Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
There’s a big misconception about cybersecurity. Clients think that once they’ve hired a technology solution provider (TSP) to manage their security, they’re completely protected and no longer at risk. However, the biggest risk to an organization’s information security is the inaction of employees.
What this means is that human error is a major point of weakness. Reports have shown that as much as 90% of cyberattacks are caused by human behavior. That being said, all businesses must employ some sort of cybersecurity training for team members to understand their responsibilities, learn how to protect sensitive information, and recognize signs of malicious threats.
As a TSP hired to protect your clients, you’ll likely be tasked with providing that security education, training, and guidance on policies to be created. Keep reading to learn which essential elements to cover during security awareness training.
Any robust security awareness training program should cover:
Let’s explore the best ways to educate your clients and end users on these topics.
Social engineering is an attack that happens when a user or administrator is deceived into divulging information. Phishing, which is an attempt to get sensitive information like passwords and credit cards from someone through email or chat, is a common social engineering attack.
Why are phishing and other social engineering attacks so successful? Because they appear to come from a credible source, deceiving the end user into thinking it’s a piece of communication they can trust. Tell-tale signs of a phishing attempt include typos, links containing a string of random numbers and letters, an odd sense of urgency, or just generally something feeling off about the information being requested.
Tip: Watch for these seven red flags!
What should clients do if they’ve been involved in a phishing attack?
Cybersecurity training is a good time to go over different aspects of the network, such as access privileges, passwords, and the network connection itself.
Your clients should know who general users are versus privileged users who have more elevated rights. In general, privileged access is granted to users who need to perform administrative-level functions or access sensitive data. All your client’s employees should know what type of user they are so that they understand what information, applications, or functions are accessible to them.
Similarly, employees should be using best practices when it comes to passwords they’re creating, especially for passwords used to access IT environments. In general, passwords should be unique to each app/site, at least eight characters, contain letters and special characters, and stay away from obvious information like names and birthdays. It’s also a good idea to change and/or update passwords about every six months. A password manager—like 1Password—can help with all of this.
This may be less obvious to employees, but they should be wary of network connections used outside of their home or work. Even if data on their device is encrypted, it’s not necessary that a connected network transfers that data in an encrypted format, which opens the door to many different vulnerabilities. Plus, public networks may be tapped, which puts all data exchanged on that network at risk. Encourage end users to only use trusted network connections or secure the connection with appropriate VPN settings.
We’re living in a time where it’s popular to Bring Your Own Device (BYOD), meaning more and more mobile or personal devices are entering the workplace, connecting to the corporate network, and accessing company data. This creates more entry points for threats to happen, so all mobile devices must also be securely connected to the corporate network and always in the employee’s possession.
The same threats posed to company desktops and laptops also apply to personal mobile devices. Tablets and smartphones may be even less secure because they don’t have pre-installed endpoint protection. Users should always be mindful of websites they’re browsing, apps they’re installing, and links they’re clicking on.
Cyberthreats aren’t the only risks employees need to be mindful of. Physical security also plays a role in keeping sensitive information protected. How often and easily do you mistakenly leave a mobile device or computer unattended? It happens to all of us. But, if someone were to swipe an employee’s unattended phone or log in to their computer, all of their data would immediately be at risk.
Here’s how your clients can increase their physical security in and out of the office:
Need more cybersecurity support? We’ve got you covered. Register for a IT Nation Certify training, check out IT Nation Secure, or learn more about ConnectWise Fortify®.