SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • High-Security Wedge Barriers By Delta Scientific
    • SCD Wins Major Contract For HD MWIR Detectors
    • ASSA ABLOY And Honeywell Discuss Security Innovation
    • VIVOTEK's Role In Ecological Restoration & Safety
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Impact Of Cybersecurity Order On MSPs & MSSPs

18 Nov 2024

Impact Of Cybersecurity Order On MSPs & MSSPs
Contact company
Contact SaaS Alerts
icon Add as a preferred source Download PDF version

In May, the Whitehouse issued an Executive Order on improving the Nation’s cybersecurity, which laid the groundwork for the nation’s response to the latest security breaches and sought to address the persistent and increasingly sophisticated malicious cyber campaigns threatening the public sector, the private sector, and ultimately the American people.

The order is aimed at improving the Government’s efforts to identify, deter, protect against, detect, and respond to these actions and actors. Last month, an additional memorandum was released.

The July Memorandum

The July Memorandum focused on protecting the Nation’s critical infrastructure from ransomware

The July Memorandum, known as the National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems focused further on protecting the Nation’s critical infrastructure from ransomware and other attacks.

So how will this order, currently directed at Federal Agencies and those IT and OT service providers who contract with the Federal Government impact the Managed Service Providers and Managed Security Service Providers serving the private sector in the weeks and months to come?

The May Executive Order

The May Executive Order mandates several requirements including that government agencies and departments make bold changes and significant investments in zero-trust architecture, software standards and more. While the memorandum from July sets standards for technology and systems used by private companies in food, energy, power and water.

While the trickle-down impact of this order could take some time to directly impact those providers serving the private sector and non-critical infrastructure (food, energy, power and water) customers, the order set the framework for encouraging the private sector to adopt similar measures – and experts caution that it’s only a matter of time before MSPs and MSSPs will be required to comply.

Impact to MSPs with regards to Cloud App Security

The May order states that the Federal Government must modernize its cybersecurity, including by increasing the Federal Government’s visibility into threats and must adopt security best practices; advance toward Zero Trust Architecture and accelerate movement to secure cloud services, including Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS), while centralizing and streamlining access to cybersecurity data to drive analytics for identifying and managing cybersecurity risks; and invest in both technology and personnel to match these modernization goals.

CISA (The Cybersecurity & Infrastructure Agency)

CISA asserts Alert (AA20-245A) that highlights technical approaches to uncovering malicious activity

CISA (The Cybersecurity & Infrastructure Agency, which is part of the Department of Homeland Security) asserts Alert (AA20-245A) that highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices.

These are the steps which MSPs should be taking now to both protect their customers and to prepare for future mandates.

Specifically, this Advisory furthers the recommendations covered in the President’s Executive Order on Improving the Nation’s cybersecurity regarding monitoring operations and alerts and responding to attempted and actual cyber incidents and employing automated tools, or comparable processes, that check for known and potential vulnerabilities and remediate them, which shall operate regularly, or at a minimum prior to product, version, or update release.

What does this mean?

It means that IT departments and IT Service Providers should be monitoring all applications, tools and devices that touch their operation to prevent or mitigate exposures.

Further, The Cybersecurity and Infrastructure Security Agency (CISA) released insights on Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses, which details specific actions that every MSP should be taking.

CISA recommends the following mitigations and hardening guidance:

  • Apply the principle of least privilege to customer environments.
  • Ensure that log information is preserved, aggregated, and correlated to maximize detection capabilities.
  • Implement robust network- and host-based monitoring solutions.
  • Work with customers to ensure hosted infrastructure is monitored and maintained.
  • Manage customer data backups.

Why is the Government making these recommendations?

In many cases, IT professionals are properly securing traditional IT assets, like local networks

As Cloud and SaaS Application usage continue to dominate today’s IT landscape, it’s important that the user behavior associated with these popular applications be tracked and monitored.

In many cases, IT professionals are properly securing traditional IT assets, like local networks, devices and servers, but are not yet keeping up with user behavior and configurations with the most widely used SaaS applications.

Top motivators for Cloud and SaaS app adoption, such as the ability to increase productivity and reduce costs is increasingly driving businesses to seek attractive alternatives to on-premise solutions.

Enterprises increase use of Cloud and SaaS applications

Moreover, the global pandemic has dramatically shifted how people work and as a result, organizations have scaled up their use of Cloud and SaaS applications to support collaboration and productivity from home.

This shift in the landscape has created a breeding ground for hackers and bad actors who will undoubtedly use the opportunity to cripple businesses, both large and small.

SaaS Alerts releases its inaugural SASI report

SaaS Alerts recently released its inaugural SASI (SaaS Application Security Insights) report in June

In addition to the governmental recommendations, SaaS Alerts recently released its inaugural SASI (SaaS Application Security Insights) report in June, which shares additional recommendations in light of the growing threats:

One recommendation for any technology professional is to monitor as many SaaS applications as possible, in order to provide a full scope of security gaps and visibility of user behavior via cross correlation.

Monitor file-sharing activity within SaaS applications

It’s highly recommended that companies monitor file-sharing activity within SaaS applications and work with end users to ensure they terminate ‘old’ share links, in order to maintain proper security hygiene and mitigate risk.

Security policy changes providing individuals additional access or privileges is also critical to remediate. If a bad actor gains access to any environment, most will change security policies to give themselves a free pass to run wild within the application.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Application security
  • Commercial security
  • Public sector security
  • Security policy
  • Security cameras
  • Network cameras
  • IP Surveillance
  • IP security solutions
  • Cyber security
  • Corporate Security
  • Data Security
  • Cloud security
  • COVID-19
  • Related links
  • Indoor IP Dome cameras
  • Outdoor IP Dome cameras
  • Megapixel IP cameras
  • Indoor/Outdoor IP Dome cameras
  • Network IP cameras
  • PTZ IP cameras
  • Related categories
  • IP cameras
  • IP Dome cameras
Related white papers
Milestone Cloud Deployment Guide

Milestone Cloud Deployment Guide

Download
Maximizing Enterprise Security Systems In The Cloud

Maximizing Enterprise Security Systems In The Cloud

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

DigiCert's 2026 Security Predictions: AI & Quantum

DigiCert's 2026 Security Predictions: AI & Quantum

Zimperium's ClayRat Spyware: New Android Threats

Zimperium's ClayRat Spyware: New Android Threats

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Corporate news
About this page

Discover the impact of cybersecurity regulations on Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) with insights into compliance and security best practices.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec