Look at an MSP’s website and you’re likely to see the term “trusted provider” used in their marketing.
The million-dollar question that most consumers fail to ask is: “Do they actually deserve my trust?”

Supply Chain Attacks are Putting Every MSP at Risk…And Their Clients Are Being Dragged Down With Them

A supply chain attack, also called a value-chain or third-party attack, occurs when a hacker infiltrates a system through an outside partner or provider with access. Such attacks have dramatically changed the attack surface of the typical enterprise in the past few years. With more vendors and service providers appearing every week, there are more entities touching sensitive data than ever before.

Each one of these vendors and service providers is a potential threat vector. As an MSP, you are a potential threat vector. You’ve probably known this for some time, but if you weren’t aware, the steady stream of supply chain attacks showing up in the news has probably brought you up to speed.

Long story short, hackers have realized that managed services providers offer a nice, paved road to multiple high-value targets. MSPs are human-run organizations, they make mistakes like any other business, and they also have a bottom line to consider. In the same way your prospects balk at the thought of spending money on invisible cyberthreats, MSPs often try to cut costs by using bare-minimal security solutions. (Worse yet, many MSPs fail to protect their own infrastructure entirely.)

Don’t be one of those MSPs. As service providers, it is our responsibility to close the security gap and minimize the risk of a supply chain attack taking out one or more of our clients. We bear that responsibility for our MSP partners, and in turn, MSPs bear that responsibility for the medical practices, financial centers, government offices, schools, and other businesses that put their trust in them.

The Most Recent Ransomware Attack Carried Out Through a “Secure” Provider…

This latest in a string of massive ransomware incidents is following the current trend: hackers compromising a software or service provider and using its products to infect their client’s systems. The software providers involved in this huge breach are The Digital Dental Record and PerCSoft, two Wisconsin-based companies behind DDS Safe, a medical records retention and backup solution used by many dental practice offices in the US. Yet another example of a successful supply chain attack, this time crippling computer systems in over 400 dental practice offices around the United States. 

The latest reports tell us that The Digital Dental Record and PerCSoft paid the ransom and have begun distributing the decryptor to their clients. We’ve also been told that the decryptor is not working for every client.

This is turning out to be a very costly security breach for DDS Safe.

There is only one sure way to avoid becoming part of a supply chain attack: 24/7 cybersecurity monitoring. There’s simply no other way to ensure that hackers aren’t exploiting a weakness in your infrastructure to reach your clients. It’s critical to monitor gateway firewalls and all of your customers’ active directories for malicious traffic. Without tools like SIEM and 24/7 monitoring, attacks go unnoticed.

If your MSP doesn’t have the resources to run a SIEM or lacks the upfront capital to build and staff a 24/7 SOC, give Vijilan a try. We have the SIEM infrastructure and 24/7 SOC that is built exclusively for MSPs like yours.

You want to be a trusted provider that’s really trustworthy? Monitor your internal network and data as well as those of your clients.

As we say around the Vijilan office: Monitor everything!

Categories: MSP Cybersecurity