{"id":25316,"date":"2021-10-20T15:21:18","date_gmt":"2021-10-20T14:21:18","guid":{"rendered":"https:\/\/www.n-able.com\/?p=25316"},"modified":"2025-05-23T14:06:47","modified_gmt":"2025-05-23T13:06:47","slug":"our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change","title":{"rendered":"Our friends were hit by an impossible cyberstorm. It\u2019s time we all change"},"content":{"rendered":"<p class=\"p1\">A common clich\u00e9 in cybersecurity is, it\u2019s not a question of if you get attacked, but <i>when.<\/i> We witnessed this firsthand when our former parent company was part of a major attack last year. While N&#8209;able products weren\u2019t affected, it was difficult to watch friends and colleagues deal with the aftermath of an event of that magnitude.<\/p>\n<p class=\"p1\">There\u2019s not much we can say about it that isn\u2019t public record, but we want to address how it changed our outlook, and what we\u2019re doing to help protect ourselves, you, and your customers.<\/p>\n<h2 class=\"p1\">Risk has changed<\/h2>\n<p class=\"p1\">We\u2019re playing a different game these days. It\u2019s not just our former parent company\u2014other major tech companies were part of the same breach. And other MSP vendors recently faced down major breaches as well. We saw the gas pipeline in the southeast United States shut down for days <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">over a breached password<\/span><\/a>.<\/p>\n<p class=\"p1\">It\u2019s a trend\u2014large-scale attacks continue proliferating to devastating effects.<\/p>\n<p class=\"p1\">These are only the attacks that make the news. Each day, small businesses get hit. Some may come from cybercriminal gangs or from individuals purchasing malware off the <a href=\"https:\/\/www.n-able.com\/cyber-encyclopedia\/what-is-the-dark-web\"  data-wpil-monitor-id=\"36\">dark web<\/a>, but today\u2019s cybercriminals share resources and run like businesses. This puts everyone at risk\u2014serious risk.<\/p>\n<p class=\"p1\">It comes down to this: <i>we\u2019re all part of the supply chain, and we must think about ourselves this way. <\/i>We cannot think of ourselves as separate. Even though larger vendors make news, smaller companies can get hit with variations on those same attacks.<\/p>\n<p class=\"p1\">In the physical world, businesses can get robbed at any minute. Banks have higher levels of security\u2014from alarm systems on the doors to emergency buttons that automatically call police under tellers\u2019 desks\u2014because they keep so much cash on hand, making them high-value targets. Retail stores often lack this level of security due to lower levels of risk. Many convenience stores open later at night\u2014or in areas where crime remains high\u2014have high levels of security due to a lower barrier of an attack, like cages or bulletproof glass between the cashier and customers.<\/p>\n<p class=\"p1\">Cybercriminals now have numerous advantage. First, they can attack businesses that don\u2019t have cash on hand, like a medical office or a tech company. These are both high-value targets because of their access financial and data information. Second, the barrier to entry is lower due to the malware-as-a-service trend, where cybercriminals resell their malware to others who lack the hacking skills. Third, they can often get away with it more easily because they are able to hide their tracks by deleting logs or even showing up at the business if they\u2019re in another country (leading to jurisdictional issues that can turn crime into a profit). Plus, cryptocurrencies hide transactions well enough that criminals can further prevent their identities from becoming public.<\/p>\n<p class=\"p1\">All this means we\u2019re facing new levels of business risk, and companies need to make sure to tackle it accordingly.<\/p>\n<h2 class=\"p1\">What we\u2019re doing to help<\/h2>\n<p class=\"p1\">Over the next few blogs, we\u2019ll go into greater depth on how we\u2019re protecting the broader supply chain, from our own infrastructure and products to you and your customers. For now, let\u2019s cover the broad strokes.<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><b>Offering a wide range of integrated products:<\/b> Your customers need protection at multiple layers\u2014from the data layer up to the internet layer. They also need help at all stages of an attack, from prevention and discovery to investigation and recovery. We offer a broad portfolio of <a href=\"https:\/\/www.n-able.com\/features\/all-in-one-software-for-msps?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">top-of-the-line products<\/span><\/a> that tackle today\u2019s toughest threats and have worked to integrate them where possible. This can help simplify a lot of the process of delivering security. Even with sophisticated attacks, you can still stop many\u2014if not most\u2014threats without needing a full SOC or becoming a full-blown MSSP. Yes, major risks will still exist, but the right layers can still take you far.<\/li>\n<li class=\"li1\"><b>Building with security in mind:<\/b> We <a href=\"https:\/\/www.n-able.com\/features\/msp-security-software\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">design our products for security<\/span><\/a> before we write a single line of code. From training developers on the latest attack patterns and vectors to scanning code both while running and at rest, we work to minimize potential vulnerabilities slipping into the codebase.<\/li>\n<li class=\"li1\"><b>Protecting our infrastructure:<\/b> We also protect the underlying foundation that powers and runs our products. From 24\/7, global third-party monitoring to regular employee security trainings and wargames, we put multiple safeguards in place to keep cybercriminals from getting into our systems and potentially harming you or your customers.<\/li>\n<\/ul>\n<h2 class=\"p1\">Protecting the full risk cycle<\/h2>\n<p class=\"p1\">Cybercriminals have evolved, so we all need to think about risk differently. Today\u2019s sophisticated attack becomes tomorrow\u2019s commonplace as it gets resold on the dark web to criminals who often don\u2019t even need hacking skills to turn a profit.<\/p>\n<p class=\"p1\">As we witnessed the storm taking place, our outlook changed. We have always emphasized security, but seeing the effects of something that large\u2014and more importantly what <i>could<\/i> have happened had it been worse\u2014really affected us.<\/p>\n<p class=\"p1\">We fortified areas that were already strong and enhanced our security programs where we could. Over the next few blogs, we\u2019ll cover in more detail the steps we\u2019re taking to protect N&#8209;able, you, and your customers as one part of a greater, worldwide software supply chain.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a series of three blogs, we\u2019re going to look in detail at the steps we\u2019re taking to protect N-able, you, and your customers as one part of a greater,&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-25316","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>We protect N-able, you, and your customers as one part of a greater supply chain | N-able<\/title>\n<meta name=\"description\" content=\"Read in detail at the steps we\u2019re taking to protect N-able, you, and your customers as one part of a greater, worldwide software supply chain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"We protect N-able, you, and your customers as one part of a greater supply chain | N-able\" \/>\n<meta property=\"og:description\" content=\"Read in detail at the steps we\u2019re taking to protect N-able, you, and your customers as one part of a greater, worldwide software supply chain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-20T14:21:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T13:06:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/10\/211014_NA_Blogbanner_Security_Impossible-storm_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/10\/211014_NA_Blogbanner_Security_Impossible-storm_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Our friends were hit by an impossible cyberstorm. It\u2019s time we all change\",\"datePublished\":\"2021-10-20T15:21:18+01:00\",\"dateModified\":\"2025-05-23T13:06:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change\"},\"wordCount\":897,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change\",\"url\":\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change\",\"name\":\"We protect N-able, you, and your customers as one part of a greater supply chain | N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#website\"},\"datePublished\":\"2021-10-20T15:21:18+01:00\",\"dateModified\":\"2025-05-23T13:06:47+00:00\",\"description\":\"Read in detail at the steps we\u2019re taking to protect N-able, you, and your customers as one part of a greater, worldwide software supply chain.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/it\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our friends were hit by an impossible cyberstorm. It\u2019s time we all change\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/it\/#website\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/it\/#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"We protect N-able, you, and your customers as one part of a greater supply chain | N-able","description":"Read in detail at the steps we\u2019re taking to protect N-able, you, and your customers as one part of a greater, worldwide software supply chain.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change","og_locale":"it_IT","og_type":"article","og_title":"We protect N-able, you, and your customers as one part of a greater supply chain | N-able","og_description":"Read in detail at the steps we\u2019re taking to protect N-able, you, and your customers as one part of a greater, worldwide software supply chain.","og_url":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-10-20T14:21:18+00:00","article_modified_time":"2025-05-23T13:06:47+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/10\/211014_NA_Blogbanner_Security_Impossible-storm_ss.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/10\/211014_NA_Blogbanner_Security_Impossible-storm_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Scritto da":"N-able","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Our friends were hit by an impossible cyberstorm. It\u2019s time we all change","datePublished":"2021-10-20T15:21:18+01:00","dateModified":"2025-05-23T13:06:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change"},"wordCount":897,"publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"articleSection":["Security"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change","url":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change","name":"We protect N-able, you, and your customers as one part of a greater supply chain | N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/it\/#website"},"datePublished":"2021-10-20T15:21:18+01:00","dateModified":"2025-05-23T13:06:47+00:00","description":"Read in detail at the steps we\u2019re taking to protect N-able, you, and your customers as one part of a greater, worldwide software supply chain.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/it\/blog\/our-friends-were-hit-by-an-impossible-cyberstorm-its-time-we-all-change#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/it\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Our friends were hit by an impossible cyberstorm. It\u2019s time we all change"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/it\/#website","url":"https:\/\/www.n-able.com\/it\/","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/it\/#organization","name":"N-able","url":"https:\/\/www.n-able.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/it\/#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/25316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/comments?post=25316"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/posts\/25316\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/it\/wp-json\/wp\/v2\/media?parent=25316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}