{"id":8787,"date":"2021-04-13T15:00:12","date_gmt":"2021-04-13T14:00:12","guid":{"rendered":"https:\/\/www.n-able.com\/?p=8787"},"modified":"2021-04-15T18:51:18","modified_gmt":"2021-04-15T17:51:18","slug":"layered-security-in-2021-part-one-the-current-landscape","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape","title":{"rendered":"Layered security in 2021, part one: The current landscape"},"content":{"rendered":"<p class=\"p1\">MSPs are charged with protecting their customers from cyberthreats. Even if you\u2019re not primarily in the security business, SMBs often don\u2019t draw the distinction\u2014they often just assume you\u2019ll handle all things IT, including security.<\/p>\n<p class=\"p1\">Cybercriminals frequently innovate their tradecraft, share knowledge with other criminals, and even rent out sophisticated malware services. This means you\u2019ll have to keep up with the latest security tools to make sure you\u2019re adequately reducing security risks.<\/p>\n<p class=\"p1\">In this blog and the next one in the series, we\u2019ll cover some trends in cybercrime and offer a layered security model you can use to help protect your customers\u2019 data.<\/p>\n<h2 class=\"p1\">Cyberattack trends<\/h2>\n<p class=\"p1\">As mentioned, cybercriminals frequently innovate. While many threats use older, tried-and-true methods, some hackers and criminals have moved cybercrime forward by either creating new attacks or building variations on older standards.<\/p>\n<p class=\"p1\">That said, let\u2019s take a quick look at a few developments:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><strong>Ransomware:<\/strong> Cybercriminals still use traditional ransomware to encrypt machines and data. But with the Maze ransomware attack, we saw cybercriminals threaten to breach and release data if victims didn\u2019t pay a ransom. This puts additional pressure on victims to pay.<\/li>\n<li class=\"li1\"><strong>Attack vectors:<\/strong>\u00a0While email remains a top attack vector, we\u2019ve seen criminals increasingly shift toward attacks using open internet-facing ports, particularly remote desktop protocol (RDP). This shift predated the pandemic, but was particularly devastating as organizations increasingly shifted to remote work.<\/li>\n<li class=\"li1\"><strong>Fileless attacks:<\/strong>\u00a0Most antivirus programs are built to scan only files. To counteract this, cybercriminals have increasingly used fileless attacks that run in system memory so AV programs can\u2019t catch them. A fileless attack may leverage admin tools that are pre-approved by most systems like PsExec or PowerShell to gain persistence or cause damage.<\/li>\n<li class=\"li1\"><strong>Attacks on MSPs:<\/strong> Finally, we\u2019ve seen cybercrime increasingly aimed at MSPs, IT providers, and security providers. Criminals know that if they compromise one MSP, they can often gain access to data for multiple businesses. As a result, MSPs need to pay increasing attention to their own internal security. In some cases, MSPs may wish to hire an external MSSP to watch their internal network or run periodic pen tests to help further reduce risk.<\/li>\n<\/ul>\n<p class=\"p1\">The theme behind most of these is that cybercriminals have increasingly found ways to bypass defenses. For example, Maze ransomware renders backup and recovery moot, so you\u2019ll have to focus more on preventing ransomware than recovery (although, backup and recovery is still extremely important, especially for traditional ransomware which still comprises the bulk of attacks). Fileless attacks seek to go around AV and often use pre-approved administrative tools, so traditional antivirus programs may be unable to catch these attacks.<\/p>\n<p class=\"p1\">The bottom line is this\u2014the bar for security continues to rise.<\/p>\n<h2 class=\"p1\">Multi-stage attacks<\/h2>\n<p class=\"p1\">Another important trend to mention involves the use of multi-stage attacks. Taking the example of the full attack chain for Ryuk ransomware can really help illustrate the importance of multiple security layers to hesitant prospects or customers.<\/p>\n<p class=\"p1\">To briefly summarize, most attacks cross multiple levels to be effective. However, the benefit is that this gives you multiple opportunities to prevent, stop, or recover from an attack.<\/p>\n<p class=\"p1\">For example, a common attack could start at the internet level with a malicious email. Here, a good email security solution can attempt to filter out the malicious email. If it slips past, it requires a user to click on the malicious link and, hopefully, their security training will remind them to think twice before clicking a malicious link. If that check doesn\u2019t work, you could have an endpoint detection and response (EDR) solution note malicious behavior from the downloaded file, then quickly take action on your behalf.<\/p>\n<h2 class=\"p1\">The layers you need<\/h2>\n<p class=\"p1\">To begin enhancing your security posture, it helps to have a framework in mind. Similar to the OSI model for networking, thinking in terms of the different levels at which an element of an attack can occur gives you a better chance of troubleshooting and, in the case of security, placing the right defenses.<\/p>\n<p class=\"p1\">While there are multiple frameworks out there to conceptualize attacks, we\u2019ll present a simple one here.<\/p>\n<p class=\"p1\">It\u2019s worth noting that data sits at the center of the model. In most cases, this is what cybercriminals aim for\u2014to access data and either steal and resell it or encrypt it for a ransom. As a result, your goal is to <strong>stop attacks as far away from data as possible.<\/strong><\/p>\n<p class=\"p1\">In other words, it\u2019s important to have internet-layer protections to stop threats before they get to the network or device level. Doing so increases your chances of protecting that all-important data for your customers.<\/p>\n<p class=\"p1\">Around this data, we have five levels: device, application, people, network, and internet. Each layer has specific levels of protection you can add to stop an attack from reaching data. You\u2019ll also notice that recoverability sits outside of this model\u2014backups don\u2019t necessarily help with prevention, but are absolutely essential during incident response and recovery. They need to be part of any security stack.<\/p>\n<h2 class=\"p1\">What\u2019s next?<\/h2>\n<p class=\"p1\">In part two of this series, we\u2019ll cover what actually goes into each of these layers. You\u2019ll get practical advice for the basics of handling each layer for your customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the first part of our blog series looking at building a layered security provision, we look a the foundational elements of the modern security stack for MSPs.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-8787","post","type-post","status-publish","format-standard","hentry","topic-email","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Layered security in 2021, part one: The current landscape - N-able<\/title>\n<meta name=\"description\" content=\"This blog looks at building a layered security provision, we look a the foundational elements of the modern security stack for MSPs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Layered security in 2021, part one: The current landscape - N-able\" \/>\n<meta property=\"og:description\" content=\"This blog looks at building a layered security provision, we look a the foundational elements of the modern security stack for MSPs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T14:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-15T17:51:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Layered security in 2021, part one: The current landscape\",\"datePublished\":\"2021-04-13T15:00:12+01:00\",\"dateModified\":\"2021-04-15T17:51:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape\"},\"wordCount\":888,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Mail\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape\",\"name\":\"Layered security in 2021, part one: The current landscape - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2021-04-13T15:00:12+01:00\",\"dateModified\":\"2021-04-15T17:51:18+00:00\",\"description\":\"This blog looks at building a layered security provision, we look a the foundational elements of the modern security stack for MSPs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mail\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/mail\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Layered security in 2021, part one: The current landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Layered security in 2021, part one: The current landscape - N-able","description":"This blog looks at building a layered security provision, we look a the foundational elements of the modern security stack for MSPs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape","og_locale":"de_DE","og_type":"article","og_title":"Layered security in 2021, part one: The current landscape - N-able","og_description":"This blog looks at building a layered security provision, we look a the foundational elements of the modern security stack for MSPs.","og_url":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-04-13T14:00:12+00:00","article_modified_time":"2021-04-15T17:51:18+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Layered security in 2021, part one: The current landscape","datePublished":"2021-04-13T15:00:12+01:00","dateModified":"2021-04-15T17:51:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape"},"wordCount":888,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Mail","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape","url":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape","name":"Layered security in 2021, part one: The current landscape - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2021-04-13T15:00:12+01:00","dateModified":"2021-04-15T17:51:18+00:00","description":"This blog looks at building a layered security provision, we look a the foundational elements of the modern security stack for MSPs.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/layered-security-in-2021-part-one-the-current-landscape#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mail","item":"https:\/\/www.n-able.com\/de\/blog\/category\/mail"},{"@type":"ListItem","position":2,"name":"Layered security in 2021, part one: The current landscape"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/8787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=8787"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/8787\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=8787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}