MSPs are the Holy Grail for Cybercriminals! Are You Protected?

Cybersecurity, MSP
The Holy Grail basking in light

Indiana Jones fans will likely remember the line from the “Last Crusade,” where Dr. Henry Jones tells his son, “The search for the holy grail is not about archeology. It’s a race against evil!” Just as Indy and his father were trying to stop the bad guys from getting their hands on the literal holy grail, MSPs are similarly tasked with stopping cybercriminals from gaining access to another holy grail—the data they house for clients.

MSPs hold the keys to the kingdom when it comes to data access and, while a typical day won’t involve leaping from trains to protect it like the fictional professor, they still need to take action to keep themselves and their SMB customers safe.

What Tactics Are Cybercriminals Using Against MSPs?

There are several strategies cybercriminals use in an attempt to breach MSPs.

Island Hopping

“Island hopping” is a term for network-based attacks where cybercriminals infiltrate one network for the purpose of “hopping” onto an affiliate network. For example, if an MSP is breached, hackers can access partner or SMB customer accounts, “hop” over, and breach their systems. They can also jump from a partner or SMB customer over to you! SMBs in certain industries are particularly vulnerable to island hopping, including HR, marketing, finance, and healthcare.

APT Attacks

Cybercriminals often use advanced persistent threat (APT) attacks to force their way in. These attacks are executed with the intent to surveil your systems and steal data slowly over an extended period of time. For example, last October, the U.S. Department of Homeland Security (DHS) warned MSPs about cybercriminals hacking customers’ networks and advised to lock down systems and data against supply chain attacks.

Watering Holes

Similar to island hopping, cybercriminals target third-party websites frequented by your partners or customers to steal usernames and passwords. After they acquire credentials from one site, hackers test them across multiple sites to see if accounts match. This is known as a “watering hole” attack and, in some cases, your credentials can be sold or otherwise acquired on the Dark Web. Financial institutions and retailers are repeat targets of these attacks by those seeking their access to large banks and customer credit card data.

Phishing Attacks

Phishing attacks remain a top threat for MSPs. Both island hopping and watering hole attacks use phishing to access MSP and SMB data. What’s alarming is that many phishing sites now use SSL certificates and HTTPS to trick internet users into believing that the pages are secure. Sadly, this type of phishing attack is increasing, with the number of malicious sites growing by 220% in 2018 alone. 

Strategies for Protecting You and Your SMB Customers

Unfortunately, you can’t hire an ageless knight to protect your business from an attack, but you can follow these best practices to ensure that your data remains secure:

  • Practice cyber hygiene by keeping systems patched and up-to-date.
  • Always use two-factor authentication (2FA) when signing into any website, create 2FA security for systems, and teach customers to use 2FA.
  • Don’t auto-save passwords and remind customers not to save their passwords to their MSP’s site or system.
  • Perform regular cybersecurity auditing every six months.
  • Avoid tools that are easy to compromise, like remote desktop protocol (RDP).
  • Use cybersecurity solutions with AI/machine learning – there’s power in prediction!
  • Undertake regular security awareness training (SAT) and offer it to customers. Studies show that end users are 70% less likely to fall for a phishing attempt after 12 months of SAT.
  • Partner with trusted cybersecurity experts.
  • Stay informed about current threats and look for MSP-specific warnings and advisories.

If you’d like to learn more about how to prevent island hopping and other cyberattacks, join Webroot experts on September 12 at 2 p.m. EDT for our exclusive webinar: “Using Prediction to Get to Predictable.”

What’s next?

I encourage you to start a free Webroot trial to see for yourself how our solutions can help you prevent threats and maximize growth: Endpoint Protection | DNS Protection | Security Awareness Training.

 

Illustration of man hanging on top of bar graphs

2020 IT Operations Survey Results – Highlights and Key Takeaways

Through our latest 2020 IT Operations Survey Results Reports – Strategic Priorities for IT Leaders and Technical Priorities for ITRead More

IT Security

IT Security: Profitability in a Service No One Wants to Use

No one likes paying for things they hope they will never use. Whether it’s car insurance or fire alarms orRead More

Ransomware

Why Ransoms Are Soaring

Attack Severity When Cryptolocker arrived in 2012, it brought a great deal of fear and panic in its wake. ThisRead More

SD Wan in Action with Eric Gray from Convergence Networks

How One MSP Improved Customer Satisfaction and Reduced Support Tickets

Because so many business applications we use are now in the Cloud, internet continuity is critical to daily operations, employeeRead More

2020 IT Operations Survey Results - Highlighs and Key Takeaways - Watch Now
2020 MSP Benchmark Survey Report

Archives

Categories