MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

Incorporating Cybersecurity: How to Practice What You Preach

Posted October 12, 2017by Chris Johnson

Incorporating Cybersecurity: How to Practice What You Preach

I have spent the better part of 20 years in the IT Support and IT Management business, and I have come to the conclusion that we are collectively terrible at “eating our own dog food,” as the saying goes. What we do for our clients should be a reflection of what we do in our own environments, but many IT service providers fall short in this regard.

As we make the transition from offering traditional managed services to incorporating security services into our stack, we’re taking on much more responsibility. Clients are now trusting us to provide them with the technology that can keep them protected, but how can they fully do so when we’re not also adopting this within our own business? Use the following tips to get started on practicing what you preach so your clients can enjoy better service delivery and increased satisfaction.

Why Should I Practice What I Preach?

Now, you might be asking yourself, “why is it so critical for me to adopt my security services internally?” First and foremost, it allows you to show your clients how serious you are about their security. “Security” shouldn’t be a blanket term, so when you’ve gone to great lengths to secure your internal environment, it proves that you believe in your own offering. The second reason is that you can provide proof that your security services work and can be applied to your clients’ environments as well. You shouldn't be selling something that you aren't comfortable using yourself. If actions speak louder than words, then this should ring loud and true as you begin showing your prospective clients the evidence of your own secure environment.

What Am I Doing Wrong?

Many IT service providers claim to provide security, yet few truly practice it in-house. We’ve all done this at some point, or are still doing it in at least one category or another of our managed services. However, there are two categories where I see this happen a lot:

1. Firewalls

My favorite example of this is firewalls. You offer it as a service and you have one or two vendor products in your stack to choose from, but internally you use neither or the cast-off from a client needing to upgrade.

2. Remote Monitoring and Management (RMM)

The second most common example is RMM. You install the agent on all of your client endpoints, but internally you don’t deploy it at all. While I realize that this is client-facing and not everything we offer our clients necessarily makes sense to adopt internally, when it comes to security, the foundational pieces that we offer our clients should be reflective of what we are doing internally. If we are their outsourced IT department, then we must ask ourselves, “who is our internal IT department?” If you aren’t planning to hire a third-party to do your IT, you should assign someone in your organization to be responsible for implementing and maintaining it.

How Can I Fix This?

Now, let’s talk a bit about the core security stack offerings that an IT provider should offer their clients AND adopt internally. There are three major areas that I think will make up your foundational security offering.

1. Servers, Workstations and Laptops

You can offer a bundled package to secure these devices that should include the following: antivirus, anti-malware, OS patching, third-party application patching, and email security. Then, there are some less tangible items that should be included, such as OS hardening, access control (no local admin rights), physical access control, and more.

2. Network Devices

Network devices can include items like firewalls, switches, routers, access points, etc. These will likely be some sort of bundled package where you include the patching and maintenance of the firmware and configurations. You can take this one step further by also monitoring and maintaining these devices, as well as offering or including this in a unified threat management offering

3. IT Governance

This can get more complicated to define as the first two, but it is still extremely important. The policy creation and the procedures and execution within a client’s IT environment can get tricky because it requires working with the client. What the policies look like and how they are defined is critical when it comes time to change password polices or restrict user access from specific directories.

Want to learn more about how to develop a scalable security package? Register for our upcoming webinar below!
New call-to-action

Chris Johnson is a Cybersecurity Compliance Strategist at onShore Security, where he is responsible for leading the Cybersecurity Leadership Initiative. As a former MSP, Chris specialized in helping SMBs make strategic IT decisions that improve their cybersecurity posture by lowering their risk and exposure in an ever-evolving threat landscape. Today, Chris is the Ex-Officio chairperson of the CompTIA Security Community and an active CompTIA Ambassador. In these roles, his work focuses on guiding MSPs with his vast knowledge, insight, and expertise as they make their transition to MSSP.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus