{"id":48433,"date":"2023-09-07T12:27:10","date_gmt":"2023-09-07T11:27:10","guid":{"rendered":"https:\/\/www.n-able.com\/?p=48433"},"modified":"2023-09-13T12:58:17","modified_gmt":"2023-09-13T11:58:17","slug":"managing-the-attack-surface-a-quick-guide-for-msps","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps","title":{"rendered":"Managing the Attack Surface: A Quick Guide for MSPs"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">As cyber threats get more sophisticated, cybersecurity becomes a top concern for organizations. In this context, MSPs face an unenviable task: they manage the IT infrastructure and services of multiple customers\u2014often small and medium businesses, which tend to be cybercriminals\u2019 <a href=\"https:\/\/www.coveware.com\/blog\/2022\/7\/27\/fewer-ransomware-victims-pay-as-medium-ransom-falls-in-q2-2022\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">preferred targets<\/span><\/a>. This job is being made even more challenging due to the increased use of Internet of Things (IoT) devices and Bring Your Own Device (BYOD) policies in modern workplaces. This is bringing a vast array of connected devices into the corporate environment, which requires robust Attack Surface Management (ASM) to control.\u00a0<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">In this article, we\u2019ll look at the complexities that IoT and BYOD bring, why ASM is critical for MSPs, and how they can manage their attack surface effectively.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">The Growing Attack Surface Challenge<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">ASM involves identifying, classifying, and securing all network-accessible assets with the goal to minimize exploitable entry points\u2014i.e., the Attack Surface\u2014and reduce the risk of a breach.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">However, as IoT devices multiply and BYOD policies become increasingly common in the workplace, the attack surface expands as well. Each additional device, from smart thermostats to employee-owned smartphones, presents a new potential entry point for cybercriminals. This poses significant challenges for MSPs tasked with securing these increasingly diverse and dynamic environments.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">For MSPs, managing this wide and varied attack surface for multiple clients becomes a huge and unrelenting task. A key challenge is visibility: Many MSPs grapple with incomplete knowledge of their clients\u2019 network resources. They may see a plethora of IP addresses, but understanding what each represents in terms of the device, software, and practices in use is a different ball game. The lack of a detailed and dynamic inventory often leads to gaps in security deployments, making the MSPs and their customers vulnerable to breaches.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">Why MSPs can\u2019t afford to ignore ASM<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">The role of ASM in an MSP\u2019s cybersecurity strategy cannot be overstated. By managing multiple client networks and systems, MSPs deal with diverse environments, each with their own set of assets and vulnerabilities. They are also under immense pressure to keep client data safe while ensuring smooth operations. This makes ASM not just important but essential.\u00a0<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">However, ASM is not just a matter of protecting customer data and preventing service disruptions, although these are certainly key goals. ASM has also become a fundamental aspect of doing business for MSPs.\u00a0<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">To begin with, ASM is integral to maintaining compliance with various industry regulations and standards, which often mandate maintaining an accurate inventory of network assets. Moreover, effective ASM goes beyond simply cataloging assets; it involves classifying these assets based on risk and documenting this information. This data is invaluable when a breach occurs, enabling the MSP to demonstrate due care and diligence during investigations and claims procedures, which is key for substantiating claims and increasing the likelihood of insurance payouts. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">In other words, prioritizing ASM as part of your security strategy can help with shielding against cyber threats as well as creating a safety net in case of a security incident.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">Managing the attack surface<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">To manage their attack surface and that of their customers, MSPs would greatly benefit from a robust strategy that includes:<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<ol>\n<li><span class=\"s1\"><strong>Asset identification:<\/strong> Understand what&#8217;s on the network. This involves identifying and cataloging network-connected devices, including IoT and personal devices under a BYOD policy.<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\"><strong>Risk evaluation:<\/strong> Once assets are identified, you need to assess the associated risks, prioritizing assets based on their vulnerability to threats and potential impact on the network.<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\"><strong>Vulnerability control:<\/strong> You then need to take action to secure these assets. This could involve anything from patching outdated software and tightening network access controls to establishing stringent security policies for IoT and BYOD devices.<\/span><\/li>\n<li class=\"p2\"><span class=\"s1\"><strong>Ongoing monitoring:<\/strong> This allows for timely identification of new assets and vulnerabilities, facilitating swift action and threat response.<\/span><\/li>\n<\/ol>\n<p class=\"p2\"><span class=\"s1\">To apply these best practices, you would also greatly benefit from a comprehensive security solution like <a href=\"https:\/\/www.n-able.com\/products\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\">N&#8209;able EDR<\/span><\/a>. Its advanced <a href=\"https:\/\/www.n-able.com\/products\/attack-surface-management\" target=\"_blank\" rel=\"noopener\">Attack Surface Management feature helps MSPs minimize the attack surface<\/a> by quickly identifying unknown and IoT devices, isolating suspicious devices from others on the network, and installing EDR on eligible devices that are not yet protected.\u00a0<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">In essence, Attack Surface Management helps brings shadow IT and unmanaged devices into the light and into compliance. Beyond visibility, Attack Surface Management provides valuable insights into device type and role, and how it communicates over the network, allowing MSPs to pinpoint anomalies that could signal potential threats. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">In the face of escalating cyber threats, evolving IoT, and BYOD policies, and increasing regulatory demands, ASM should be viewed as an essential part of an MSP\u2019s cybersecurity strategy. N&#8209;able EDR and its advanced Attack Surface Management feature offer a powerful solution, providing the visibility and control MSPs need to help safeguard their customers\u2019 environments, uphold compliance, and ensure they are ready to respond effectively in case of a breach.\u00a0<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">As the cyber landscape continues to evolve, tools like Attack Surface Management will remain essential for MSPs, helping them protect their customers and their reputation in\u00a0<\/span><span class=\"s1\">an increasingly interconnected world.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p4\"><em><span class=\"s1\">Emma Nistor is senior product marketing manager, N&#8209;able EDR<\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the growing number of devices attached to corporate networks, effective attack surface management is becoming critical for MSPs. Emma Nistor explains.<\/p>\n","protected":false},"author":90,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-48433","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Managing the Attack Surface: A Quick Guide for MSPs - N-able<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Managing the Attack Surface: A Quick Guide for MSPs - N-able\" \/>\n<meta property=\"og:description\" content=\"With the growing number of devices attached to corporate networks, effective attack surface management is becoming critical for MSPs. Emma Nistor explains.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-07T11:27:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-13T11:58:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/09\/230802_blogbanner_AttackSurfaceManagement.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Emma Nistor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Emma Nistor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps\"},\"author\":{\"name\":\"Emma Nistor\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\"},\"headline\":\"Managing the Attack Surface: A Quick Guide for MSPs\",\"datePublished\":\"2023-09-07T12:27:10+01:00\",\"dateModified\":\"2023-09-13T11:58:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps\"},\"wordCount\":855,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps\",\"name\":\"Managing the Attack Surface: A Quick Guide for MSPs - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2023-09-07T12:27:10+01:00\",\"dateModified\":\"2023-09-13T11:58:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Managing the Attack Surface: A Quick Guide for MSPs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58\",\"name\":\"Emma Nistor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g\",\"caption\":\"Emma Nistor\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Managing the Attack Surface: A Quick Guide for MSPs - N-able","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps","og_locale":"pt_BR","og_type":"article","og_title":"Managing the Attack Surface: A Quick Guide for MSPs - N-able","og_description":"With the growing number of devices attached to corporate networks, effective attack surface management is becoming critical for MSPs. Emma Nistor explains.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2023-09-07T11:27:10+00:00","article_modified_time":"2023-09-13T11:58:17+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2023\/09\/230802_blogbanner_AttackSurfaceManagement.jpg","type":"image\/jpeg"}],"author":"Emma Nistor","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Emma Nistor","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps"},"author":{"name":"Emma Nistor","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58"},"headline":"Managing the Attack Surface: A Quick Guide for MSPs","datePublished":"2023-09-07T12:27:10+01:00","dateModified":"2023-09-13T11:58:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps"},"wordCount":855,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps","url":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps","name":"Managing the Attack Surface: A Quick Guide for MSPs - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2023-09-07T12:27:10+01:00","dateModified":"2023-09-13T11:58:17+00:00","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/managing-the-attack-surface-a-quick-guide-for-msps#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Managing the Attack Surface: A Quick Guide for MSPs"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/51aa94f4241ebd0c9a56e23dfeac4b58","name":"Emma Nistor","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50bb0b00a871f69d96d97b4f5b418b5480933f9bf11aa206ca4ea1c8304f4227?s=96&d=mm&r=g","caption":"Emma Nistor"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/48433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/90"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=48433"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/48433\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=48433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}