{"id":10602,"date":"2023-08-22T21:46:04","date_gmt":"2023-08-22T21:46:04","guid":{"rendered":"https:\/\/mysourcefunding.com\/startups\/crafting-a-winning-cybersecurity-practice-for-your-msp\/"},"modified":"2023-08-22T21:46:05","modified_gmt":"2023-08-22T21:46:05","slug":"crafting-a-winning-cybersecurity-practice-for-your-msp","status":"publish","type":"post","link":"https:\/\/mysourcefunding.com\/?p=10602","title":{"rendered":"Crafting A Winning Cybersecurity Practice For Your MSP"},"content":{"rendered":"<div>\n<p><em>Gaidar Magdanurov is the Chief Success Officer at <\/em><em data-ga-track=\"ExternalLink:https:\/\/www.acronis.com\/en-us\/\">Acronis<\/em><em>. <\/em><\/p>\n<p>According to CRN, some of the top challenges that managed service providers (MSPs) faced in 2022 included labor shortages, managing resources, unstable economies and supply chain attacks. While all of these are valid, through my time connecting with both small and large MSPs, I&#8217;ve discovered that a common and major underlying threat to MSP businesses is the retention of customers.<\/p>\n<p>A major worry for MSPs is a conceivable, catastrophic and &#8220;unrecoverable&#8221; security event that can lead to customers going out of business or changing their managed service provider. The ever-changing threat landscape is leading to more concerns about this type of catastrophic event.<\/p>\n<p>Check Point&#8217;s latest research report states that the frequency of cyberattacks increased by 38% in 2022, and that number is growing, with the global volume of cyberattacks reaching an all-time high in Q4 of 2022. The statistics are bloodcurdling, and because many businesses rely on MSPs for their security solutions, the rising number of cyberattacks presents a true probability for cybersecurity gaps in MSP offerings.<\/p>\n<p><fbs-ad position=\"inread\" progressive=\"\" ad-id=\"article-0-inread\" aria-hidden=\"true\" role=\"presentation\"><\/fbs-ad><\/p>\n<p>A successful cybersecurity practice should achieve three primary goals: Protect the data and systems of the customers, ensure compliance with regulations met by location and build a higher level of trust with the customer. Following best-fit cybersecurity practices is a great reputation builder and can help create a competitive advantage if done right\u2014then again, it can be an exterminator of business reputation if implemented poorly.<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">The Cybersecurity Strategy<\/h2>\n<p>The first and most critical step is to define a cybersecurity strategy and implement a regular review cadence; the strategy may have to evolve with the market, customer needs and, of course, threat landscape.<\/p>\n<p>A sound strategy should include:<\/p>\n<p><strong>\u2022 A cybersecurity framework.<\/strong> To do this, simplify documentation and management, choose a framework like NIST and use it as guidance to define the standard used to approach cybersecurity.<\/p>\n<p><strong>\u2022 Follow asset management and risk assessment. <\/strong>All types of data, applications and systems should be identified. It is especially important to identify the unique risks based on the customers served by the MSP. For example, some business systems can be exposed to public networks for collaboration with third parties, opening the opportunity for supply chain attacks.<\/p>\n<p><strong>\u2022 Updated security controls.<\/strong> Technology requirements should be defined based on the types of risks and procedures for deployment and management developed. For example, what kind of firewalls, antivirus software, EDR and intrusion detection systems will be used, and how will these tools be integrated?<\/p>\n<p><strong>\u2022 Meet compliance. <\/strong>Depending on the type of customers, you should define the required certifications and implement procedures for compliance. For example, the payment card industry data security standard (PCI DSS) should likely be utilized for businesses dealing with payment card information, or HIPAA adhered to for healthcare providers.<\/p>\n<p><strong>\u2022 Implement monitoring.<\/strong> Real-time network and device activity monitoring is necessary to detect threats and prevent or mitigate intrusion.<\/p>\n<p><strong>\u2022 Apply user training. <\/strong>I find that many MSPs neglect the importance of security training for end customers. Sending a link to a video is rarely a good way to train end customers. Higher efficiency of security requires regular exercise, including on-site training and retraining of employees.<\/p>\n<p><strong>\u2022 Deploy an audit plan. <\/strong>Your strategy should include timelines and checklists for the audit. As the infrastructure evolves and becomes more complicated, an audit allows you to discover new gaps in the security posture and close them.<\/p>\n<p><strong>\u2022 Adopt an incident response plan.<\/strong> It is critical to train the whole team on what to do if faced with an incident. Fast and coordinated response processes help prevent catastrophic consequences for the end customers.<\/p>\n<p><strong>\u2022 Consider cyber insurance. <\/strong>Finally, if everything fails, cyber insurance can provide reasonable coverage to minimize the financial impact on the customer.<\/p>\n<h2 class=\"subhead-embed color-accent bg-base font-accent font-size text-align\">Implementing The Practice<\/h2>\n<p>After the cybersecurity strategy is defined, it is time to ensure it is implemented through the following steps.<\/p>\n<p><strong>\u2022 Identify the resources.<\/strong> Document human and technology resources available as well as the gap in what is needed to implement the cybersecurity strategy; execute a plan to allocate the necessary resources. This may include hiring new people, shifting existing team members&#8217; responsibilities, additional team training or partnering with third parties.<\/p>\n<p><strong>\u2022 Train your team. <\/strong>Knowledge in cybersecurity expires fast, and a continuous training process is mandatory for the team to effectively provide high-quality service to customers. Training is often neglected after the initial training, yet it must be continuous.<\/p>\n<p><strong>\u2022 Communicate your cybersecurity practices to the customers.<\/strong> This is a great time to get your customers on board with cybersecurity policies and build trust in them that your business, as an MSP, has their security needs covered. It is essential to implement regular updates for customers and remind them about the need for recurrent security training for their employees.<\/p>\n<p><strong>\u2022 Implement the technology and processes.<\/strong> Deploy the tools and start the execution of your cybersecurity strategy. Defining regular tests and updating the cadence for security measures is critical. Regular exercises on incident response help keep a high level of confidence in both your tools and team to ultimately confirm that the process will work in case of an event.<\/p>\n<p>Overall, the key elements of a successful cybersecurity practice are regular reviews, updated tools and policies and continuous training of technicians and end customers. A successful practice is never static; it is dynamic and constantly evolving.<\/p>\n<p>Due to the ever-increasing complexity of IT infrastructure and the evolving cyber threat landscape, I believe it\u2019s important to implement proactive security measures. MSPs should establish a robust cybersecurity practice to defend their customer\u2019s valuable assets and their reputation.<\/p>\n<p>Forbes Business Council is the foremost growth and networking organization for business owners and leaders. <em data-ga-track=\"InternalLink:https:\/\/councils.forbes.com\/qualify?utm_source=forbes.com&amp;utm_medium=referral&amp;utm_campaign=forbes-links&amp;utm_term=fbc&amp;utm_content=in-article-ad-links\">Do I qualify?<\/em><\/p>\n<\/div>\n<p>Read the full article <a href=\"https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2023\/08\/22\/crafting-a-winning-cybersecurity-practice-for-your-msp\/\" target=\"_blank\" rel=\"noopener\">here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gaidar Magdanurov is the Chief Success Officer at Acronis. According to CRN, some of the top challenges that managed service providers (MSPs) faced in 2022 included labor shortages, managing resources, unstable economies and supply chain attacks. While all of these are valid, through my time connecting with both small and large MSPs, I&#8217;ve discovered that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":10603,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[77],"tags":[],"class_list":{"0":"post-10602","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-startups"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Crafting A Winning Cybersecurity Practice For Your MSP | Brandiary<\/title>\n<meta name=\"description\" content=\"Gaidar Magdanurov is the Chief Success Officer at Acronis. According to CRN, some of the top challenges that managed service providers (MSPs) faced in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mysourcefunding.com\/?p=10602\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crafting A Winning Cybersecurity Practice For Your MSP | Brandiary\" \/>\n<meta property=\"og:description\" content=\"Gaidar Magdanurov is the Chief Success Officer at Acronis. According to CRN, some of the top challenges that managed service providers (MSPs) faced in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mysourcefunding.com\/?p=10602\" \/>\n<meta property=\"og:site_name\" content=\"Brandiary\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-22T21:46:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-22T21:46:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/08\/1692740764_0x0.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"News Room\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"News Room\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=10602#article\",\"isPartOf\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=10602\"},\"author\":{\"name\":\"News Room\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4\"},\"headline\":\"Crafting A Winning Cybersecurity Practice For Your MSP\",\"datePublished\":\"2023-08-22T21:46:04+00:00\",\"dateModified\":\"2023-08-22T21:46:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=10602\"},\"wordCount\":951,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/mysourcefunding.com\/#organization\"},\"articleSection\":[\"Startups\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/mysourcefunding.com\/?p=10602#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=10602\",\"url\":\"https:\/\/mysourcefunding.com\/?p=10602\",\"name\":\"Crafting A Winning Cybersecurity Practice For Your MSP | Brandiary\",\"isPartOf\":{\"@id\":\"https:\/\/mysourcefunding.com\/#website\"},\"datePublished\":\"2023-08-22T21:46:04+00:00\",\"dateModified\":\"2023-08-22T21:46:05+00:00\",\"description\":\"Gaidar Magdanurov is the Chief Success Officer at Acronis. According to CRN, some of the top challenges that managed service providers (MSPs) faced in\",\"breadcrumb\":{\"@id\":\"https:\/\/mysourcefunding.com\/?p=10602#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mysourcefunding.com\/?p=10602\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mysourcefunding.com\/?p=10602#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mysourcefunding.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crafting A Winning Cybersecurity Practice For Your MSP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mysourcefunding.com\/#website\",\"url\":\"https:\/\/mysourcefunding.com\/\",\"name\":\"Brandiary\",\"description\":\"Latest Business and Startup News and Updates\",\"publisher\":{\"@id\":\"https:\/\/mysourcefunding.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mysourcefunding.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mysourcefunding.com\/#organization\",\"name\":\"Brandiary\",\"url\":\"https:\/\/mysourcefunding.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png\",\"contentUrl\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png\",\"width\":381,\"height\":100,\"caption\":\"Brandiary\"},\"image\":{\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4\",\"name\":\"News Room\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/mysourcefunding.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png\",\"contentUrl\":\"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png\",\"caption\":\"News Room\"},\"sameAs\":[\"https:\/\/mysourcefunding.com\"],\"url\":\"https:\/\/mysourcefunding.com\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crafting A Winning Cybersecurity Practice For Your MSP | Brandiary","description":"Gaidar Magdanurov is the Chief Success Officer at Acronis. According to CRN, some of the top challenges that managed service providers (MSPs) faced in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mysourcefunding.com\/?p=10602","og_locale":"en_US","og_type":"article","og_title":"Crafting A Winning Cybersecurity Practice For Your MSP | Brandiary","og_description":"Gaidar Magdanurov is the Chief Success Officer at Acronis. According to CRN, some of the top challenges that managed service providers (MSPs) faced in","og_url":"https:\/\/mysourcefunding.com\/?p=10602","og_site_name":"Brandiary","article_published_time":"2023-08-22T21:46:04+00:00","article_modified_time":"2023-08-22T21:46:05+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/08\/1692740764_0x0.jpg","type":"image\/jpeg"}],"author":"News Room","twitter_card":"summary_large_image","twitter_misc":{"Written by":"News Room","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mysourcefunding.com\/?p=10602#article","isPartOf":{"@id":"https:\/\/mysourcefunding.com\/?p=10602"},"author":{"name":"News Room","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4"},"headline":"Crafting A Winning Cybersecurity Practice For Your MSP","datePublished":"2023-08-22T21:46:04+00:00","dateModified":"2023-08-22T21:46:05+00:00","mainEntityOfPage":{"@id":"https:\/\/mysourcefunding.com\/?p=10602"},"wordCount":951,"commentCount":0,"publisher":{"@id":"https:\/\/mysourcefunding.com\/#organization"},"articleSection":["Startups"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mysourcefunding.com\/?p=10602#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mysourcefunding.com\/?p=10602","url":"https:\/\/mysourcefunding.com\/?p=10602","name":"Crafting A Winning Cybersecurity Practice For Your MSP | Brandiary","isPartOf":{"@id":"https:\/\/mysourcefunding.com\/#website"},"datePublished":"2023-08-22T21:46:04+00:00","dateModified":"2023-08-22T21:46:05+00:00","description":"Gaidar Magdanurov is the Chief Success Officer at Acronis. According to CRN, some of the top challenges that managed service providers (MSPs) faced in","breadcrumb":{"@id":"https:\/\/mysourcefunding.com\/?p=10602#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mysourcefunding.com\/?p=10602"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mysourcefunding.com\/?p=10602#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mysourcefunding.com\/"},{"@type":"ListItem","position":2,"name":"Crafting A Winning Cybersecurity Practice For Your MSP"}]},{"@type":"WebSite","@id":"https:\/\/mysourcefunding.com\/#website","url":"https:\/\/mysourcefunding.com\/","name":"Brandiary","description":"Latest Business and Startup News and Updates","publisher":{"@id":"https:\/\/mysourcefunding.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mysourcefunding.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mysourcefunding.com\/#organization","name":"Brandiary","url":"https:\/\/mysourcefunding.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/","url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png","contentUrl":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/b-logo-1.png","width":381,"height":100,"caption":"Brandiary"},"image":{"@id":"https:\/\/mysourcefunding.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/5062dafb0f932b59aa228f1a047332f4","name":"News Room","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mysourcefunding.com\/#\/schema\/person\/image\/","url":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png","contentUrl":"https:\/\/mysourcefunding.com\/wp-content\/uploads\/2023\/06\/avatar_user_1_1688031660-96x96.png","caption":"News Room"},"sameAs":["https:\/\/mysourcefunding.com"],"url":"https:\/\/mysourcefunding.com\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/10602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10602"}],"version-history":[{"count":1,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/10602\/revisions"}],"predecessor-version":[{"id":10604,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/posts\/10602\/revisions\/10604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=\/wp\/v2\/media\/10603"}],"wp:attachment":[{"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=10602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mysourcefunding.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=10602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}