{"id":6056,"date":"2019-08-23T23:13:09","date_gmt":"2019-08-23T22:13:09","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6056"},"modified":"2021-04-13T16:19:05","modified_gmt":"2021-04-13T15:19:05","slug":"msps-how-are-you-securing-your-login","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login","title":{"rendered":"MSPs, How Are You Securing Your Login?"},"content":{"rendered":"<p>As a managed services provider (MSP), it is crucial to assess the way you are managing both your client&#8217;s credentials and privileged information and your own.\u00a0MSP security is client security. With that said, are you comfortable telling your clients how you store and manage access to their network systems? Here are four quick tips to help you enforce security within your own MSP.<\/p>\n<h3><b>TIP 1: Password access control and automation<\/b><\/h3>\n<p>MSPs, are you ready to take a second look at your security service offering? After\u00a0<a class=\"ext\" href=\"https:\/\/www.msspalert.com\/cybersecurity-markets\/americas\/justice-department-msp-hackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">coverage<\/a>\u00a0of the US Justice Department preparing charges against hackers targeting MSPs and RMMs, it begs the question, &#8220;Why wait?&#8221; Threats exist for the MSP from external and internal sources, and it\u2019s time you learn about them. Whether it is an external hacker or rogue employee, exfiltration can happen in a number of ways.<\/p>\n<p>Access management\u00a0is vital for prevention. Implement\u00a0a\u00a0system\u00a0that centralizes your client&#8217;s sensitive information and\u00a0manages all user permissions on a granular level. Having one secure hub\u00a0that allows for auditing capabilities and provides visibility into who has access to what. It also allows you to track down and eradicate default passwords.<\/p>\n<h3><b>TIP 2: Multifactor authentication (MFA)<\/b><\/h3>\n<p>Implementing multifactor authentication (MFA) will help prevent unauthorized access to your network system accounts. Strong authentication is needed for MSPs who scale and build their businesses on reducing risk for their clients. An MFA solution is now an essential part of a complete managed services offering. This\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/blog\/four-key-benefits-of-multi-factor-authentication-for-msps\" target=\"_blank\" rel=\"noopener noreferrer\">blog from SolarWinds Passportal<\/a>\u00a0highlights some of the\u00a0benefits\u00a0MSPs get when they leverage a powerful multifactor authentication solution.<\/p>\n<h3><b>TIP 3: Privileged knowledge management<\/b><\/h3>\n<p>By controlling permissions and standardizing the client documentation process\u00a0within a single,\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/msp-documentation\" target=\"_blank\" rel=\"noopener noreferrer\">centralized console<\/a>, technicians can leverage security and automation\u00a0to rapidly access the client knowledge they need to provide effective support.\u00a0This, in turn, improves client satisfaction, makes services more profitable, and helps you comply with any necessary data regulation set upon your MSP. Regardless of technician turnover, your team will be able to maintain consistent service delivery for your client base at any given time.<\/p>\n<h3><b>TIP 4:\u00a0Monitor activity with advanced auditing<\/b><\/h3>\n<p>Client data is the most valuable and vulnerable\u00a0asset an MSP maintains, and your team has unencumbered access to it all. As a result, your clients deserve and need to know how their\u00a0information is being handled. Leveraging an advanced knowledge\u00a0<a class=\"ext\" href=\"https:\/\/www.passportalmsp.com\/ocular\" target=\"_blank\" rel=\"noopener noreferrer\">auditing<\/a>\u00a0tool can help you move beyond the guessing of &#8220;what happened when,&#8221;\u00a0and\u00a0unlock the necessary\u00a0insights into\u00a0usage and activity within your own MSP. Effectively, you can monitor your MSP just as you do for your clients.<\/p>\n<p>It\u2019s important to put as much into protecting your own systems as those of your clients and these four tips will help ensure you can safely have that conversation with your customer.<\/p>\n<p><a class=\"ext\" href=\"https:\/\/www.passportal.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Click here<\/b><\/a><b>\u00a0to find out more about how SolarWinds Passportal can help you secure your systems.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><em>Colin Knox is director of product strategy, SolarWinds Passportal<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you\u2019re managing your customers\u2019 security, you need to be able to answer questions about your own. Colin Knox offers four tips to help you ensure you\u2019re monitoring and enforcing&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6056","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>MSPs, How Are You Securing Your Login? - N-able<\/title>\n<meta name=\"description\" content=\"If you\u2019re managing your customers\u2019 security, you need to be able to answer questions about your own. Colin Knox offers four tips to help you ensure you\u2019re monitoring and enforcing your own security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MSPs, How Are You Securing Your Login? - N-able\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re managing your customers\u2019 security, you need to be able to answer questions about your own. Colin Knox offers four tips to help you ensure you\u2019re monitoring and enforcing your own security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-23T22:13:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-13T15:19:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"MSPs, How Are You Securing Your Login?\",\"datePublished\":\"2019-08-23T23:13:09+01:00\",\"dateModified\":\"2021-04-13T15:19:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login\",\"name\":\"MSPs, How Are You Securing Your Login? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2019-08-23T23:13:09+01:00\",\"dateModified\":\"2021-04-13T15:19:05+00:00\",\"description\":\"If you\u2019re managing your customers\u2019 security, you need to be able to answer questions about your own. Colin Knox offers four tips to help you ensure you\u2019re monitoring and enforcing your own security.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MSPs, How Are You Securing Your Login?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"MSPs, How Are You Securing Your Login? - N-able","description":"If you\u2019re managing your customers\u2019 security, you need to be able to answer questions about your own. Colin Knox offers four tips to help you ensure you\u2019re monitoring and enforcing your own security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login","og_locale":"pt_BR","og_type":"article","og_title":"MSPs, How Are You Securing Your Login? - N-able","og_description":"If you\u2019re managing your customers\u2019 security, you need to be able to answer questions about your own. Colin Knox offers four tips to help you ensure you\u2019re monitoring and enforcing your own security.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-08-23T22:13:09+00:00","article_modified_time":"2021-04-13T15:19:05+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"MSPs, How Are You Securing Your Login?","datePublished":"2019-08-23T23:13:09+01:00","dateModified":"2021-04-13T15:19:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login"},"wordCount":498,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login","url":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login","name":"MSPs, How Are You Securing Your Login? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2019-08-23T23:13:09+01:00","dateModified":"2021-04-13T15:19:05+00:00","description":"If you\u2019re managing your customers\u2019 security, you need to be able to answer questions about your own. Colin Knox offers four tips to help you ensure you\u2019re monitoring and enforcing your own security.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/msps-how-are-you-securing-your-login#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"MSPs, How Are You Securing Your Login?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=6056"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/6056\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=6056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}