ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    MSPs the New Hacker Target?

    IT Discussion
    msp security
    8
    30
    1.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @dafyre
      last edited by

      @dafyre said in MSPs the New Hacker Target?:

      @Dashrender said in MSPs the New Hacker Target?:

      @dafyre said in MSPs the New Hacker Target?:

      @scottalanmiller said in MSPs the New Hacker Target?:

      User individual user credentials whenever possible, not shared credentials.

      It is so tempting, especially because customers often push for this, to has common credentials for tasks. But this means that leaking creds is easy and maintaining them is hard. Not to mention problems tracking their use. Have users log in as themselves, track them, make them maintain their own creds. Keep creds individualized whenever possible.

      Both at the MSP and your clients. Each MSP Agent should have an account at the client, with maybe an emergency "if all else fails" shared account.

      I'd like to think the client could maintain the emergency account - but I could see some companies where the MSP is the ENTIRE IT department, so there would be no one at the company, save maybe the owner/CEO who could have this - but would likely lose it, etc.

      That's actually not a bad idea for the clients that can maintain one.

      It's pretty common to do so. Problem is, the MSP also needs confidence that the account is not used without them knowing.

      coliverC 1 Reply Last reply Reply Quote 1
      • coliverC
        coliver @scottalanmiller
        last edited by

        @scottalanmiller said in MSPs the New Hacker Target?:

        @dafyre said in MSPs the New Hacker Target?:

        @Dashrender said in MSPs the New Hacker Target?:

        @dafyre said in MSPs the New Hacker Target?:

        @scottalanmiller said in MSPs the New Hacker Target?:

        User individual user credentials whenever possible, not shared credentials.

        It is so tempting, especially because customers often push for this, to has common credentials for tasks. But this means that leaking creds is easy and maintaining them is hard. Not to mention problems tracking their use. Have users log in as themselves, track them, make them maintain their own creds. Keep creds individualized whenever possible.

        Both at the MSP and your clients. Each MSP Agent should have an account at the client, with maybe an emergency "if all else fails" shared account.

        I'd like to think the client could maintain the emergency account - but I could see some companies where the MSP is the ENTIRE IT department, so there would be no one at the company, save maybe the owner/CEO who could have this - but would likely lose it, etc.

        That's actually not a bad idea for the clients that can maintain one.

        It's pretty common to do so. Problem is, the MSP also needs confidence that the account is not used without them knowing.

        Need a break glass account.

        scottalanmillerS 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @coliver
          last edited by

          @coliver said in MSPs the New Hacker Target?:

          @scottalanmiller said in MSPs the New Hacker Target?:

          @dafyre said in MSPs the New Hacker Target?:

          @Dashrender said in MSPs the New Hacker Target?:

          @dafyre said in MSPs the New Hacker Target?:

          @scottalanmiller said in MSPs the New Hacker Target?:

          User individual user credentials whenever possible, not shared credentials.

          It is so tempting, especially because customers often push for this, to has common credentials for tasks. But this means that leaking creds is easy and maintaining them is hard. Not to mention problems tracking their use. Have users log in as themselves, track them, make them maintain their own creds. Keep creds individualized whenever possible.

          Both at the MSP and your clients. Each MSP Agent should have an account at the client, with maybe an emergency "if all else fails" shared account.

          I'd like to think the client could maintain the emergency account - but I could see some companies where the MSP is the ENTIRE IT department, so there would be no one at the company, save maybe the owner/CEO who could have this - but would likely lose it, etc.

          That's actually not a bad idea for the clients that can maintain one.

          It's pretty common to do so. Problem is, the MSP also needs confidence that the account is not used without them knowing.

          Need a break glass account.

          That's what we are discussing, I thought, lol.

          dafyreD 1 Reply Last reply Reply Quote 0
          • dafyreD
            dafyre @scottalanmiller
            last edited by

            @scottalanmiller said in MSPs the New Hacker Target?:

            @coliver said in MSPs the New Hacker Target?:

            @scottalanmiller said in MSPs the New Hacker Target?:

            @dafyre said in MSPs the New Hacker Target?:

            @Dashrender said in MSPs the New Hacker Target?:

            @dafyre said in MSPs the New Hacker Target?:

            @scottalanmiller said in MSPs the New Hacker Target?:

            User individual user credentials whenever possible, not shared credentials.

            It is so tempting, especially because customers often push for this, to has common credentials for tasks. But this means that leaking creds is easy and maintaining them is hard. Not to mention problems tracking their use. Have users log in as themselves, track them, make them maintain their own creds. Keep creds individualized whenever possible.

            Both at the MSP and your clients. Each MSP Agent should have an account at the client, with maybe an emergency "if all else fails" shared account.

            I'd like to think the client could maintain the emergency account - but I could see some companies where the MSP is the ENTIRE IT department, so there would be no one at the company, save maybe the owner/CEO who could have this - but would likely lose it, etc.

            That's actually not a bad idea for the clients that can maintain one.

            It's pretty common to do so. Problem is, the MSP also needs confidence that the account is not used without them knowing.

            Need a break glass account.

            That's what we are discussing, I thought, lol.

            He means literally an envelope with a username & password sealed inside protected by a glass case?

            coliverC scottalanmillerS 2 Replies Last reply Reply Quote 0
            • coliverC
              coliver @dafyre
              last edited by

              @dafyre said in MSPs the New Hacker Target?:

              @scottalanmiller said in MSPs the New Hacker Target?:

              @coliver said in MSPs the New Hacker Target?:

              @scottalanmiller said in MSPs the New Hacker Target?:

              @dafyre said in MSPs the New Hacker Target?:

              @Dashrender said in MSPs the New Hacker Target?:

              @dafyre said in MSPs the New Hacker Target?:

              @scottalanmiller said in MSPs the New Hacker Target?:

              User individual user credentials whenever possible, not shared credentials.

              It is so tempting, especially because customers often push for this, to has common credentials for tasks. But this means that leaking creds is easy and maintaining them is hard. Not to mention problems tracking their use. Have users log in as themselves, track them, make them maintain their own creds. Keep creds individualized whenever possible.

              Both at the MSP and your clients. Each MSP Agent should have an account at the client, with maybe an emergency "if all else fails" shared account.

              I'd like to think the client could maintain the emergency account - but I could see some companies where the MSP is the ENTIRE IT department, so there would be no one at the company, save maybe the owner/CEO who could have this - but would likely lose it, etc.

              That's actually not a bad idea for the clients that can maintain one.

              It's pretty common to do so. Problem is, the MSP also needs confidence that the account is not used without them knowing.

              Need a break glass account.

              That's what we are discussing, I thought, lol.

              He means literally an envelope with a username & password sealed inside protected by a glass case?

              I mean not literally... but pretty close. Offline user credentials that are stored in a safe location sealed away to ensure the business doesn't have access to them until a time comes where the need to break the seal.

              1 Reply Last reply Reply Quote 1
              • scottalanmillerS
                scottalanmiller @dafyre
                last edited by

                @dafyre said in MSPs the New Hacker Target?:

                @scottalanmiller said in MSPs the New Hacker Target?:

                @coliver said in MSPs the New Hacker Target?:

                @scottalanmiller said in MSPs the New Hacker Target?:

                @dafyre said in MSPs the New Hacker Target?:

                @Dashrender said in MSPs the New Hacker Target?:

                @dafyre said in MSPs the New Hacker Target?:

                @scottalanmiller said in MSPs the New Hacker Target?:

                User individual user credentials whenever possible, not shared credentials.

                It is so tempting, especially because customers often push for this, to has common credentials for tasks. But this means that leaking creds is easy and maintaining them is hard. Not to mention problems tracking their use. Have users log in as themselves, track them, make them maintain their own creds. Keep creds individualized whenever possible.

                Both at the MSP and your clients. Each MSP Agent should have an account at the client, with maybe an emergency "if all else fails" shared account.

                I'd like to think the client could maintain the emergency account - but I could see some companies where the MSP is the ENTIRE IT department, so there would be no one at the company, save maybe the owner/CEO who could have this - but would likely lose it, etc.

                That's actually not a bad idea for the clients that can maintain one.

                It's pretty common to do so. Problem is, the MSP also needs confidence that the account is not used without them knowing.

                Need a break glass account.

                That's what we are discussing, I thought, lol.

                He means literally an envelope with a username & password sealed inside protected by a glass case?

                Can be, but a sealed envelope is enough. Something that has to be "broken and reset" after use.

                1 Reply Last reply Reply Quote 1
                • bbigfordB
                  bbigford
                  last edited by

                  One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                  I also witnessed many MSPs not securing their secure password databases with MFA. They secured the front end client application in case a computer was compromised or stolen, but the database itself was wide open.

                  scottalanmillerS 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller @bbigford
                    last edited by

                    @bbigford said in MSPs the New Hacker Target?:

                    One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                    I get the value of MFA. But how would each customer get compromised if the MSP was compromised in an Office 365 context?

                    DashrenderD 1 Reply Last reply Reply Quote 0
                    • DashrenderD
                      Dashrender @scottalanmiller
                      last edited by

                      @scottalanmiller said in MSPs the New Hacker Target?:

                      @bbigford said in MSPs the New Hacker Target?:

                      One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                      I get the value of MFA. But how would each customer get compromised if the MSP was compromised in an Office 365 context?

                      wouldn't the hacker then have access to all of the customer accounts via the MSP's O365 delegate account?

                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller @Dashrender
                        last edited by

                        @Dashrender said in MSPs the New Hacker Target?:

                        @scottalanmiller said in MSPs the New Hacker Target?:

                        @bbigford said in MSPs the New Hacker Target?:

                        One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                        I get the value of MFA. But how would each customer get compromised if the MSP was compromised in an Office 365 context?

                        wouldn't the hacker then have access to all of the customer accounts via the MSP's O365 delegate account?

                        That's assuming you are using a shared account that can access all customers, rather than a discrete account per customer.

                        DashrenderD 1 Reply Last reply Reply Quote 0
                        • DashrenderD
                          Dashrender @scottalanmiller
                          last edited by

                          @scottalanmiller said in MSPs the New Hacker Target?:

                          @Dashrender said in MSPs the New Hacker Target?:

                          @scottalanmiller said in MSPs the New Hacker Target?:

                          @bbigford said in MSPs the New Hacker Target?:

                          One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                          I get the value of MFA. But how would each customer get compromised if the MSP was compromised in an Office 365 context?

                          wouldn't the hacker then have access to all of the customer accounts via the MSP's O365 delegate account?

                          That's assuming you are using a shared account that can access all customers, rather than a discrete account per customer.

                          Of course.

                          So what does NTG do?

                          scottalanmillerS 1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller @Dashrender
                            last edited by

                            @Dashrender said in MSPs the New Hacker Target?:

                            @scottalanmiller said in MSPs the New Hacker Target?:

                            @Dashrender said in MSPs the New Hacker Target?:

                            @scottalanmiller said in MSPs the New Hacker Target?:

                            @bbigford said in MSPs the New Hacker Target?:

                            One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                            I get the value of MFA. But how would each customer get compromised if the MSP was compromised in an Office 365 context?

                            wouldn't the hacker then have access to all of the customer accounts via the MSP's O365 delegate account?

                            That's assuming you are using a shared account that can access all customers, rather than a discrete account per customer.

                            Of course.

                            So what does NTG do?

                            Individual accounts per customer. We aren't a reseller, so there isn't any natural connection between customers already.

                            DashrenderD 1 Reply Last reply Reply Quote 0
                            • DashrenderD
                              Dashrender @scottalanmiller
                              last edited by

                              @scottalanmiller said in MSPs the New Hacker Target?:

                              @Dashrender said in MSPs the New Hacker Target?:

                              @scottalanmiller said in MSPs the New Hacker Target?:

                              @Dashrender said in MSPs the New Hacker Target?:

                              @scottalanmiller said in MSPs the New Hacker Target?:

                              @bbigford said in MSPs the New Hacker Target?:

                              One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                              I get the value of MFA. But how would each customer get compromised if the MSP was compromised in an Office 365 context?

                              wouldn't the hacker then have access to all of the customer accounts via the MSP's O365 delegate account?

                              That's assuming you are using a shared account that can access all customers, rather than a discrete account per customer.

                              Of course.

                              So what does NTG do?

                              Individual accounts per customer. We aren't a reseller, so there isn't any natural connection between customers already.

                              What does a natural connection between customers have to do with anything?

                              a single vendor account with MS which then grants you access to ALL of your customers accounts, prevents you from needing to log in dozens of times a day - from having to maintain all those separate accounts, etc.

                              of course, it opens you up to the above stated issues.

                              scottalanmillerS 2 Replies Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @Dashrender
                                last edited by

                                @Dashrender said in MSPs the New Hacker Target?:

                                @scottalanmiller said in MSPs the New Hacker Target?:

                                @Dashrender said in MSPs the New Hacker Target?:

                                @scottalanmiller said in MSPs the New Hacker Target?:

                                @Dashrender said in MSPs the New Hacker Target?:

                                @scottalanmiller said in MSPs the New Hacker Target?:

                                @bbigford said in MSPs the New Hacker Target?:

                                One thing I am shocked many MSPs don't do, which we've done since the first deployment, is secure each Office 365 CSP account (delegated access to each customer through one provider portal) with MFA. In reality, if the MSP was compromised, every customer is then compromised.

                                I get the value of MFA. But how would each customer get compromised if the MSP was compromised in an Office 365 context?

                                wouldn't the hacker then have access to all of the customer accounts via the MSP's O365 delegate account?

                                That's assuming you are using a shared account that can access all customers, rather than a discrete account per customer.

                                Of course.

                                So what does NTG do?

                                Individual accounts per customer. We aren't a reseller, so there isn't any natural connection between customers already.

                                What does a natural connection between customers have to do with anything?

                                There is no association between the customers, even at the ITSP level. No natural reason for any cross connection to exist.

                                1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @Dashrender
                                  last edited by

                                  @Dashrender said in MSPs the New Hacker Target?:

                                  a single vendor account with MS which then grants you access to ALL of your customers accounts, prevents you from needing to log in dozens of times a day - from having to maintain all those separate accounts, etc.

                                  of course, it opens you up to the above stated issues.

                                  I'm not saying that it is a bad thing, just not one that we use.

                                  DashrenderD 1 Reply Last reply Reply Quote 0
                                  • DashrenderD
                                    Dashrender @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in MSPs the New Hacker Target?:

                                    @Dashrender said in MSPs the New Hacker Target?:

                                    a single vendor account with MS which then grants you access to ALL of your customers accounts, prevents you from needing to log in dozens of times a day - from having to maintain all those separate accounts, etc.

                                    of course, it opens you up to the above stated issues.

                                    I'm not saying that it is a bad thing, just not one that we use.

                                    Cool -

                                    1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller
                                      last edited by

                                      Literally on the phone with the customer of a different MSP that had this happen.

                                      ObsolesceO 1 Reply Last reply Reply Quote 1
                                      • ObsolesceO
                                        Obsolesce @scottalanmiller
                                        last edited by

                                        @scottalanmiller said in MSPs the New Hacker Target?:

                                        Literally on the phone with the customer of a different MSP that had this happen.

                                        Is NTG reaching out to these MSPs to offer assistance and/or guidance?

                                        RojoLocoR scottalanmillerS 2 Replies Last reply Reply Quote 0
                                        • RojoLocoR
                                          RojoLoco @Obsolesce
                                          last edited by

                                          @Obsolesce said in MSPs the New Hacker Target?:

                                          @scottalanmiller said in MSPs the New Hacker Target?:

                                          Literally on the phone with the customer of a different MSP that had this happen.

                                          Is NTG reaching out to these MSPs to offer assistance and/or guidance?

                                          Or are they reaching out to customers to offer competent managed services?

                                          ObsolesceO scottalanmillerS 2 Replies Last reply Reply Quote 1
                                          • ObsolesceO
                                            Obsolesce @RojoLoco
                                            last edited by

                                            @RojoLoco said in MSPs the New Hacker Target?:

                                            @Obsolesce said in MSPs the New Hacker Target?:

                                            @scottalanmiller said in MSPs the New Hacker Target?:

                                            Literally on the phone with the customer of a different MSP that had this happen.

                                            Is NTG reaching out to these MSPs to offer assistance and/or guidance?

                                            Or are they reaching out to customers to offer competent managed services?

                                            Yeah that too!

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 1 / 2
                                            • First post
                                              Last post