Make Sure Your MSP Isn’t Your Security Achilles’ Heel

While you might think your security is top-notch, are you sure your Managed Service Provider's (MSP) is too? In a recent advisory note, the 'Five Eyes' intelligence alliance (UK, Australia, Canada, New Zealand and the United States) reported an increase in hostile cyber activities targeting MSPs. They urged MSPs to harden their cyber security practices.

The report highlights that downstream risks to clients are likely to occur when an MSP falls victim to cyber vulnerabilities, which could result in an eye-opening digital supply chain attack.  
 
MSPs are vulnerable as hackers use the logic that if they attack, and successfully gain access to an MSP, they will get access to dozens or hundreds of customers. A high-profile supply chain cyber attack involved SolarWinds, a provider of IT management software back in December 2020. The attack involved malware, which spread around some of SolarWinds’ customers via their normal software update. Customers targeted included US Government agencies. A ransomware attack on US MSP Kaseya last year also affected up to 1,500 of its customers. And this year, targeting MSPs resulted in a cyber attack that caused the outage of the NHS 111 service
 
Whilst the ‘Five Eyes’ advisory caught headlines as a lesson on hardening cyber security best practices, there's a strong message that businesses using MSPs must make sure they pick the ones leading by example.  
 
Research by the Department for Digital, Culture, Media and Sport (DCMS) shows only 12% of organisations review the cyber security risks coming from their immediate suppliers. Only one in 20 firms (5%) address the vulnerabilities in their wider supply chain. 
 
The ‘Five Eyes’ advisory makes it clear that MSPs are under increasing attack and need to set an example of what cyber security should look like from the inside out.  So, how can companies assess the cyber security practices of their MSP to ensure they don’t become their security Achille's Heel?  
 
Here are the seven traits you need to identify to be sure your MSP has a strong security stance:  
 
1. Compliance.      MSPs are now being viewed as essential service providers by the UK Government. As a result, its Network and Information Systems (NIS) regulations is now being extended to MSPs. This means that essential service providers will be required to undertake risk assessments and put in place reasonable and proportionate security measures to protect their networks. They must report significant incidents and have plans to ensure they quickly recover from them. Although strict adherence to the Government regulations will soon be a minimum requirement, you should look for MSPs that can also demonstrate best practice in this area. Certification to a benchmarked standard such as ISO 2001 for information security and ISO 27032 for improving the state of cyber security is one of the best ways to tell that the cyber security plans of your MSP meet the industry standard. 

2. CIS Benchmarking.      The Center of Internet Security (CIS) has developed CIS Benchmarks, a set of globally recognised best practices to help security practitioners implement and manage cyber security defences. They exist to help organisations improve their cyber defence capabilities.  
 
CIS also controls the map to many established standards and regulatory frameworks, including the NIST Cybersecurity Framework (CSF) and NIST SP 800-53, the ISO 27000 series of standards, PCI DSS, HIPAA, and others. 
 
3. Depth of knowledge of security issues and tools.     There are a bewildering number of options when it comes to security tools for businesses, but an MSP should have a good understanding of your business and the security issues you face in order to evaluate your needs. Tools can be categorised as:     

  • Email management: To protect against spam, malware, ransomware and identity spoofing and they should also offer encryption, archiving or advanced threat protection.  
  • Advanced Endpoint Protection: This exists to satisfy the needs of a remote workforce and variety of end-user environments. As well as antivirus software, an MSP should also be able to recommend Endpoint Detection and Response (EDR) to identify suspicious system behaviour, block malicious activity and recommend action to restore affected systems.  
  • Web filtering: This includes the use of the Domain Name System to block malicious websites and unsafe content. This can help organisations control what websites employees are using and reduce likelihood of phishing attacks and malware.   
  • Managed Detection and Response (MDR) is a 24/7 threat detection and response offering to protect online operations.     
  • Penetration testing: An MSP should be able to offer you the expertise to carry out advanced pen testing; simulating a cyberattack so that you can better understand the vulnerabilities within your organisation’s infrastructure. 
  • Phishing prevention: Enhancing employee awareness around phishing attacks could be your organisation’s best line of defence. An MSP should be able to understand the specific needs of your organisation and deploy, manage, optimise and leverage security awareness training and phishing simulation techniques to meet them.  

4. The ability to connect the dots between disparate tools and skillsets.    A large, disconnected toolkit doesn’t win security battles. Having the expertise to deliver cutting-edge threat detection, response and resolution is how modern enterprises can reduce cyber security risks. An MSP should be able to bridge security gaps and vulnerabilities and offer access to advanced technology and skilled resources. 
 
5. Security that doesn't sleep (i.e. it's 24/7 or "always on" and alerted).     To identify problems before they even occur, an MSP should be able to demonstrate round the clock security provision for your business. The benefit of having an MSP handle your security is that they are free from distraction so they can focus their time and energy on finding indications of threat or compromise. Your partner should be able to demonstrate its ability to continuously monitor for anomalies to ensure risks are reduced and your business is safeguarded. 
 
6. Layering of appropriate technologies (and taking a tech-neutral approach for best outcomes).     A vendor and technology neutral MSP model - in which the MSP prioritises outcomes above a technology vendor - means that they can focus solely on putting the best interests of your business first. Apply a degree of caution to any MSP that is attempting to drive spend towards one service provider more than any others.   
 
7. Value-add versus simple reselling.
     It’s important to review how much value your MSP will provide you as a business. This isn’t simply to do with price or service – although both are important – but it applies to the impact and relationship that it offers you as a trusted partner.  
 
Can your MSP report to you in metrics that matter to you as a business? For example, can it demonstrate the percentage of downtime it’s preventing or the number of malware attacks its tools are preventing at the weekends or late at night?

For an MSP to add value, they need to understand your specific requirements and get ‘under the skin’ of the business.  
 
Your MSP should be able to proactively recommend cyber security services from a full portfolio without leaving gaps or vulnerabilities in your overall security posture. For example, a security solution stack should provide a first and last line of defence, as much as route to recovery in the event of a breach.

The big question is, does your MSP have the skills and resources available to make sure you win key security battles?  By working with the right MSP, you can not only maintain a strong security posture as a business, but also demonstrate to customers that you take the management of third-party risk seriously.  

Leyton Jefferies is Head of Cyber Security Services at CSI Ltd 

You Might Also Read:  

How To Outsmart Increasingly Complex Cyber Attacks:

 

« US Military Involved In Ukraine's Cyber Defences
Artificial Intelligence & Its Impact On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

e-End

e-End

e-End provides hard drive shredding, degaussing and data destruction solutions validated by the highest electronic certifcations to keep you compliant with GLB, SOX, FACTA, FISMA, HIPAA, COPPA, ITAR.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Awareness Software Limited (ASL)

Awareness Software Limited (ASL)

As Hosting Specialists, Awareness Software offer practical and affordable hosting solutions including backup and disaster recovery and a range of cybersecurity services.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.