{"id":31557,"date":"2019-04-23T03:10:28","date_gmt":"2019-04-23T07:10:28","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31557"},"modified":"2019-04-23T03:10:28","modified_gmt":"2019-04-23T07:10:28","slug":"ransomware-and-msp-lockout","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/04\/23\/ransomware-and-msp-lockout\/","title":{"rendered":"Ransomware and MSP Lockout"},"content":{"rendered":"\n<p> <br>Written by Barracuda MSP Guest Blogger  &#8211; As a managed services provider (<strong>MSP<\/strong>), you want to ensure that your clients\u2019 networks, servers, data, and applications remain secure. You don\u2019t want to overlook any gaps in their cybersecurity defenses that could leave them vulnerable to a data breach or other type of attack. <\/p>\n\n\n\n<p>To that end, <strong>MSP<\/strong>s need to ensure that their own systems and applications aren\u2019t creating vulnerabilities. We know that groups of cybercriminals are now specifically targeting <strong>MSP<\/strong>s: The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings to <strong>MSP<\/strong>s about these attacks and conducted additional briefings in February about malicious activity in China that targeted <strong>MSP<\/strong>s.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/04\/network-2402637__340-1-1.jpg\" alt=\"\" class=\"wp-image-31559\" width=\"324\" height=\"178\"\/><\/figure><\/div>\n\n\n\n<p>Last year, an <strong>MSP<\/strong> in California was locked out of its systems by a <strong>ransomware<\/strong> attack and was forced to shut down its network. In turn, the company\u2019s clients lost access to their email and databases. What could be worse?<\/p>\n\n\n\n<p>Well, an <strong>MSP<\/strong> could fail to patch a remote monitoring and management (RMM) system, enabling a <strong>ransomware<\/strong> attack that encrypts all of its customers\u2019 endpoint systems. According to several reports, that\u2019s what happened to a U.S.-based <strong>MSP<\/strong> in February. An RMM vulnerability resulted in approximately 2,000 client systems being crypto locked, and the attacker made a $2.6 million ransom demand to the <strong>MSP<\/strong>.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.channelfutures.com\/from-the-industry\/ransomware-and-msp-lockout&amp;ct=ga&amp;cd=CAEY0QEqFDE0MTA4MjA2NTI5ODE3OTY3NTEzMhpmOTVkN2Q1Nzc1OTJkZTIxOmNvbTplbjpVUw&amp;usg=AFQjCNGZhrthC-Esxcgx_i5m6-1DmhC97Q\">Read more:<\/a><\/p>\n\n\n\n<p>RB Note:  Are you protected?  Check with your <strong>MSP <\/strong>today.  @Stratix_Systems can provide an assessment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Written by Barracuda MSP Guest Blogger &#8211; As a managed services provider (MSP), you want to ensure that your clients\u2019 networks, servers, data, and applications remain secure. You don\u2019t want to overlook any gaps in their cybersecurity defenses that could <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/04\/23\/ransomware-and-msp-lockout\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[67,636],"tags":[319,637],"class_list":["post-31557","post","type-post","status-publish","format-standard","hentry","category-msp","category-ransomware","tag-msp","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31557"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31557\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}