FBI Says MSPs Are A Target
It wasn't just the FBI on its own.
In a joint effort with cyber authorities in the UK and Australia, the FBI, Center for Infrastructure Security Agency (CISA) and NSA put out an advisory on ransomware.
Ransomware tactics and techniques continued to evolve in 2021, which demonstrates ransomware threat actors’ growing technological sophistication and an increased ransomware threat to organizations globally.
These government bodies point to the increased volume and severity of ransomware attacks in 2021, including successful hits on 14 of the 16 US critical infrastructure sectors.
So what does this mean for MSPs?
It means you have an opportunity to set your MSP apart from the pack.
You already know the threats are real. In fact, you're already taking steps to protect your own environment and those of your clients.
Cybersecurity authorities in the US, Australia, and the UK assess there will be an increase in ransomware incidents where threat actors target MSPs to reach their clients.
To set yourself apart, you can point to this exact framework and use it to demonstrate your own security practices first.
Then, implement these same strategies with your clients. It's so much easier when you're "eating your own dog food", right??
Let's take a look at what these cyber authorities call out for ransomware mitigation:
- Patch and Update - the reports calls this is one of the most “efficient and cost-effective” steps. But we all know this is much easier said than done. Still, it’s wildly important and a non-negotiable.
- Secure Any RDP Access - don’t use it unless you absolutely have to. Ideally, use more secure frameworks whenever possible and require MFA for any access. The report digs into this much further, and is worth a read.
- Implement Security Awareness Training - teach your team how to avoid dangerous websites, malicious links and infected attachments. Use simulated phishing tests to reinforce positive behaviors (and remove bad ones!).
- Require MFA Anywhere Possible - especially on any accounts that access or manage critical systems or data.
- Require Strong Passwords - a password manager is an excellent solution here. With password re-use so common, this is a relatively simple step to make large security gains.
- Use Linux Security Modules - obviously, this only applies if you’re using Linux. And if you’re using Linux, you’re probably already familiar here with things like SELinux, AppArmor, or SecComp.
- Multiple Backups - back that stuff up! Be sure to hold backups in multiple locations, digitally and physically.
These are all excellent steps in security. They also are all areas where MSPs have access to excellent tools for internal and client use.
And if you want to learn more about the channel's best Security Awareness Training provider, we'll make that nice and easy....
If you're an MSP and want to learn more, go check out how we work with Partners here. If you like what you see, book a time to chat!