Webcasts
    • Resource Center
    • COVID-19 Resources
    • Resource Library
      • Case Studies
      • Product Information
      • eBooks
      • White Papers
      • Infographics
    • SolarWinds MSP Free Tools
    • GDPR Resource Center
    • Security Resource Center
    • MSP Institute Webinar Series
    • MSP Advice Project
  • About
    • Contact
    • Customer Success
    • Worldwide sales and support
    • Careers
    • Awards and Recognition
    • Get A Quote
    • Newsroom
      • Press Releases
      • In The News
      • Media Contacts
      • COVID-19 Response
    • Leadership Team
    • Legal
      • Cookie Policy
      • Privacy Notice
      • Software Services Agreement
      • Terms of Use
      • Backup Fair Use Policy
    • Security
      • SolarWinds Security Statement
      • Vendor Data Protection Requirements
    • Support
  • IT Departments
  • Contact Sales
    • Get A Quote
    • General Inquiry
  • TRY NOW
    • SolarWinds RMM
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Passportal
    • SolarWinds N-central
    • SolarWinds Mail Assure
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
  • Request a Quote
  • Try Now
    • SolarWinds RMM
    • SolarWinds N-central
    • SolarWinds Backup
    • MSP Manager
    • SolarWinds Mail Assure
    • SolarWinds Passportal
    • SolarWinds Risk Intelligence
    • SolarWinds Take Control
Request quote
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Cybersecurity MSP Data Breach 101: 4 things you need to know about data security
Cybersecurity

MSP Data Breach 101: 4 things you need to know about data security

By Davey Winder
18 May, 2017

According to the UK Government 'Cyber Security Breaches Survey 2017', some  46% of British businesses had at least 'one breach or attack' during the past year. The most common threat?  Phishing. 

However, such reports should be treated with caution as an attack isn't the same as a breach. Every business on the planet must have received at least one phishing email last year after all. Indeed, SolarWinds MSP’s Global Security Strategist, Ian Trump, and I co-authored a paper on the importance of 'meaningful measurement methodologies' a couple of years back which is still very much worth a read.

Too many companies failing to implement basic security controls

defending.jpgNo need to get overly concerned about the data breach threat then, right? Wrong, very wrong indeed. The threat is very real, and the attack methodologies are varied and increasingly complex. Burying your head in the sand is not an option, despite only 52% of the organizations surveyed in that government report admitting to implementing the basic technical controls as recommended by the Cyber Essentials scheme. 

It doesn't take a genius to realize that there remains a disconnect between the realities of the breach threat and the practicalities of defending against it. Managed service providers (MSPs) and other IT service providers must understand the risks of the business they are in, and how to best protect themselves and their clients against a potential breach.  At the end of the day a ransomware outbreak or data breach will strain the relationship between the MSP and their client, so you need to focus on delivering r consistent, quality service and limiting the possibility of your customer leaving you.

Remember that it's not just client data that you have to worry about, it's your own as well. You face the exact same breach threats as your customers at the end of the day. It's what I like to call 'eating your own dogfood', also known as practicing what you preach!

Here are four things you definitely need to think about:

1. Employ a risk management framework approach 

risk.jpgThis means you need to have a structured assessment or audit to enable risks, and their mitigation strategies, to be identified. Every risk should be considered and analysed, in turn this enables you to prioritize the mitigation required for each. In practical terms this means employing some kind of vulnerability scanning, which includes understanding what sensitive data is held and where. SolarWinds has the Risk Intelligence product, for example, that brings all of this information into a single dashboard. Most security experts would agree that a layered approach to breach defense is the way to go. This means ensuring you have the right firewalling in place along with intrusion detection systems (IDS), intrusion protection systems (IPS), and data loss prevention (DLP) systems.  

2. You need to stay on top of your patch management game

Vulnerabilities turn into 'in the wild' exploits very quickly indeed these days. Believe me, an attacker will be out there scanning for vulnerable systems and software within days (if not hours) of a patch becoming available. SolarWinds MSP’s LOGICcards can help here as they can notify you about missing patches.

3. It’s not just about the technology

While the technical side of data breach mitigation is, of course, vital to the security of your clients, it's not the be all and end all of the security equation. Understanding the threat is just as important if you are ever going to get on top of the risk. This means taking a broader view of the threat landscape to ensure you are not front and center on the attack map. Don't underestimate the insider threat. Plenty of breaches (as much as 25%) are actually inside jobs. They don't even have to be malicious—indeed, many are the result of negligence or error. Which is why security awareness training is an essential part of any data breach mitigation plan. Ensure that your employees—from shop floor to boardroom if you have one—are aware of the dangers of social engineering/phishing. Also ensure that those with control of the IT infrastructure are aware of the implications of slack access privilege controls. 

4. Also remember to see the smaller picture 

security.jpgThat sounds like the opposite of what good security is all about, right? Wrong again, sorry. Yes, you need to be able to lockdown your network and that of your clients, but you also need to be able to do this in the most granular of ways. With smartphones now being more like mini-laptops, especially when coupled to (often unknown to the business) cloud data stores, a lost or stolen one can mean a data breach right there on the spot. It may only be a mini-breach, but it can have mega-consequences if the lost data is of a sensitive nature. Remote locking of company devices, along with data wiping, is a minimum requirement for a strong security posture. That staff awareness training thing, with some backup from contractual accessible use policies, should also be in place.

These will all make it harder for the bad guys to get into your network and exfiltrate data. It's all about widening the window of opportunity to detect an attack before it becomes a breach, while simultaneously reducing the threat surface for the attacker. But what if the smelly stuff does hit the cooling device? That's where your breach response plan kicks in. 

You do have a breach response plan, don't you? 

Protect your partnerships

Dealing with a breached client is never going to be easy, but how you communicate the issue is key to your ongoing relationship. Which means, in the shortest practical timeframe, you need to let them know what data has been compromised, how the breach occurred (if you know at this stage, be honest and say you are still investigating if this is the case), and what is being done to prevent it happening again. Don't wait for a client to find out from a journalist or customer if you want your reputation to remain intact.

If this blog post was helpful, don’t miss this one about external attacks. 

 

Davey has been writing about IT security for more than two decades, and is a three times winner of the BT Information Security Journalist of the Year title. An ex-hacker turned security consultant and journalist, Davey was given the prestigious 'Enigma' award for his 'lifetime contribution' to information security journalism in 2011.  You can follow Davey on Twitter at @happygeek

 

You might also like...
MSP Business

Do we go overboard with security?

MSP Business

Password security - Considerations for MSPs

Business Growth

How to Get Customer Buy-In for Cybersecurity

Cloud Computing

Moving to the cloud: Help ensure your cloud-based web security

Cybersecurity

5 Ways to Stop Phishing Attacks

Best Practices

Two Factor Authentication (2FA) 101: What it is, why it matters for cybersecurity

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • January 2021 Patch Tuesday: One Actively Exploited Vulnerability and a Few Likely to Be
  • TAP Blog Series: Maximizing Your Service Delivery Opportunity
  • Why Do MSPs Choose SolarWinds Backup? IT Central Station Finds Out
  • Seven Features Remote Assistance Software Should Have
  • TAP Blog Series: Creating Your Automation Strategy—Three Key Components You Must Have in Place
Categories:
  • Security (229)
  • Tips & Advice (122)
  • Best Practices (94)
  • Managed Services (86)
  • Backup & Disaster Recovery (82)
  • Business Growth (75)
  • The Head Nerds (74)
  • IT Support (41)
  • Business (39)
  • Cybersecurity (37)
  • Automation (36)
  • Operations (33)
  • Mail (33)
  • Remote Management (27)
  • ITSM (25)
  • Cloud Computing (21)
  • Networking (21)
  • Data (21)
  • Marketing (14)
  • Product (11)
  • PSA (10)
  • Mobile (4)
  • Risk Intelligence (4)
  • Service Desk (4)
  • Services & Support (4)
  • Internet of Things (3)
  • Customer Service (3)
  • GDPR (2)
  • Research & Trends (2)
  • Training (2)
  • Business Risk (1)
  • LOGICcards (1)
Show moreless
SolarWinds MSP

Products
  • SolarWinds RMM
  • SolarWinds N-central
  • SolarWinds Backup
  • SolarWinds EDR
  • SolarWinds MSP Manager
  • SolarWinds Mail Assure
  • SolarWinds Risk Intelligence
  • SolarWinds Take Control
  • SolarWinds Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • SolarWinds
  • SolarWinds Trust Center
  • COVID-19 Response
Support
  • SolarWinds RMM
  • Solarwinds N-central
  • SolarWinds Backup
  • SolarWinds Mail Assure
  • SolarWinds Take Control
  • SolarWinds MSP Manager
  • Solarwinds Risk Intelligence
  • Solarwinds Threat Monitor
  • SolarWinds Passportal
  • SolarWinds Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© SolarWinds MSP Canada ULC and SolarWinds MSP UK Ltd.
All Rights Reserved.