{"id":6446,"date":"2020-10-27T23:11:42","date_gmt":"2020-10-27T23:11:42","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6446"},"modified":"2021-04-09T23:17:55","modified_gmt":"2021-04-09T22:17:55","slug":"ncsam-analyzing-and-improving-your-security-practice","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice","title":{"rendered":"NCSAM: Analyzing and Improving Your Security Practice"},"content":{"rendered":"<p>Over the past few posts, we talked about preventing, detecting, responding to, and recovering from cyberthreats as part of National Cybersecurity Awareness Month (NCSAM). These steps focus on the day-to-day techniques of practicing cybersecurity from a tactical level.<\/p>\n<p>But once you\u2019ve got these parts down, it\u2019s time to take a look at security from a more macro, strategic level. In this final step, we talk about using reports and analysis to consistently improve your customers\u2019 security postures as well as enhancing your own business.<\/p>\n<h2 class=\"h3\">Analyze<\/h2>\n<p>Keeping up with security requires you to take stock of your customers\u2019 security postures from time to time. And it\u2019s more important than ever\u2014<a class=\"ext\" href=\"https:\/\/www.ibm.com\/uk-en\/security\/data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">61% of small- and medium-sized businesses (SMBs<\/a>) believe the consequences of cyberattacks are increasing in severity.<\/p>\n<p>So here are a few tips to keep in mind:<\/p>\n<h3 class=\"h4\">ANALYZE INCIDENTS<\/h3>\n<p>In our previous post, we talked a bit about the incident response\u00a0 (IR) process. IR involves a mixture of both actions to take (such as triaging, routing responses, quarantining machines or files, and communication) with analysis. Forensic analysis during the IR process allows you to quickly make decisions on how best to proceed with the urgent incident at hand. However, once you\u2019ve resolved a security incident, particularly if the incident was critical, bring the relevant stakeholders on your team together for a post-incident analysis discussion. Try to figure out what went wrong and what steps you can take to help prevent the issue from recurring in the future. Also, try to determine if this was an incident for an individual customer or if it might affect your entire customer base. A good tip here is to avoid blaming anyone involved, as it\u2019ll only cause them to clam up and not offer suggestions. You want objective analysis, so you need to encourage an open atmosphere and prevent finger pointing. Finally, whatever your incident analysis shows, communicate this to your customers so they\u2019re aware you\u2019re actively working to make them stronger.<\/p>\n<p class=\"h4\"><a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/edr-solutions?promo=blog\">USE AN EDR SOLUTION<\/a><\/p>\n<p>Your security tools often have built-in reports to help you understand the day-to-day information and help with your overall security posture. In particular, a good\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/n-central\/use-cases\/edr-solutions?promo=blog\" target=\"_blank\" rel=\"noopener\">endpoint detection and response (EDR) tool<\/a>, like SolarWinds<sup>\u00ae<\/sup>\u00a0EDR, will offer reports and attack timelines to help with forensic analysis. This will be extremely useful as part of understanding the nature of an attack as mentioned in the previous step. However, it\u2019s also useful for demonstrating how your defenses worked to stop an active attack.<\/p>\n<h3 class=\"h4\">RUN REGULAR VULNERABILITY ASSESSMENTS<\/h3>\n<p>We\u2019ve mentioned this in other posts as well, but try to use a vulnerability scanner on a semi-regular basis to uncover potential areas for improvement. A simple scan can often reveal unpatched software, misconfigurations, or default passwords lurking somewhere within your customers\u2019 IT infrastructure. You can often fix these issues quickly, which not only helps reduce their security risk, but also demonstrates the value of your work.<\/p>\n<h3 class=\"h4\">TRY PENETRATION TESTING<\/h3>\n<p>Penetration testing involves more active work than a vulnerability scan, but it may be worth going the extra mile, particularly for higher-risk clients. While vulnerability scans can be automated, pen testing will require more in-depth security knowledge and skills to execute effectively. It may be worth partnering with an outside firm to perform pen tests on an as-needed basis.<\/p>\n<h3 class=\"h4\">LOOK INTERNALLY<\/h3>\n<p>While most of our tips have focused on your customers, don\u2019t forget that as a business partner, your own internal security is a crucial link in the chain of your customers\u2019 security postures. So make sure you\u2019re consistently running your own vulnerability scans and practicing good cyberhygiene. Plus, if you don\u2019t pen test for customers, it\u2019s at least worth hiring penetration testing services for your own MSP since a compromise could lead to a successful attack on your entire customer base.<\/p>\n<h3 class=\"h4\">SHARE YOUR FINDINGS<\/h3>\n<p>Finally, make sure to share reports and analysis with your customers on a regular basis. This is most important and urgent after a security incident occurs, but you should also add a security review portion to a quarterly business review update with your customers. Your quarterly meetings should both demonstrate the work you\u2019ve done over the previous quarters\u2014including before-and-after snapshots on vulnerability or penetration tests\u2014as well as recommendations on additional security steps they should take. This can be a perfect opportunity to use data to persuade customers to take on new security steps to further reduce their security risks. This not only helps your bottom line, but ultimately, helps them stay up-to-date with the latest security threats.<\/p>\n<h2 class=\"h3\">Where do you stand?<\/h2>\n<p>With National Cybersecurity Awareness Month ending soon, it\u2019s worth making time to take stock of your own internal security and the security postures of your customers. But remember, just because NCSAM is almost over, cybersecurity work never ends. Cybercriminals continue to evolve their threats and often find new angles to compromise systems or steal or encrypt data. Cybercriminals don\u2019t take holidays\u2014neither can your cybersecurity programs. However, if you keep the principles and overall framework we covered in the past few weeks in mind, you should have a good foundational process for staying ahead of the cybercriminals.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Over the past few weeks, we covered four important steps in the process of securing your customers. We also put these steps together into an easy-to-digest infographic with some important stats that could be useful in your sales conversation. Get the infographic wrapping up the tips and steps for free\u2014<a href=\"https:\/\/www.solarwindsmsp.com\/sites\/solarwindsmsp\/files\/resources\/SW_MSP_Get_Cybersecurity_Down_To_A_Science_IG.pdf?promo=blog\" target=\"_blank\" rel=\"noopener\">download it now.<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Look at security from a strategic level. Learn about using reports and analysis to improve your customers\u2019 security postures and enhancing your own business.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6446","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Analyzing and Improving Your Security Practice - N-able<\/title>\n<meta name=\"description\" content=\"Look at security from a strategic level. Learn about using reports and analysis to improve your customers\u2019 security postures and enhancing your own business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analyzing and Improving Your Security Practice - N-able\" \/>\n<meta property=\"og:description\" content=\"Look at security from a strategic level. Learn about using reports and analysis to improve your customers\u2019 security postures and enhancing your own business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-27T23:11:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T22:17:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"NCSAM: Analyzing and Improving Your Security Practice\",\"datePublished\":\"2020-10-27T23:11:42+00:00\",\"dateModified\":\"2021-04-09T22:17:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice\"},\"wordCount\":925,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice\",\"name\":\"Analyzing and Improving Your Security Practice - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2020-10-27T23:11:42+00:00\",\"dateModified\":\"2021-04-09T22:17:55+00:00\",\"description\":\"Look at security from a strategic level. Learn about using reports and analysis to improve your customers\u2019 security postures and enhancing your own business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NCSAM: Analyzing and Improving Your Security Practice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Analyzing and Improving Your Security Practice - N-able","description":"Look at security from a strategic level. Learn about using reports and analysis to improve your customers\u2019 security postures and enhancing your own business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice","og_locale":"es_ES","og_type":"article","og_title":"Analyzing and Improving Your Security Practice - N-able","og_description":"Look at security from a strategic level. Learn about using reports and analysis to improve your customers\u2019 security postures and enhancing your own business.","og_url":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-10-27T23:11:42+00:00","article_modified_time":"2021-04-09T22:17:55+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"NCSAM: Analyzing and Improving Your Security Practice","datePublished":"2020-10-27T23:11:42+00:00","dateModified":"2021-04-09T22:17:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice"},"wordCount":925,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice","url":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice","name":"Analyzing and Improving Your Security Practice - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2020-10-27T23:11:42+00:00","dateModified":"2021-04-09T22:17:55+00:00","description":"Look at security from a strategic level. Learn about using reports and analysis to improve your customers\u2019 security postures and enhancing your own business.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/ncsam-analyzing-and-improving-your-security-practice#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"NCSAM: Analyzing and Improving Your Security Practice"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=6446"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/6446\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=6446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}