{"id":8509,"date":"2017-07-31T03:00:40","date_gmt":"2017-07-31T11:00:40","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/07\/31\/news-2283\/"},"modified":"2017-07-31T03:00:40","modified_gmt":"2017-07-31T11:00:40","slug":"news-2283","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/07\/31\/news-2283\/","title":{"rendered":"Five Mistakes I Bet You Are Making with your Managed Services business"},"content":{"rendered":"<p><strong>Credit to Author: Ryan Delany| Date: Mon, 31 Jul 2017 12:00:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"275\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-768x703.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-1024x938.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-640x586.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-900x824.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-440x403.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-380x348.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup.jpg 1268w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>As a managed service provider, your customers have entrusted you to manage their IT infrastructure and their security so it\u2019s important that you are making the right choices to secure their environments and keep cyber criminals at bay. In my years of working with our Managed Service Provider partners, I\u2019ve seen a number of mistakes made by MSPs that I wanted to share with you in the hopes that you can avoid them and keep your customers safe.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>You believe that AV is <em>just<\/em> AV<\/p>\n<p>Let me start by sharing a story you\u2019re familiar with, and may have personally experienced like me, regarding the details of a now infamous credit card breach.<\/p>\n<p>In 2013 Target was the victim of a carefully planned and executed cyber attack that resulted in 110 million credit card credentials and other customer information getting stolen. I won\u2019t bore you with all the details, but the ensuing investigation revealed three interesting pieces of information I want to highlight:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>The crime was perpetrated through a third party HVAC contractor<\/li>\n<li>The HVAC contractor was the victim of a phishing attack<\/li>\n<li>The HVAC contracted was using a free AV product<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Cybercriminals have become increasingly more sophisticated in recent years which demands more feature-rich and intelligent security solutions backed by global threat feeds and big-data analysis capabilities. It\u2019s na\u00efve to think that AV vendors just sell AV products. The fact is, if any vendor just focused on anti-virus today, they would be out of business. AV vendors today have a broad set of techniques to protect against old and new threats like ransomware, malware, bots, rootkits, viruses, spyware, etc. Don\u2019t fall in to the trap of thinking legavy vendors aren\u2019t constantly innovating and developing new protection techniques like machine learning to combat new types of threats beyond just AV.<\/p>\n<p><strong>You\u2019re letting the customer dictate which security solution to use<\/strong><\/p>\n<p>Most, if not all of you, probably have a diverse set of customers you work with including doctors, lawyers, accountants, pet stores, dentists, coffee shops, and so on. These customers are likely very good at their respective professions, they aren\u2019t experts in security though. That\u2019s where you come in. Your customers trust and rely on your expertise to keep them secure so they can focus on doing what they do best, whatever that may be.<\/p>\n<p>Often times the customer may already own a security solution or let you know which solution they would prefer. By letting your customers choose their own vendor, not only will you incur additional costs by having to support and train your technicians on many different products, but you also create a dangerously inconsistent security posture across your customer base. You wouldn&#8217;t tell your dentist which tools to use for a root canal, so why would you let your customers tell you which security solution you should be using to protect their environment?<\/p>\n<p><strong>Don\u2019t pick a security solution based solely on price<\/strong><\/p>\n<p>I took a marketing class in college and while I don\u2019t remember much about that class specifically, one case study stuck with me throughout my career. It was about a company that made smoke detectors. Smoke detectors aren\u2019t terribly exciting, but we all have them, we are all familiar with what they do and we understand their importance in keeping us and our families safe and secure in the event of a fire. The short version of the case study was that the company decided that in order to increase sales, they would lower the price of their smoke detectors. If you have even a basic knowledge of supply and demand, you would expect a decrease in price to result in an increase in sales. Strangely, that wasn\u2019t what happened &#8211; sales actually decreased. When all was said and done, it turns out that when it comes to personal safety and protecting your family, people perceived a lower priced smoke detector to be of lower quality which wasn\u2019t a risk people were willing to take. In other words, people were willing to pay a premium to protect what they perceived as valuable. In this case it was themselves and their families, in your customers\u2019 case it\u2019s their data, intellectual property and business assets.<\/p>\n<p>When the security you\u2019re offering your customers is chosen based on price not only are you putting your customers at risk due to reduced feature sets, but you may also be incurring costs that aren\u2019t factored in to the price of the product such as having to purchase bulk licenses up-front, committing to terms that may not align with your business model, spending money on additional products to supplement missing features, and any costs associated with having to handle renewals, such as tracking expiration dates, co-terming licenses, chasing down missed renewals, etc.<\/p>\n<p><strong>You\u2019re not leveraging the cloud.<\/strong><\/p>\n<p>Many of you have likely been in business for a long time with established customers and processes in place. One of which is probably renewing and managing legacy on-premise security products for your customers because they either \u201cjust work\u201d or you\u2019d rather not incur the costs of migrating your clients to a cloud-based equivalent, which is likely a non-billable activity. It\u2019s easy to overlook the hidden costs of on-premise security solutions, such as patching and upgrading, as well as difficult to justify the cost of out-of-date remote or roaming employee machines increasing the risk of infection and burdening your bottom line.<\/p>\n<p>Many MSPs I talk to view SaaS and cloud applications as a threat to their legacy, and out-of-date, business model that was heavily dependent on hardware margins and setting up and maintaining servers.\u00a0 The reality is, while SaaS eliminates hardware and server maintenance, there\u2019s still value in providing your expertise, setup, configuration, and management skills to customers utilizing SaaS applications.<\/p>\n<p><strong>You\u2019re missing out on these opportunities.<\/strong><\/p>\n<p>Customers and their employees have never had it easier to do their jobs. With a plethora of smartphones and mobile devices to choose from and an ever-increasing number of SaaS applications like Office365, workers can do their jobs anytime, anywhere and on any device. Of course, these devices and SaaS applications are often neglected from a security perspective either out of stubbornness, ignorance or oversight.<\/p>\n<p>Some interesting data points to share about these often neglected platforms:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>According to the Trend Micro <a href=\"https:\/\/documents.trendmicro.com\/assets\/rpt\/rpt-2016-annual-security-roundup-a-record-year-for-enterprise-threats.pdf\">TrendLabs 2016 Security Roundup<\/a>, there was a 206% increase in Android threats in 2016<\/li>\n<li>A 2016 Ponemon Institute study found that<a href=\"http:\/\/www.darkreading.com\/endpoint\/new-study-shows-mobile-devices-the-cause-of-some-data-breaches\/d\/d-id\/1324415\">67 percent of surveyed IT security professionals<\/a>\u00a0said it was certain or likely that a breach had occurred as a result of mobile device use.<\/li>\n<li>Macs are not immune from ransomware, as evidenced in the popular app, Transmission, <a href=\"http:\/\/blog.trendmicro.com\/ransomware-is-a-growing-risk-on-macs\/\">being compromised and used to deliver ransomware to Mac users<\/a><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As a managed service provider, you should be educating your customers about the need to protect these platforms and it\u2019s an opportunity to build additional recurring revenue streams for your business.<strong>\u00a0<\/strong><\/p>\n<p>The good news is whether you are making one or all of these mistakes, it&#8217;s not too late to turn things around. Here&#8217;s a short-list of things you should consider when choosing a security vendor to partner with for your managed services business:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Does the vendor offer a comprehensive, full-featured security solution using the latest protection techniques like machine learning to protect against Ransomware and other threats and not just a bare-bones AV product?<\/li>\n<li>Does the company offer an MSP program and solution that allows you to standardize and centrally manage security across your entire customer base from a single web-based management console?<\/li>\n<li>Does the company offer a cloud-managed security solution, freeing you from day-to-day maintenance of your customer\u2019s security infrastructure?<\/li>\n<li>Does the company offer a security solution that works on more than just Windows PCs such as Mac, Android, and iOS?<\/li>\n<li>Does the company offer a security solution that integrates with popular SaaS applications like Office365, Sharepoint Online, OneDrive, Dropbox, Box, and Google Drive?<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Are you making any of these mistakes? If so, it might be time to make the best switch for you and your customers.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/five-mistakes-bet-making-managed-services-business\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Ryan Delany| Date: Mon, 31 Jul 2017 12:00:23 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"275\" src=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-300x275.jpg 300w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-768x703.jpg 768w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-1024x938.jpg 1024w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-640x586.jpg 640w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-900x824.jpg 900w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-440x403.jpg 440w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup-380x348.jpg 380w, http:\/\/blog.trendmicro.com\/wp-content\/uploads\/2017\/02\/roundup.jpg 1268w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>As a managed service provider, your customers have entrusted you to manage their IT infrastructure and their security so it\u2019s important that you are making the right choices to secure their environments and keep cyber criminals at bay. In my years of working with our Managed Service Provider partners, I\u2019ve seen a number of mistakes&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[1001,714],"class_list":["post-8509","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-business","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=8509"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/8509\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=8509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=8509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=8509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}