{"id":1338,"date":"2020-10-24T22:41:00","date_gmt":"2020-10-24T22:41:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/the-msps-guide-to-a-building-a-security-stack\/"},"modified":"2023-05-17T15:15:11","modified_gmt":"2023-05-17T15:15:11","slug":"the-msps-guide-to-a-building-a-security-stack","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/","title":{"rendered":"The MSP\u2019s Guide to Building a Security Stack"},"content":{"rendered":"<p>Learn how to build a tech stack that fully protects your clients.<\/p>\n<p>The Internet is a lot like a comic book universe. Cybercriminals are the never-ending group of villains attempting to steal money or identities, or even take over the world. In fact, two-thirds of small or medium sized businesses have suffered cyberattacks in the past year. Plus, each attack can cost a company <a href=\"https:\/\/start.keeper.io\/2018-ponemon-report\" target=\"_blank\" rel=\"noopener noreferrer\">$3 million<\/a>! You, the MSP, are the superhero, constantly needing to change up your tactics to defend the good citizens of the digital world. So, let&#8217;s talk about how to build a top-notch security stack.<\/p>\n<h2>Suiting Up the MSP<\/h2>\n<p>Smart superheroes make sure they\u2019re dressed appropriately for the job. Some wear bulletproof suits, while others carry magical devices that transform into weapons and shields. As MSPs, your stab-resistant costume is made from the solutions you use to protect your company. This in turn protects your downstream clients.<\/p>\n<p>If you\u2019re using a remote monitoring and management (RMM) tool, it\u2019s easy for attackers to gain access to all your clients all at once. Always follow the same advice you give your clients so that everyone is protected.<\/p>\n<h2>Ever-Evolving Attacks<\/h2>\n<p>One thing\u00a0cybercriminals (and villains)\u00a0are\u00a0not\u00a0is unimaginative.\u00a0Their methods evolve\u00a0as we\u00a0change how we use the Internet. For example,\u00a0<a href=\"https:\/\/security.berkeley.edu\/education-awareness\/best-practices-how-tos\/system-application-security\/how-protect-against-sql\" target=\"_blank\" rel=\"noreferrer noopener\">SQL injection<\/a> is one of the oldest ways to get access to people\u2019s accounts.\u00a0An\u00a0&#8220;oldie but goodie,&#8221;\u00a0if you will.\u00a0It\u2019s still used, but websites now\u00a0<a class=\"Hyperlink SCXW230547409 BCX0\" href=\"https:\/\/www.netsparker.com\/blog\/web-security\/sql-injection-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\">sanitize user input<\/a> to protect against these attacks.<\/p>\n<p>Ransomware, on the other hand, was rarer in the past because there was no easy way to send money over the Internet. Not so today! Even phishing attacks and social engineering techniques have gotten more sophisticated over time. To make their phishing emails more believable, all cybercriminals had to do was fix grammar mistakes and reword awkward phrasing.<\/p>\n<p>Here are some popular attacks to be on the lookout for:<\/p>\n<ul>\n<li>Ransomware<\/li>\n<li>Phishing<\/li>\n<li>Eavesdropping attacks<\/li>\n<li>Spyware<\/li>\n<li>Trojan horses<\/li>\n<li>Password attacks<\/li>\n<li>DDoS attacks<\/li>\n<li>Malware, worms, and viruses<\/li>\n<\/ul>\n<h2>The Cybersecurity Framework<\/h2>\n<p>According to the National Institute of Standards and Technology (NIST), comprehensive protection means addressing the following five\u00a0<a href=\"https:\/\/www.pax8.com\/en-us\/explore\/nist-cybersecurity-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\">functions<\/a> of cybersecurity management:<\/p>\n<p><strong>Identify:<\/strong> A big picture of the weak and strong points within an organization can help identify and prioritize critical areas. You\u2019ll want to advise your clients to protect these areas first.<\/p>\n<p><strong>Protect:<\/strong> There should be multiple layers of protection and safeguards. Cyberattacks don\u2019t just come in at one angle or in predictable ways.<\/p>\n<p><strong>Detect:<\/strong> Knowing when the attack is happening allows you to react quickly and effectively. Some superheroes have superhuman senses to detect what\u2019s out there, MSPs have sophisticated applications.<\/p>\n<p><strong>Respond:<\/strong> Heroes never start a fight, but they will finish them. For example, a client receives a phishing email, but thanks to your continuous training programs, they respond by deleting it. No need to break a sweat!<\/p>\n<p><strong>Recover:<\/strong> After an alien invasion or just some humanoid mutant wreaking havoc all over town, superheroes help with the rebuild. Backing up data so that your client can recover quickly from cyberattacks is key to saving money, time, and sanity.<\/p>\n<h2>It\u2019s All About the Action<\/h2>\n<p>There are eight layers of cybersecurity approaches that will, when put into action, fully drape the cape of invincibility (more or less) over your and your clients\u2019 systems. These multi-layered, proactive defenses free up more time for you to focus on things such as growing your business, providing good customer service, and learning about new tools entering the market.<\/p>\n<h3>Identity Protection and Access Management<\/h3>\n<p><a href=\"https:\/\/www.pax8.com\/vendors\/solarwinds-passportal\" target=\"_blank\" rel=\"noreferrer noopener\">Protecting accounts<\/a>\u00a0and determining who can access which\u00a0sites are crucial first steps\u00a0to building\u00a0comprehensive security\u00a0systems.\u00a0There aren\u2019t many one-size-fits-all security measures, but multi-factor authentication (MFA)\u00a0comes pretty close.<\/p>\n<p>Ninety-nine percent of account hacks are blocked when MFA is turned on. Pair this with strong passwords, and you\u2019ve taken a big leap in protecting data and other sensitive information. And to make sure that your clients are still productive and not spending all their time logging into accounts, suggest that they combine single sign-on (SSO) with MFA, apply conditional access (CA) rules, and help reduce &#8220;password fatigue&#8221; with a password management tool.<\/p>\n<h3>Endpoint Security<\/h3>\n<p>Protecting servers, computers, and devices closes off another door for cybercriminals and other unwanted attacks. Today\u2019s Endpoint Detection and Response (EDR) solutions have evolved since the early days of installing anti-virus software. Threats are detected and stopped as they come in. With 70% of attacks coming in at the endpoint, protecting these devices provides users with another layer of protection.<\/p>\n<h3>Email Security<\/h3>\n<p>Aside from cracking passwords and access devices, email is another easy access point for cybercriminals. And unlike devices, there\u2019s a human element to email that makes it particularly vulnerable to phishing attacks. You might not be able to trick a computer, but it\u2019s pretty easy to dupe an unsuspecting user into clicking a link from the &#8220;IRS.&#8221;<\/p>\n<p>Aside from cracking passwords and access devices, email is another easy access point for cybercriminals. And unlike devices, there\u2019s a human element to email that makes it particularly vulnerable to phishing attacks. You might not be able to trick a computer, but it\u2019s pretty easy to dupe an unsuspecting user into clicking a link from the &#8220;IRS.&#8221;<\/p>\n<p>Not all email software comes with layered protection, so it\u2019s important that you provide yourself and your clients with third\u2013party solutions that include:<\/p>\n<ul>\n<li>Advanced phishing identification and protection<\/li>\n<li>URL scanning and attachment defense<\/li>\n<li>Data loss protection<\/li>\n<li>Compliant email retention and archiving<\/li>\n<li>Policy-enforced encryption<\/li>\n<li>Spam and content filtering<\/li>\n<li>Anti-virus and zero-hour threat protection<\/li>\n<\/ul>\n<h3>Data Protection<\/h3>\n<p>A company has many parts, but at the core, companies are their data. You might have clients in healthcare that need to protect patient information and comply with HIPAA regulations. Or perhaps your clients sit on a trove of banking information. Whatever the industry, securing data isn\u2019t just a cybersecurity issue, it\u2019s a way to avoid lawsuits and fines.<\/p>\n<h3>Web and Network Security<\/h3>\n<p>In 2018, about half of SMBs experienced web-based attacks. These can come from not having a secure network or having poor web security. One of the easiest things to do in an office is to set up a firewall that filters URLs, prevents data loss, and detects and stops anyone trying to get in. A guest Wi-Fi network is another great way to keep unauthorized users from sharing a network with company employees.<\/p>\n<p>Web security also prevents your clients from getting into trouble while they are surfing the web at work. Block not-suitable-for-work and malicious websites; some SMBs may even want you to restrict access to streaming services to preserve bandwidth. Not only are you keeping your clients safe, you\u2019re also helping them increase productivity!<\/p>\n<h3>End User Training<\/h3>\n<p>Some superheroes might have gotten their super-strength from a radioactive something or other, but many work and train hard every day to keep up that chiseled physique. The same can be said for a company\u2019s cybersecurity. You can implement the best defense software, but no one can stop that one employee from opening a phishing email and downloading its contents.<\/p>\n<p>Ongoing micro\u2013training sessions and phishing simulation training will help keep everyone on guard. Think of these trainings as short but intense sessions at the gym for both your employees and your clients.<\/p>\n<h3>Mobile Security<\/h3>\n<p>It\u2019s one thing to show up just in time to stop a villain. It\u2019s another to be everywhere, all the time. Unless your superpowers involve time manipulation, you\u2019ll need to give your clients their own tools to manage work-from-home employees.<\/p>\n<p>Outside of the company\u2019s firewall, everyone is more vulnerable to attacks. Solutions such as device management, mobile application management, and content management provide an added layer of security to remote and mobile endpoints.<\/p>\n<h3>Disaster Recovery, Backup, and Incident Response Plan<\/h3>\n<p>Sometimes, despite all your efforts, a client reaches out and says that the worst has happened. They\u2019ve lost large amounts of data, their systems are down, and who knows how much time and money has already been lost. Fortunately, they hired you.<\/p>\n<p>You\u2019re someone who understands multi-layered security. You\u2019re also someone who had the foresight and prepared for the worst and created a disaster recovery plan. Not only did you identify some of the main threats to your client\u2019s company, you also figured out all the nitty gritty details of getting them back up online quickly.<\/p>\n<h2>The Trusty Sidekick<\/h2>\n<p>Creating a comprehensive security system for your clients is a lot of work, but you don\u2019t have to worry about tackling it alone. Every superhero needs a reliable sidekick, right?<\/p>\n<p>Pax8 is here to help you identify gaps in client systems, deploy any cloud security solutions they need, and combat cyberthreats together. You can start out by taking a look at our MSP\u2019s Guide to a Multi-Layered Security Approach or go ahead and schedule a call with our team to get started!<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to build a tech stack that fully protects your clients. The Internet is a lot like a comic book universe. Cybercriminals are the never-ending group of villains attempting to steal money or identities, or even take over the world. In fact, two-thirds of small or medium sized businesses have suffered cyberattacks in the [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":38,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-1338","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The MSP\u2019s Guide to Building a Security Stack - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"This guide provides tips and advice for MSPs looking to build a multilayer, comprehensive security stack for their clients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The MSP\u2019s Guide to Building a Security Stack - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"This guide provides tips and advice for MSPs looking to build a multilayer, comprehensive security stack for their clients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-24T22:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T15:15:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"The MSP\u2019s Guide to Building a Security Stack\",\"datePublished\":\"2020-10-24T22:41:00+00:00\",\"dateModified\":\"2023-05-17T15:15:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/\"},\"wordCount\":1508,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png\",\"articleSection\":[\"MSPs\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/\",\"name\":\"The MSP\u2019s Guide to Building a Security Stack - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png\",\"datePublished\":\"2020-10-24T22:41:00+00:00\",\"dateModified\":\"2023-05-17T15:15:11+00:00\",\"description\":\"This guide provides tips and advice for MSPs looking to build a multilayer, comprehensive security stack for their clients.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png\",\"width\":600,\"height\":315,\"caption\":\"MSP security vendors\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/the-msps-guide-to-a-building-a-security-stack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The MSP\u2019s Guide to Building a Security Stack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The MSP\u2019s Guide to Building a Security Stack - Pax8 Blog","description":"This guide provides tips and advice for MSPs looking to build a multilayer, comprehensive security stack for their clients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/","og_locale":"en_US","og_type":"article","og_title":"The MSP\u2019s Guide to Building a Security Stack - Pax8 Blog","og_description":"This guide provides tips and advice for MSPs looking to build a multilayer, comprehensive security stack for their clients.","og_url":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/","og_site_name":"Pax8 Blog","article_published_time":"2020-10-24T22:41:00+00:00","article_modified_time":"2023-05-17T15:15:11+00:00","og_image":[{"width":600,"height":315,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"The MSP\u2019s Guide to Building a Security Stack","datePublished":"2020-10-24T22:41:00+00:00","dateModified":"2023-05-17T15:15:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/"},"wordCount":1508,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png","articleSection":["MSPs","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/","url":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/","name":"The MSP\u2019s Guide to Building a Security Stack - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png","datePublished":"2020-10-24T22:41:00+00:00","dateModified":"2023-05-17T15:15:11+00:00","description":"This guide provides tips and advice for MSPs looking to build a multilayer, comprehensive security stack for their clients.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/The-MSPs-Guide-to-a-Comprehensive-Security-Stack.png","width":600,"height":315,"caption":"MSP security vendors"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/the-msps-guide-to-a-building-a-security-stack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The MSP\u2019s Guide to Building a Security Stack"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1338","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1338"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1338\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/38"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1338"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1338"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1338"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}