{"id":5787,"date":"2020-08-10T22:49:45","date_gmt":"2020-08-10T21:49:45","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5787"},"modified":"2021-05-31T12:50:23","modified_gmt":"2021-05-31T11:50:23","slug":"dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure","title":{"rendered":"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure"},"content":{"rendered":"<p>An uncertain world can become a hotbed of cybercriminal activity. In situations like our current climate, users let their guards down and technicians have less control over customer environments as people work from home. The guardrails normally reducing companies\u2019 cyber-risks start to disappear.<\/p>\n<p>In a previous post, we spoke about the challenges of the current environment and emphasized that practicing sound cyberhygiene has to remain paramount to keep your customers safe. We also gave five tips for helping prevent and deal with cyberthreats through sound foundational security practices. If you want to catch up, you can\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/dont-forget-cyberhygiene-1-of-2\" target=\"_blank\" rel=\"noopener\">read the post here<\/a>.<\/p>\n<p>Today, we\u2019ll cover another five tips for reducing your cyber-risk. If you want to keep your customers safe, make sure to continue practicing these tactics (or start implementing them if you don\u2019t already).<\/p>\n<h3>1. Monitor for suspicious activity<\/h3>\n<p>You can take a lot of steps to prevent cyberattacks, from patching to firewalls to email protection. These preventive steps still need to be put in place, but prevention isn\u2019t enough to protect your customers. You can\u2019t just \u201cset and forget\u201d security\u2014you need to actively monitor for threats and remain vigilant. This could mean monitoring network traffic for potential intrusions, using endpoint detection and response (EDR) tools to monitor for anomalous endpoint behavior, or watching for failed login attempts to prevent account takeovers. Ultimately, if you want to improve your customers\u2019 security postures you need to put active monitoring in place.<\/p>\n<h3>2. Have a backup<\/h3>\n<p>It\u2019s impossible to predict everything that can happen in an IT environment. Problems can occur at any time\u2014from someone deleting critical data to natural disasters affecting either business continuity or affecting a data center. That\u2019s why it\u2019s absolutely critical to back up data so you\u2019re prepared for the unpreparable.<\/p>\n<p>With ransomware threats in particular, backup is one of the main lines of defense. Yet, many ransomware attacks will first seek to delete local backups. So it\u2019s important to have a good\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup?promo=blog\" target=\"_blank\" rel=\"noopener\">cloud-based backup<\/a>\u00a0in the event you have to restore critical data on someone\u2019s machine. This is even more important as more workers continue operating out of home offices. Make sure to set up your backup solution to automate backups to run on a set schedule. Beyond this, make sure to periodically test your backups\u2019 recoverability\u2014the last thing you want is to be in a recovery scenario and find out your backups have an issue.<\/p>\n<h3>3. Prevent attacks from spreading<\/h3>\n<p>Another important point to remember is that many of today\u2019s attacks grow worse due to the increasing interconnectedness of modern IT environments. If ransomware lands on one machine, your goal should be to prevent it from spreading across a corporate network. This can keep a small problem from snowballing into a catastrophic one.<\/p>\n<p>To tackle this issue, make sure to reduce any unnecessary connections. Try to isolate the most sensitive devices or resources from the rest of the network. And make sure team members and end users know not to share credentials. This is particularly critical as cybercriminals target MSPs in their attacks. One account compromise could give the criminals access to multiple businesses\u2019 sensitive data. Try getting a good password manager to help enforce strong password hygiene among your own team.<\/p>\n<h3>4. Educate<\/h3>\n<p>Cybercriminals shift their tactics regularly. Ransomware victims now have to worry both about getting their data encrypted and potentially having that\u00a0<a class=\"ext\" href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/05\/tactics-techniques-procedures-associated-with-maze-ransomware-incidents.html\" target=\"_blank\" rel=\"noopener noreferrer\">data exposed on public websites<\/a>. Criminals have also changed their targets for ransomware attacks toward smaller governments, often taking those victims offline for days. More recently, criminals have sought to launch attacks by using\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/coronavirus-scams-staying-safe-times-elevated-risk\" target=\"_blank\" rel=\"noopener\">fear around COVID-19 as a hook in phishing campaigns and scams<\/a>. And malicious actors have increasingly come to rely on methods to circumvent antivirus by using malware obfuscation techniques or fileless attacks, making endpoint detection and response tools more important.<\/p>\n<p>The point here is that you want to continue educating yourself and your customers on the latest threats. Knowing the trends in cybersecurity can help you best focus your resources on threats and stay ahead of the cybercriminals. Make sure to educate your users during this time via security training and reminders as well. This gives you the opportunity to not only help them prevent attacks, but also gives you a chance to remind customers of the value you provide.<\/p>\n<h3>5. Stay vigilant against spam<\/h3>\n<p>The previous section mentioned cybercriminals using news around COVID-19 to try to scam users. This simply underscores the importance of email security. Since many attacks begin via email, it makes sense to put in place safeguards against email-borne threats.<\/p>\n<p>For starters, it helps to add an email security gateway to bolster the native security in customers\u2019 native email solutions. For example, SolarWinds<sup>\u00ae<\/sup>\u00a0Mail Assure uses collective intelligence from its user base combined with threat intelligence to help take\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail\/email-security?promo=blog\" target=\"_blank\" rel=\"noopener\">email security<\/a>\u00a0to a new level. Additionally, use your user training opportunities to teach customers how to recognize and avoid spam and email phishing. With so many employees working remotely, email security should be thought of as the first line of defense against common threats.<\/p>\n<h3>Stay vigilant<\/h3>\n<p>Unfortunately, during times of confusion and uncertainty cybercrime can often increase. Despite this, there are still plenty of steps you can take to help keep your customers secure. So stay strong\u2014your customers need you now more than ever.<\/p>\n<p>&nbsp;<\/p>\n<p><b>In this piece, we spoke about the importance of password security. This is particularly important for MSPs. If criminals can get the password to a technician\u2019s account, they can often breach multiple customers. SolarWinds Passportal + Documentation Manager is a\u00a0<a class=\"ext\" href=\"\/features\/password-management-software\" target=\"_blank\" rel=\"noopener noreferrer\">cloud-based password management\u00a0<\/a>system designed to help you maintain password best practices across your MSP team.\u00a0<\/b><a href=\"https:\/\/www.solarwindsmsp.com\/products\/passportal\" target=\"_blank\" rel=\"noopener\"><b>Learn more<\/b><\/a><b>\u00a0about how it can help you today.\u00a0<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out how WFH has thrown the security landscape for many organizations up in the air and get 5 tips to reduce your cyber risk.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5787","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure - N-able<\/title>\n<meta name=\"description\" content=\"Find out how WFH has thrown the security landscape for many organizations up in the air and get 5 tips to reduce your cyber risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure - N-able\" \/>\n<meta property=\"og:description\" content=\"Find out how WFH has thrown the security landscape for many organizations up in the air and get 5 tips to reduce your cyber risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T21:49:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-31T11:50:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"5\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure\",\"datePublished\":\"2020-08-10T22:49:45+01:00\",\"dateModified\":\"2021-05-31T11:50:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\"},\"wordCount\":968,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\",\"name\":\"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2020-08-10T22:49:45+01:00\",\"dateModified\":\"2021-05-31T11:50:23+00:00\",\"description\":\"Find out how WFH has thrown the security landscape for many organizations up in the air and get 5 tips to reduce your cyber risk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure - N-able","description":"Find out how WFH has thrown the security landscape for many organizations up in the air and get 5 tips to reduce your cyber risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure","og_locale":"de_DE","og_type":"article","og_title":"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure - N-able","og_description":"Find out how WFH has thrown the security landscape for many organizations up in the air and get 5 tips to reduce your cyber risk.","og_url":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-08-10T21:49:45+00:00","article_modified_time":"2021-05-31T11:50:23+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"5\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure","datePublished":"2020-08-10T22:49:45+01:00","dateModified":"2021-05-31T11:50:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure"},"wordCount":968,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure","url":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure","name":"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2020-08-10T22:49:45+01:00","dateModified":"2021-05-31T11:50:23+00:00","description":"Find out how WFH has thrown the security landscape for many organizations up in the air and get 5 tips to reduce your cyber risk.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/dont-forget-cyberhygiene-part-2-5-more-tips-keeping-customers-secure#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Don\u2019t Forget Cyberhygiene, Part 2 of 2: 5 More Tips on Keeping Customers Secure"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5787"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5787\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}