{"id":24835,"date":"2021-10-07T15:00:13","date_gmt":"2021-10-07T14:00:13","guid":{"rendered":"https:\/\/www.n-able.com\/?p=24835"},"modified":"2021-10-07T16:21:04","modified_gmt":"2021-10-07T15:21:04","slug":"fight-the-phish-using-bubble-wrap","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap","title":{"rendered":"Fight the phish using Bubble Wrap"},"content":{"rendered":"<p class=\"p1\">Bubble wrap<sup>\u00ae<\/sup>. That obsessively addictive plastic material, made up of hundreds of small air-filled bubbles we all love to squeeze. Although I tend to think of Bubble Wrap as the original fidget toy\u2014melting away our anxieties with every satisfying pop\u2014most people associate it with helping to protect their most precious collectibles when in transit or being placed in long-term storage.<\/p>\n<p class=\"p1\">When I\u2019m talking about #Cybersecurity with our MSPs partners, I often use the analogy of Bubble Wrap as a reminder that MSPs need to do everything they can from a program and solution design perspective to proactively protect end users from themselves and ensure they don\u2019t inject undue harm onto their organization\u2019s network. Left unchecked, end users are the real cybersecurity threat facing businesses today\u2014and bad guys know and exploit it.<\/p>\n<p class=\"p1\">According to a <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Verizon 2021 Data Breach Investigations<\/span><\/a> report, 85% of breaches involved a human element and 61% were due to stolen or compromised user credentials.<\/p>\n<p class=\"p1\">So as an MSP, what can you do to help Bubble Wrap your customers\u2019 employees to better mitigate their cyber risk exposure?<\/p>\n<h2 class=\"p1\"><b>4 steps to help fight the phish!<\/b><\/h2>\n<h3 class=\"p1\"><b>1. Design your cybersecurity programs with the end user in mind<\/b><\/h3>\n<p class=\"p1\">AV, patch, and backup are no longer the hallmarks of a well-designed security program. With the rapid changes in today\u2019s threat landscape, you need to be sure your cybersecurity program is keeping ahead of scammers. To help fight the phish, it needs to evolve to include more advanced security features, such as email and spam filtering that analyze <a href=\"https:\/\/www.n-able.com\/features\/outbound-inbound-email-filtering\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">inbound emails<\/span><\/a> to prevent malicious links or attachments from ever reaching the end user\u2019s Inbox in the first place, as well as<b> <\/b>DNS\/web filtering solutions to block access to malicious websites.<b> <\/b><\/p>\n<h3 class=\"p1\"><b>2. Implement mandatory multifactor authentication (MFA) for employee access into all critical accounts, applications, and systems<\/b><\/h3>\n<p class=\"p1\">The bad guys are quite savvy about how they trick end users into giving up their password information; but by requiring mandatory MFA for all employees, an additional security hoop is introduced that hackers will need to jump through to successfully infiltrate the organization\u2019s network.<\/p>\n<h3 class=\"p1\"><b>3. Include mandatory cybersecurity training for ALL employees as part of your cybersecurity programs<\/b><\/h3>\n<p class=\"p1\">Education should be at the heart of your cybersecurity programs and automatically included in the monthly fee you charge\u2014not be positioned as an optional add-on. And everyone within the organization\u2014including all managers and executives\u2014should participate in the training. You need to teach end users about <a href=\"https:\/\/www.n-able.com\/blog\/how-to-protect-your-company-from-spear-phishing\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">the most common types of phishing attacks<\/span><\/a> and how to identify them. Enroll all employees in regular phishing simulations to test and measure their awareness, which will help to detect who may be at risk for a cyberattack.<\/p>\n<h3 class=\"p1\"><b>4. It isn\u2019t IF an attack will happen, but WHEN\u2014be sure your program also includes cyber-resiliency components<\/b><\/h3>\n<p class=\"p1\">Your modern cybersecurity program should extend beyond using traditional antivirus software and contain a next-generation AV solution, like <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s1\">Endpoint Detection and Response (EDR)<\/span><\/a>. The new technologies of EDR don\u2019t rely on continuous signature updates to maintain their effectiveness and incorporate rollback capabilities to help revert an end user\u2019s machine to a pre-attack, healthy state in the event something gets through.<\/p>\n<p class=\"p1\">When it comes to mitigating and protecting against phishing attacks, it only takes one employee to click on something they shouldn\u2019t to kick-start a chain reaction of dire consequences. As their MSP, it is critical you implement proper cybersecurity programs and policies to Bubble Wrap each employee as much as you can\u2014to better protect themselves and their organization from attack.<\/p>\n<p class=\"p4\"><i>Stefanie Hammond is Head Sales and Marketing Nerd at\u00a0<\/i><a href=\"https:\/\/www.n-able.com\/?promo=blog\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><i>N&#8209;able<\/i><\/span><\/a><i>. You can follow her on <\/i><a href=\"https:\/\/www.linkedin.com\/in\/stefanie-hammond\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><i>LinkedIn<\/i><\/span><\/a><i>\u00a0and on\u00a0Twitter<\/i>\u00a0at\u00a0<a href=\"https:\/\/twitter.com\/sales_mktg_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">@sales_mktg_nerd<\/span><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we celebrate National Cybersecurity Awareness Month, Stefanie Hammond looks at why Bubble Wrap makes the perfect analogy for creating your cybersecurity program.<\/p>\n","protected":false},"author":64,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-24835","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fight the phish using Bubble Wrap | N-able<\/title>\n<meta name=\"description\" content=\"What can you do as an MSP to help Bubble Wrap your customers\u2019 employees to better mitigate their cyber risk exposure?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fight the phish using Bubble Wrap | N-able\" \/>\n<meta property=\"og:description\" content=\"What can you do as an MSP to help Bubble Wrap your customers\u2019 employees to better mitigate their cyber risk exposure?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-07T14:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-07T15:21:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/720x356_Dark_v07.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"356\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefanie Hammond\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/720x356_Dark_v07.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefanie Hammond\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap\"},\"author\":{\"name\":\"Stefanie Hammond\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\"},\"headline\":\"Fight the phish using Bubble Wrap\",\"datePublished\":\"2021-10-07T15:00:13+01:00\",\"dateModified\":\"2021-10-07T15:21:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap\"},\"wordCount\":621,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Head Nerds\",\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap\",\"name\":\"Fight the phish using Bubble Wrap | N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2021-10-07T15:00:13+01:00\",\"dateModified\":\"2021-10-07T15:21:04+00:00\",\"description\":\"What can you do as an MSP to help Bubble Wrap your customers\u2019 employees to better mitigate their cyber risk exposure?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fight the phish using Bubble Wrap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8\",\"name\":\"Stefanie Hammond\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g\",\"caption\":\"Stefanie Hammond\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fight the phish using Bubble Wrap | N-able","description":"What can you do as an MSP to help Bubble Wrap your customers\u2019 employees to better mitigate their cyber risk exposure?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap","og_locale":"pt_BR","og_type":"article","og_title":"Fight the phish using Bubble Wrap | N-able","og_description":"What can you do as an MSP to help Bubble Wrap your customers\u2019 employees to better mitigate their cyber risk exposure?","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-10-07T14:00:13+00:00","article_modified_time":"2021-10-07T15:21:04+00:00","og_image":[{"width":720,"height":356,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/720x356_Dark_v07.jpg","type":"image\/jpeg"}],"author":"Stefanie Hammond","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/04\/720x356_Dark_v07.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Stefanie Hammond","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap"},"author":{"name":"Stefanie Hammond","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8"},"headline":"Fight the phish using Bubble Wrap","datePublished":"2021-10-07T15:00:13+01:00","dateModified":"2021-10-07T15:21:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap"},"wordCount":621,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Head Nerds","Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap","url":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap","name":"Fight the phish using Bubble Wrap | N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2021-10-07T15:00:13+01:00","dateModified":"2021-10-07T15:21:04+00:00","description":"What can you do as an MSP to help Bubble Wrap your customers\u2019 employees to better mitigate their cyber risk exposure?","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/fight-the-phish-using-bubble-wrap#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Fight the phish using Bubble Wrap"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/5dd562750a462fbf021a62a3347250c8","name":"Stefanie Hammond","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78ac8d91da7cfeb2107fae00ccc069f4202141f8b7cd968b3b6f46bc04ab6ae4?s=96&d=mm&r=g","caption":"Stefanie Hammond"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/24835","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=24835"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/24835\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=24835"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}