Should you have a Managed ‘Security’ Service Provider?

>>Should you have a Managed ‘Security’ Service Provider?

Should you have a Managed ‘Security’ Service Provider?

Managed Services Providers should be inching their way into more focused security consulting for their clients, but unless you are a high value target for hackers; a full blown MSSP is probably not necessary and implementing the following list of best practices will help you sleep better at night.

  1. Upgrade to the latest endpoint protection platform offering, with file less malware detection, memory injection protection, machine learning, and other features
  2. Remove administrative rights from Windows users where possible
  3. Implement a strict Onboarding and Off board process for users
  4. Perform regular patch management; automated would be ideal like using SolarwindsRMM
  5. Implement network segmentation for critical systems, general employee resources v. guest access.
  6. Implement robust anti-spam technical controls, like Securence for email filtering.
  7. Use some form of SIEM/log monitoring solution (basic detection and response), this would be for medium valued targets handling large amounts of personal data.
  8. Use backup and restore for ransomware protection – SolarwindsBackup
  9. Conduct basic security awareness training at least quarterly on latest threats
  10. Consider some basic phishing emails to test, educate and raise awareness among users. There is good chance this will happen in the course of doing business, but a little more effort in this category can really assist in avoiding real phishing scams.

Please do be aware of industry required regulations for your specific business and as we move into the future; most small businesses will begin to see more attacks as the larger ones shore up their defenses, making them not worth a hackers time to hack.

2018-07-19T08:21:05+00:00