Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs - Tubblog: The Hub for MSPs

Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs

Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs image

Selling cybersecurity solutions is all about understanding the risk to your client’s business.

In this webinar from security experts Huntress, they explored the threat landscape facing small and medium-sized businesses (SMBs) today. Then, they explored the ways managed service providers (MSPs) can bolster their tech stacks without breaking the bank or overloading your engineers.

Andrew Meier of Huntress covered the topics with Morgan Aspinall, Product Manager for Halo PSA, and Harry Boyne from UK MSP Chalkline Solutions.

Divider

Introduction

When it comes to packaging and selling cybersecurity, it’s important to be aware of the multitude of threats facing the small and medium-sized (SMB) market today.

Hackers today operate as businesses, and they can do so on a much larger scale than most MSPs, or their clients. Furthermore, artificial intelligence (AI) has opened up opportunities for us as technology providers, but it’s also done the same for threat actors.

So, when it comes to educating our customers, how can we demonstrate the need for good cybersecurity practices? And when we do so, how can we carry this out so that it’s not intrusive or expensive for them?

We should ask ourselves, what happens if they object or refuse to comply? Are they worth the risk to our reputation, or should we cut them loose?

And how can we utilise our professional services automation (PSA) tool or ticketing system to keep on top of alerts?

Speakers:Selling Cybersecurity Solutions

Andrew Meier, Sales Engineer, Huntress

Morgan Aspinall, Product Manager, Halo PSA

Harry Boyne, Co-Founder & Technical Director, Chalkline Solutions

 

 

 

Breakthrough Ways Of Selling Cybersecurity Solutions To SMBsDivider

Hacking as a Business

Cybercrime is rapidly growing as a business.

According to the 2023 IC3 Report, over the last five years:

  • 3.26 million complaints (reports of hacks) were received by the Internet Crime Complaints Centre
  • $27.6 billion in losses were reported

Cyber criminals earn their money through numerous methods, or attack vectors, and there’s a whole ecosystem where data is gathered and brokered and tools engineered for malicious purposes.

And just like a modern business, they have excellent customer service teams.

They’re even hiring! With all the conditions you’d expect with a normal day-to-day job, such as leave entitlement.

Artificial Intelligence is Raising the Stakes

Adoption of AI chatbots has upped the game for threat actors, which has made phishing much easier, and more widespread.

Harry and Morgan said they were using AI in their businesses, though finding it hit and miss. AI is making accessibility much easier, especially for threat actors. Andrew said that we need to be smarter and faster in detecting and responding to threats.

Divider

Educating Your Customers When Selling Cybersecurity Solutions

The speakers discussed ways we should be educating customers about the type of threats we’re facing today.

Some of the key takeaway here were:

  1. It’s important to use straight-forward relatable language.
  2. It’s much easier to explain threats to customers who have already been a victim of cybercrime.
  3. Explaining it in terms of the risk to their business and the consequences of not acting on it is a good start.
  4. If you can demonstrate how a compromise could affect their bottom line it could provoke them into taking steps to become more secure.

When it comes to cybersecurity, people, processes and technology are the three tenets that go hand-in-hand.

Framing the Need for Security and Strategic Recovery

Starting with a recognised framework can help you start the conversation with your customers:

  • The NIST framework structures security into five areas: Identify, Protect, Detect, Respond and Recover
  • CIS controls – a prescriptive, prioritised, and simplified set of best practices that you can use to strengthen your cybersecurity posture
  • Cyber Essentials – is a UK certification to show that an organisation has achieved the minimum level of protection is cybersecurity

When an event does occur, having better security in place means better controls around recovery.

Depending on the level of compromise, there could be just a few steps you need to take, or there could be whole areas you need to quarantine and restore.

Therefore it’s essential that you discuss with your customers a priority plan. This lets you know what you need to focus your efforts on getting operational again first. This is what resiliency is all about.

For any customer you onboard, you need to ensure that they opt-in to a minimum security stance, and they keep up their obligations.

It’s as much a risk to your reputation as it is to theirs if they don’t act on your recommendations, and suffer a serious attack as a result.

Selling cybersecurity solutions is as much about risk to your customers as it is to you.

Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs

Divider

Delivering Your Cybersecurity Solutions and Services

Andrew said that regardless of what’s in your stack right now, there is no excuse to not do what you can with what you’ve got. There’s no need to try to boil the ocean.

You can make a good start by following these steps:

  1. Conduct a risk assessment
  2. Leverage your existing partnerships
  3. Arm your team

The speakers discussed what’s best when it comes to keeping customers safe and the impact to their businesses.

Harry said that the landscape is changing so quickly, and it can be hard to keep up with all the updates we need to deliver. However, by not telling customers exactly what’s in our stack, we have the ability to make changes to it fairly quickly if the visible impact to their business is minimal.

The client has to come first and you need to have their best interests and the user experience in mind too.

As well as the customer, your team also needs to be behind your stack. Plus, they should have confidence in their toolsets.

Some of the common tools used in security stacks are:

  • PSA Tool or Ticketing System
  • Antivirus
  • Managed Detection and Response (MDR)
  • DNS Security
  • Firewall
  • Multi-Factor Authentication (MFA)
  • Password Management

Morgan Aspinwall gave us a brief demo of Halo PSA in how it records and manages a security alert ticket, from assignments and escalations to workflows for actions and responses. However, we ran out of time to explore it in any great detail.

You don't have to boil the ocean when it comes to cybersecurity! Click to Tweet

Divider

Selling Cybersecurity Solutions Conclusion

The stakes are continually being raised by threat actors, and as MSPs we are challenged to not only to develop more robust stacks, but to sell these expensive solutions to customers.

The secret to this is: we can start by ensuring we demonstrate the standards shown in security frameworks. And to impress upon customers that what we offer is a way of reducing the risk to their business financially, operationally and reputationally.

Furthermore we need to make sure we have the confidence in the tools we are using to protect our customers. One of the best ways to do this is to use the tools to protect our own businesses first.

Breakthrough Ways Of Selling Cybersecurity Solutions To SMBs

Divider

You Might Also Be Interested In

STEPHEN MCCORMICK

I'm the MSP Community Manager for Tubblog. A small business owner, technical writer and blogger, with 15 years experience in corporate IT. I frequently attend MSP peer groups and create content relevant to IT service providers and business owners.

All Posts

You might like:

Complement Your Cybersecurity Strategy with Security Awareness Training image

Complement Your Cybersecurity Strategy with Security Awareness Training

Article | By Stephen McCormick
How A Penetration Test Uncovered Astonishing Network Flaws image

How A Penetration Test Uncovered Astonishing Network Flaws

Artificial Intelligence | By Richard Tubb
Defence in Depth: Better Results From a Layered Security Strategy image

Defence in Depth: Better Results From a Layered Security Strategy

Article | By Stephen McCormick
CompTIA UK&I 2024: Remarkable Insights For Excellence And Innovation image

CompTIA UK&I 2024: Remarkable Insights For Excellence And Innovation

Article | By Stephen McCormick
Phishing Defence Coaching: A Targeted Approach To End-User Security Training image

Phishing Defence Coaching: A Targeted Approach To End-User Security Training

Article | By Stephen McCormick
What to Consider Putting in a Powerful MSP Testimonial image

What to Consider Putting in a Powerful MSP Testimonial

Article | By Stephen McCormick
Why Time Off is Vital for MSP Leaders’ Mental Wellbeing image

Why Time Off is Vital for MSP Leaders’ Mental Wellbeing

Article | By Gudrun Lauret
Maximising Your MSP’s Marketing with Proven Social Proof Strategies image

Maximising Your MSP’s Marketing with Proven Social Proof Strategies

Article | By Stephen McCormick
Unlock IT Efficiency with David Allen’s ‘Getting Things Done’ image

Unlock IT Efficiency with David Allen’s ‘Getting Things Done’

Article | By Graham Pierrepoint
10 Handy AI Resources to Help Your MSP Clients Grow Their Businesses image

10 Handy AI Resources to Help Your MSP Clients Grow Their Businesses

Article | By Gudrun Lauret
Understanding Deepfake Technology: Why It’s A Risk To Your Business image

Understanding Deepfake Technology: Why It’s A Risk To Your Business

Article | By Stephen McCormick
Successful MSP relationships: How to Find and Nurture Them to Make Them Last image

Successful MSP relationships: How to Find and Nurture Them to Make Them Last

Article | By Guest Author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

Share via
Send this to a friend