Could You Be Outgrowing Your IT Provider?

As businesses grow, change is inevitable. New employees are hired, systems expand, cybersecurity risks increase, and technology becomes more deeply woven into daily operations. While growth is a positive sign, it can also reveal something many organizations don’t realize right away, you may be outgrowing your IT support provider.

At CIO Solutions, we’ve worked with businesses for over 40 years, and one thing we’ve learned is this: IT that once “worked fine” can quietly become a limitation as your organization evolves. If your technology partner doesn’t have the capacity to support your expanding needs it may be time to take a closer look.

Below are some common signs your business may be ready for a more strategic approach to managed IT services.

Your IT Support Is Reactive, Not Proactive

If your IT provider mainly responds after something breaks, you’re likely missing out on the value of proactive IT management.

Modern IT support should focus on prevention, monitoring systems, applying updates, identifying vulnerabilities, and resolving issues before they disrupt your business. When your provider waits for support tickets instead of actively managing your environment, downtime becomes inevitable.

Proactive managed IT services help reduce outages, improve performance, and create a more stable technology foundation for growth.

 Cybersecurity Isn’t a Priority- Until There’s a Problem

Cyber threats continue to increase in both volume and sophistication. If your current IT support provider treats cybersecurity as an add-on rather than a core responsibility, your business could be at risk.

Today’s organizations need layered cybersecurity solutions, including:

  • Advanced threat protection
  • Email security and phishing prevention
  • Endpoint detection and response
  • Backup and disaster recovery planning
  • Security awareness training

If your provider can’t clearly explain how your data is protected or only discusses security after an incident, that’s a strong indicator you may have outgrown their capabilities.

 Technology Is Slowing Down Productivity

When systems run slowly, applications crash, or employees constantly experience technical issues, productivity suffers. Over time, these frustrations add up, lost time, increased stress, and inefficiencies across your team.

Reliable IT support should enable your business to operate smoothly, not hold it back. If your staff regularly works around technology problems instead of being supported by efficient systems, your IT environment may no longer be aligned with your operational needs.

As businesses grow, technology must scale with them, not become a bottleneck.

There’s No Strategic IT Planning

One of the clearest signs you’ve outgrown your IT provider is the absence of long-term planning.

Technology should support your business goals, whether that includes growth, compliance, remote work, or improved security. Without a clear IT roadmap, decisions become reactive and costly.

A strong IT partner should help guide decisions around:

  • Hardware lifecycle planning
  • Cloud strategy
  • Budget forecasting
  • Security improvements
  • Business continuity planning

If your IT provider isn’t offering strategic guidance or regular reviews, you may be missing opportunities to strengthen and future-proof your organization.

 Your Business Has Outpaced Their Resources

As your organization expands, your IT environment becomes more complex. What once worked for a small team may not support a larger workforce with multiple locations, remote users, or compliance requirements.

If your provider struggles to keep up with response times, staffing, or technical expertise, it can create risk and frustration.

A scalable managed service provider should have the resources, tools, and experience to support businesses at every stage, without sacrificing service quality.

You’re Spending Too Much Time Managing IT and Paying for the Unpredictable

For many organizations, valuable internal resources end up spending far too much time managing IT instead of focusing on their core responsibilities. Tracking hourly support tickets, approving time-and-materials billing, and acting as the go-between for employees and IT providers quickly becomes a drain on productivity. On top of that, unexpected technical issues or unplanned upgrades often come with surprise costs that are difficult to budget for and even harder to justify.

A managed services agreement changes that dynamic. With CIO Solutions, your internal team gets their time back by removing the burden of day-to-day IT management. Your employees gain direct access to responsive support when they need it, without having to go through a middleman. And your organization benefits from predictable monthly costs, along with a strategic technology roadmap that helps you plan, budget, and invest with confidence as your systems continue to mature.

A Better IT Partnership Supports Growth

Outgrowing your IT support provider doesn’t mean they failed, it simply means your business has evolved.

At CIO Solutions, we believe IT should be a strategic asset, not a source of frustration. Our approach focuses on proactive support, cybersecurity-first thinking, and long-term planning that aligns technology with business goals.

For over four decades, we’ve helped organizations adapt through constant change and we understand that every business’s technology journey is different.

If your IT environment no longer supports where your business is headed, it may be time to explore a partner who can grow alongside you.

Final Thoughts

Technology should empower your business, not hold it back.

If you’re questioning whether your current IT support provider is still the right fit, that awareness alone is an important first step. The right managed IT services partner brings clarity, confidence, and stability, allowing you to focus on what matters most: running your business.

 

Managed or Co-Managed: What’s Right for You?

Technology has become the backbone of modern business operations but managing it effectively is more complex than ever. From cybersecurity threats and compliance requirements to cloud optimization and user support, organizations are under constant pressure to keep systems running smoothly while planning for what’s next.

This is where managed service providers (MSPs) come in. But not all MSP engagements look the same. One of the most common questions business leaders face today is whether they should choose fully managed IT services or a co-managed IT solution.

There’s no one-size-fits-all answer. The best choice depends on your internal resources, business goals, and appetite for growth. Let’s break down both models and how to determine which is the right fit for your organization.

Understanding Managed IT Services

Managed IT services place full responsibility for your technology environment in the hands of a managed service provider. This model is ideal for organizations that want predictable costs, reduced risk, and a dedicated team handling day-to-day IT operations.

With fully managed services, your MSP typically oversees:

  • Help desk and end-user support
  • Network monitoring and management
  • Cybersecurity tools and threat response
  • Patch management and system updates
  • Backup, disaster recovery, and business continuity
  • Vendor management and strategic IT planning

For many small to mid-sized businesses, managed IT services act as a complete outsourced IT department delivering enterprise-grade support without the cost of building and maintaining an in-house team.

Best fit for managed IT services:

  • Organizations without internal IT staff
  • Companies looking to reduce operational overhead
  • Businesses prioritizing stability, security, and compliance
  • Leadership teams that want a single point of accountability

What Is Co-Managed IT?

Co-managed IT services are designed for organizations that already have internal IT personnel but need additional expertise, tools, or coverage. Instead of replacing your team, a co-managed MSP works alongside them, filling gaps and strengthening capabilities.

In a co-managed model, responsibilities are shared. For example:

  • Your internal IT team handles user support and daily tasks
  • Your MSP provides advanced cybersecurity, monitoring, and escalation support
  • Strategic initiatives like cloud migrations or compliance planning are handled collaboratively

This hybrid approach gives businesses flexibility while maintaining internal control and institutional knowledge.

Best fit for co-managed IT services:

  • Organizations with one or more in-house IT professionals
  • Businesses experiencing growth or increasing complexity
  • Companies that want enterprise-level tools without enterprise-level staffing costs
  • IT leaders seeking strategic support and burnout prevention

Key Factors to Consider When Choosing

 

  1. Internal IT Capabilities

If you don’t have dedicated IT staff or your team is stretched thin, managed IT services may provide the structure and coverage you need. If you already have capable IT leadership but lack bandwidth or specialization, co-managed IT can be a powerful extension of your team.

  1. Security & Compliance Requirements

Cybersecurity threats continue to evolve, and regulatory requirements are becoming more demanding. Many managed service providers offer advanced security stacks, 24/7 monitoring, and compliance alignment that would be costly to build internally. If security is a top concern, ensure your chosen model delivers proactive protection, not just reactive support.

  1. Scalability and Growth

As businesses grow, technology demands grow with them. Managed and co-managed IT services both offer scalability, but co-managed solutions often provide more flexibility for organizations planning rapid expansion or system modernization.

  1. Budget Predictability

One of the biggest advantages of working with an MSP is predictable monthly pricing. Fully managed services typically offer the most consistent costs, while co-managed IT can be customized based on services consumed and responsibilities shared.

  1. Strategic IT Alignment

Technology should support business objectives, not slow them down. The right managed service provider doesn’t just fix problems; they help plan for the future. Whether fully managed or co-managed, look for an MSP that offers vCIO guidance, roadmapping, and strategic insight.

Why the Right MSP Matters More Than the Model

Whether you choose managed or co-managed IT services, success depends on the managed service provider you partner with. The best MSPs don’t push a single solution; they assess your environment, understand your goals, and recommend a model that aligns with your business.

A strong MSP partnership delivers:

  • Clear communication and defined responsibilities
  • Proactive monitoring and rapid response
  • Security-first thinking
  • Scalable solutions that evolve with your business
  • A true strategic relationship, not just ticket resolution

Final Thoughts

Choosing between managed IT services and co-managed IT solutions isn’t about which model is better, it’s about which is better for you. The right fit empowers your team, strengthens your security posture, and positions your organization for long-term success.

At CIO Solutions, we believe IT should be an enabler, not a burden. Whether you’re looking for a fully managed service provider or a co-managed partner to support your internal team, the goal is the same: reliable, secure, and forward-thinking technology that drives your business forward.

 

Why You Should Let Your IT Team Know When You’re Going Out of the Country

Wish You Were Here: Why You Should Let Your IT Team Know When You’re Going Out of the Country

The Importance of Keeping Your Conditional Access Policies Current 

IN THIS ARTICLE: 

When planning a trip abroad, your to-do list is long. From personal tasks like setting up a cat-sitter and packing, to work-related ones like getting someone to cover key responsibilities and setting your out of office email autoreply.

Here’s another important item you may not have known about: Letting your IT team know where you’re going and when you’ll be back.

It’s not so we can live vicariously through you as you traverse a sunny beach in Bali. It’s so we can adjust your conditional access policies and keep your account as secure as possible!

Understanding Conditional Access

Conditional access is a security measure that uses criteria to limit login access to company resources. Josh Farlow, our Director of Cloud Services, explains, “These access policies are often applied to Microsoft applications. Your conditional access policy sets the conditions for who can access, and which authentication methods are required for logging in to your Microsoft 365 environment.”

One important condition is location. Josh adds, “Our default policy blocks authentication attempts outside the USA and Canada. For some companies, we include exceptions like Mexico if needed.”

Conditional Access: Location Restrictions

In this case, we’re focusing on the location parameter. Your IT team should have set approved locations as part of your access policy. For example, if you typically log in to your Microsoft 365 account from Central California, that would be the approved location that your account can be logged into from. If there is an attempted login with your credentials from anywhere outside of that area, the policy would flag that and block it. This disrupts a bad actor in, say, Uzbekistan, from accessing your account with stolen credentials.

However, if you’re going to be visiting family in Uzbekistan and need to log in to send a quick email while you’re there, your conditional access policy would prevent that. Notifying your IT team ahead of time lets them adjust the policy for smooth sailing while you’re away.

Think of it like back in the day when you had to call your credit card provider and let them know where you were traveling so your card would work in those countries without being blocked. Same idea!

Why Your IT Team Needs to Know About Travel Plans

Notifying your IT team of your international travel plans will enable them to adjust the conditional access policy appropriately for your temporary change of location. Not only will this prevent headaches and ensure smooth operations for you while you’re traveling, but it will also improve your security.

This information about your whereabouts empowers your IT provider to properly:

  • Maintain security protocols during your absence
  • Adjust conditional access settings to prevent authorized and unauthorized access
  • Proactively monitor and respond to suspicious activity

How to Notify Your IT Team

Before your trip abroad, give your IT team a call to let them know where and when you’re traveling. Once they verify your identity, they can adjust your policy temporarily to allow access from those locations should you need it.

If you’re a client of CIO Solutions, simply call into Support and let us know:

  • Where– Primary locations you’ll be traveling to
  • When– Dates you’ll be in the location(s) and when you’re returning

You can keep the “why” and “how” to yourself unless you really want to share the exciting trip you have coming up. Once we verify your identity, we’ll take it from there and you’re free to continue the rest of your trip preparations!

Adding this simple step of notifying your IT team when you’re going abroad means more security for your business and streamlined access for you. A win-win!


Are you a current client of CIO Solutions? Please feel free to reach out with any questions!

Not a client yet, but curious about maturing your IT solutions? Let’s talk!

Staying Frosty: How to Keep Calm and Stay Alert Against Spoofing and Phishing

Staying Frosty: How to Keep Calm and Stay Alert Against Spoofing and Phishing

By Micah Ulrick, vCIO

IN THIS ARTICLE: 

We’ve said it before, but I’ll say it again, cybersecurity is more critical than ever. As a vCIO, I advise my clients on cybersecurity daily. While ransomware, DoS (Denial of Service), and Brute Force attacks are still a thing, phishing and spoofing are still two of the most common and dangerous threats today. These are the primary causes of compromises.

The problem is there’s no magic bullet that will 100% protect you from these attacks. So, understanding these threats and how to identify them can make all the difference in protecting both you and your organization from significant harm.

Every time you venture into your inbox or out onto the web, remember these tips to stay frosty (a.k.a. cool and alert) against the dangers of phishing and spoofing.

Understanding Spoofing & Phishing: What You Need to Know

Spoofing is when a threat actor masquerades as a trustworthy company or contact by faking their email, caller ID number, or website. Spoofing is effective because it manipulates your confidence in well-known companies or acquaintances and relies on the human habit of quickly scanning messages and missing signs that it’s a fake.

Spoofing is typically used in phishing, a technique used by cybercriminals to trick you into willingly handing over sensitive information, such as passwords, credit card and banking information, or personal and corporate data. These attacks often come in the form of emails or texts that appear to be from legitimate sources, such as banks, vendors, or even colleagues.

In simple terms: spoofing is the faking of “who” you’re talking to, and phishing is “how” they engage with you to take action. Like actual ‘fishing’, they’re trying to hook you with deceptive bait so they can reel you in.

How to Spot Spoofing and Phishing Red Flags

Identifying Spoofs

Email Spoofing

Signs of Spoof: Inconsistencies like slight misspellings in email addresses, domain names, and display names, or emails that come from a different domain name than usual.

  • Always scrutinize email addresses, domain names, and display names.
  • Talk to your IT provider about adding an “external” banner to flag emails coming from outside your organization to enhance awareness.

Caller ID and Text Spoofing

Signs of Spoof: Unexpected calls or texts from both familiar and unfamiliar numbers claiming to be someone you know. Scammers can manipulate caller ID information to make calls or texts appear as though they are coming from a trusted contact or organization.  

  • Look out for links in text messages (don’t click them) 
  • Be wary of abnormal requests. 
  • If you receive an unexpected call or text from a colleague, stop engaging and re-initiate contact in person or using a verified number or communication source you can trust.

Website Spoofing

Signs of Spoof: Spoofed websites may look identical to legitimate ones but have different URLs. They may also be missing “HTTPS” in the URL. The security padlock symbol in the address bar of the browser may also be missing.

  • Always double-check the URL spelling.
  • Check the name for familiarity. For example, “https://your-company.com” versus “https://yourcompany.com”.
  • Look for HTTPS and the padlock symbol in the address bar. If these are missing it’s not a good sign.

Avoid Falling for Phishing

  • Scrutinize Sender Addresses: Always check the sender’s email address. Phishing emails are often spoofed and come from legitimate-sounding addresses. Look for those slight alterations in the domain name, display name, and sender address. For instance, an email from “support@closolutions.com” instead of “support@ciosolutions.com”. Did you catch the difference at first glance? That’s how subtle they are. Look closely!
  • Beware Generic Greetings: Be cautious of emails with generic greetings like “Dear Customer” instead of your name. This is usually an indication that it’s a mass email blasted to many recipients and is a warning sign that something’s not right.
  • Resist Being Rushed: Look out for “account closure” notices, “unauthorized transaction” warnings, “password update needed”, or phrases like “Your account will be locked in 24 hours” or “Immediate action required”. Phishing emails often try to rush you into a mistake by creating a sense of urgency. Take a breath, and if you’re concerned, log into the questionable account as usual (not from any links in the email) to make sure everything is as it should be.
  • Note Unusual Requests: If an email is requesting information such as passwords, social security numbers, or credit card details via email, especially out of the blue, it’s likely a phishing attempt. Remember that legitimate organizations will never ask for sensitive information like this via email. Put your antennae up for these and note the strangeness of the request.
  • Don’t Click That Link or Attachment: Hover your cursor over the link text to see the actual embedded URL destination before clicking. Opening your email on a phone? Avoid the risk altogether and go directly to the website instead of clicking on a link. Phishing links often present themselves as one thing but really lead to malicious URLs. Similarly, be wary of attachments, especially if you weren’t expecting them. When in doubt: Don’t. Click.

Advanced Threats to Be Aware Of

Now that we’ve covered the basics of phishing and spoofing, there are several advanced threats that pose significant risks. Understanding these can further enhance your cybersecurity posture.

Whale-Phishing Attacks: Watch Out, C-Suite

Whale-phishing, or whaling, targets high-profile C-Suite individuals such as CEOs or CFOs. These attacks are highly personalized and sophisticated, aiming to steal sensitive corporate information or execute fraudulent transactions. Due to the high stakes involved, whaling emails often appear very legitimate and may reference actual company projects or executives by name, or ask for a change in payroll accounts. Bad actors typically gather this data by compromising lower-level employees with the phishing and spoofing tactics above.

Spear-Phishing Attacks: We Know You. No Really.

Unlike regular phishing, which is sent to a broad audience, spear-phishing emails are targeted and customized to the recipient, making them harder to detect. Bad actors often use information gathered from social media (LinkedIn, Facebook, etc.) and other online sources to spoof effectively and build convincing requests. These typically flow from the top down. For example, a threat actor may gather information about a CEO and will impersonate them to request a wire transfer from someone on the Finance team at their company.

Man-in-the-Middle (MITM) Attacks: You’ve Got Company

In an MITM attack, a cybercriminal first gains access so they can then intercept communication between two parties, for example between an Accounts Receivable rep at one company and an Accounts Payable rep at another. Once the attacker has access, they then “lie in wait” and eavesdrop to steal data or interject themselves into the communication chain to ask for a change in bank routing and account information or payroll information to steal money.

This is often done by compromising someone’s email, but unsecured Wi-Fi networks are also a common culprit, letting an attacker intercept data transmitted between your device and the network.

Remember These Best Practices

  • Be Skeptical: Always question unsolicited emails and calls. If something seems off, it probably is.
  • Slow Down: Don’t rush to respond, and don’t impulsively click on unknown links or attachments.
  • Keep Learning (and pass it on): Cybercriminals constantly evolve their strategies, so staying up-to-date and informed is crucial. Share this information with colleagues and loved ones to create a network of aware and cautious individuals.
  • Enable Multi-Factor Authentication (MFA): MFA adds an extra layer of security, making it harder for attackers to gain access to your accounts. This typically involves a second form of verification in addition to your password, such as a code sent to your phone or an authenticator application. Enable this whenever possible!
  • Keep Software Updated: Regular updates patch fixes for identified security vulnerabilities, making it harder for cybercriminals to exploit your system. This includes operating systems, browsers, and any other software applications you use (even your phone and apps).
  • Report Suspicious Activity: If you receive a suspicious email or call or think you may have clicked on a sketchy link, report it to your IT department or service provider. Prompt reporting can prevent widespread damage and help authorities track and stop cybercriminals.

It’s up to everyone to stay informed and vigilant. The most important things you can take with you when you venture online every day are patience and suspicion. Don’t be trigger-happy with your clicks and responses, and take the time to look at emails, texts, and websites a bit closer. Trust little and verify when possible.

Stay safe, stay aware, and stay frosty out there.

 

An Additional Note For Business Leaders:

With compromises on the rise, Cyber Liability Insurance has become an essential part of protecting your business in the event of an attack. All companies, big and small, can benefit from Cyber Liability Insurance and we highly recommend acquiring it.


Did you know that CIO Solutions offers automated phishing awareness training and simulated user phishing campaigns? Reach out to your vCIO or Customer Success Manager to learn more about including Knowbe4 in your monthly service agreement at no additional cost!

Not a client yet? Contact us today to talk through your options for enhancing your IT management and security.

Email Authentication Protocols to Protect Your Business

Email Authentication Protocols to Protect Your Business

By Peter Summers, vCIO

IN THIS ARTICLE: 

Email is an essential tool for businesses and individuals alike, making it a prime target for cybercriminals. Protecting your business against email-based attacks goes beyond having the latest threat detection tools and educating your users not to click on suspicious links.

Here are a few more technical email security measures, including DKIM, DMARC, and SPF, that organizations need to implement to cover their foundational bases.

Email Authentication Protocols: DKIM, DMARC, and SPF

DKIM, or DomainKeys Identified Mail

This is a protocol that enables email recipients to verify that an email is really from the sender it says it’s from and that it hasn’t been tampered with or modified during transit. DKIM works by adding a digital signature to the header of an email message when it’s sent. That signature is then verified by your email provider using a public key published in the DNS (Domain Name Server) records for the domain. If it’s checked and found to be a valid signature, the email is in fact from the sender it claims to be from and hasn’t been tampered with.

SPF, or Sender Policy Framework

SPF is an email authentication protocol that enables domain owners to specify which IP addresses are authorized to send emails on their behalf.

For this protocol, the domain owner publishes a list of authorized IP addresses in the DNS records for the domain. Email providers can use this information to confirm that emails claiming to be sent from this domain are truly coming from the approved list of IP addresses.

DMARC, or Domain-Based Message Authentication, Reporting, and Conformance

This protocol builds on DKIM and SPF by providing a way for domain owners to declare their email authentication policies and receive reports on how their emails are being handled by email providers. Giving domain owners this ability to keep an eye on their email traffic and detect unauthorized use of their domains can be incredibly useful for helping to prevent phishing and other kinds of email-based attacks.

A Dynamic Trio

DKIM, DMARC, and SPF work together behind the scenes to provide a more powerful defense against email-based attacks. Increasing the ability of email recipients to verify the authenticity of incoming email messages alone is a huge security improvement. Pair that with the ability for domain owners to specify the use of their domain name, monitor their email traffic, and detect and block unauthorized use of their domain name, and these protocols can help prevent phishing, spoofing, and other types of email fraud.

These protocols are more on the complex technical side, and they require careful planning and configuration. Be sure to work with experienced email security experts to set them up correctly and get your organization more protected against email-based security threats.


Already a client of CIO Solutions? Reach out to your vCIO to discuss DKIM, DMARC, and SPF and where it fits in your email security plan!

Not a client yet, but curious about learning how to boost your organization’s security posture? Let’s talk about your options!

A Hands-On Deep Dive Into CrowdStrike Identity Protection

By Eric Egolf, CEO

As system administrators navigating the intricate web of cybersecurity solutions, we often uncover hidden gems that revolutionize our approach to managing digital security. One such treasure within the CrowdStrike suite is the Identity Protection Module (IDP).

As we began exploring this module, we recognized the possibilities it offered but finding detailed guidance was a challenge. That’s why we created this “CrowdStrike Identity Protection Overview”- for other system administrators seeking insights. Our aim? To offer a guide, complete with step-by-step screenshots and real-life examples showcasing how this tool transformed our daily workflows.

Throughout this overview, we’ll weave through practical scenarios, complemented by illustrative screenshots, showing how seamlessly the IDP module integrates into everyday administrative duties. By recounting our experiences and tangible gains, our goal is to demystify this tool and reveal its true potential, equipping fellow administrators with a thorough grasp of its capabilities.

An Administrator’s Need for CrowdStrike IDP

As system admins ourselves, we understand the quest for tools that promise value and truly deliver it consistently amid the daily grind of managing systems. The IDP module is often overlooked but holds incredible power. The implementation of this module into our suite of services has transformed our workflows, mitigated risks, and augmented our ability to maintain a secure digital environment for ourselves and our clients in this ever-evolving security landscape. It has provided proactive detection capabilities beyond what even the EDR platform can provide. As we move further into access being controlled by user identities, this tool will only become more essential.

Exploring CrowdStrike IDP Features: A Closer Look

Let’s dive right into it.

You’ll find the Identity Protection tab beneath the Endpoint Security tab in the CrowdStrike Falcon portal.

A Hands-On Deep Dive Into CrowdStrike Identity Protection

Domain Security Tab AKA “Risks”

The next part of the portal is what I call “the risks” section. It is referred to as the Monitor section. The first link in this section is to your “Domain Security Overview”.

This area is where you’ll find highlights of all the currently flagged risks. As you expand each risk, you will see an option to “show related entities”. Clicking on this will provide a full list of all the objects with that particular risk.

Compromised Passwords

In the example below, we have a list of compromised passwords, or what I refer to as “solved passwords”. These indicate users that are using passwords that are in existing rainbow tables on the dark web. These passwords pose a risk since they are much more susceptible to brute-force attacks.

A Hands-On Deep Dive Into CrowdStrike Identity Protection

The domain security overview, or risk section, shows you things (presumably) under your control that you can configure (change password, change GPO settings, change machine settings, etc.) to reduce your attack surface.

Privileged Accounts

The next link is super cool and shows you all the risks for Privileged accounts. Obviously, these represent a greater risk than other accounts because they have some level of administrative privileges in your environment.

A Hands-On Deep Dive Into CrowdStrike Identity Protection

One of the awesome capabilities this tool allows you is the ability to identify privileged accounts with “stealthy privileges”. That includes stale accounts, ones with compromised passwords, etc.

One cool thing I wasn’t aware of until we dove deeper was the honeytoken concept. This involves creating a deceptive account designed to lure potential attackers, labeling it as a “honeytoken account”. If it is ever accessed, it triggers an alert, so you know that you have a potential compromise on your hands.

CrowdStrike IDP provides this same view for all users, with ways to customize the widgets. It makes it easy to look at top user account lockouts, password changes, top password failures, and more; all with the same cool widget summarization seen above. It also offers links for risk analysis and event analysis (we don’t use these much ourselves, but they are powerful when needed).

Identity-Based Incidents Tab AKA “Detections”

Moving on from the risk section, we delve into the concept of detections. In CrowdStrike IDP this is called the Identity-Based Incidents tab. In the screenshot below you can see 3 detections (with names redacted).

Identity-Based Incidents Tab AKA “Detections”

Clicking on each gives you the expanded details (see below).

A Hands-On Deep Dive Into CrowdStrike Identity Protection

This gives us a summary of the accounts involved in the identity-based incident. In this case, it lets me know that a single account was involved and the alert was triggered because it logged into multiple servers.

Threat Hunter

From there, I can move to the Threat Hunter section, prefiltered with this user (see below). In this example, we can see all the systems this user accessed and with which protocols. This gives us a more complete picture and helps us determine if further investigation is necessary.

Threat Hunter

The Threat Hunter is, in my experience, the best tool for quickly looking through authentication logs. This allows you to quickly filter based on event types, identities, source, and destination endpoints. A highlight here is that the event types are nicely enumerated for you. This means you don’t have to spend time trying to translate Windows event IDs. Everything is spelled out neatly in the search itself making it far more convenient than sifting through Windows event logs or creating custom parsers.

This tool simplifies understanding authentication and timelines, offering straightforward and intuitive filters that streamline the process significantly.

“Enforce” Module

“Enforce” Module

CrowdStrike IDP features an enforce module, and although we’re still exploring its capabilities, the most impactful use case we’ve witnessed involves implementing MFA enforcement for all privileged accounts using the RDP protocol. Anyone in the system admin space knows how hard this normally is.

With CrowdStrike IDP, it’s as straightforward as crafting a policy and ensuring the machines have the standard Falcon agent installed. Just like that, you can enable RDP MFA (using options like Microsoft Authenticator or any number of the other authenticators provided by CrowdStrike IDP) for all privileged accounts.

Programmatic Accounts

Additionally, you can also block RDP access for all “programmatic accounts” a concept tracked within CS IDP.

Hackers often exploit credentials from service accounts (known as “Programmatic Accounts” in CS IDP) which makes it amazingly powerful to have policies that prevent these accounts from using RDP with a simple, singular policy enforcement definition.

Regarding programmatic or service accounts, another noteworthy feature is the account profiling tool. For example, a service account usually runs on a single machine or has a very specific use pattern. Once that is profiled (after 60 days), if CrowdStrike detects a login to a system outside of this established profile, it triggers an alert. This gives you a new layer of detection capabilities that EDR and other systems would miss.

The ability of CS IDP to profile the login patterns of every account (including stale accounts) and alert you to anomalies in their usage relative to the normal pattern is extremely powerful. This.

Connectors

Finally, we have the connectors. In the example below, there’s a connector to Azure AD which is another identity provider outside of AD. CrowdStrike IDP pulls in this other Identity Provider data, giving you detections on this dataset just like the normal Active Directory detections discussed above. Setting this up is straightforward—simply create an enterprise app in Azure AD and connect it.

Currently, at the time of this writing, it can use Azure AD and Okta as external identity providers for monitoring and detection purposes.

Connectors

In Conclusion: CrowdStrike IDP is Powerful

The key takeaway here is that CrowdStrike IDP stands as an extremely powerful tool. Hopefully, this brief dive into some of the uses and settings gives you the confidence to try enabling it and exploring the functionality in your CrowdStrike Portal. We believe it’s one of the best security investments you can make!

Enhancing Cybersecurity with CrowdStrike Identity Protection

By Eric Egolf, CEO

In the realm of cybersecurity, staying ahead of threats is crucial. Organizations require comprehensive solutions that not only detect but also preemptively prevent potential breaches. CrowdStrike, recognized for its top-tier Endpoint Detection and Response (EDR), goes above and beyond by offering additional value-added modules. Among these is the CrowdStrike Identity Protection Module which stands out as a game-changer in the evolving landscape of digital risks.

Unveiling the Power of CrowdStrike Identity Protection

The allure of CrowdStrike isn’t merely its best-in-class EDR; it’s the supplementary capabilities like the Identity Protection Module that truly elevate its effect. This module is a force multiplier, offering functionalities akin to a Security Information and Event Management (SIEM) system at a fraction of the cost, especially when integrated with sources like Active Directory (AD).

Exposing Hidden Threats through Identity

This module broadens an organization’s detection capabilities, unveiling identity-related risks and abuse that traditional EDR systems overlook. For instance, it can identify anomalies like simultaneous logins from multiple locations using the same user account, a telltale indication of a high-security risk. With over 80 other detection capabilities, it ensures comprehensive coverage of identity-related threats.

Seamless Integration and Enhanced Visibility

CrowdStrike’s Identity Protection Module seamlessly integrates with common identity sources such as Azure AD and Active Directory, boosting detection capabilities and enhanced visibility into user account activities. This integration enables rapid identification of potential risks post-detection.

Leveraging Machine Learning for Proactive Defense

Another standout feature is the profiling function—facilitated by cutting-edge machine learning technology. Over a 60-day period, the module constructs user behavior profiles and promptly alerts administrators when any deviations are detected. This proactive approach enables swift response to potential breaches or unauthorized activities.

Combatting Dormant Threats and Unforeseen Usage

Additionally, the module can flag dormant or ‘stale’ accounts, like legacy service accounts, that suddenly attempt to log in. This is invaluable. Being alerted to these types of potential risks ensures your organization can take a proactive stance against unauthorized access attempts.

Empowering IT Departments with Cost-Effective Defense

CrowdStrike’s Identity Protection Module is more than a supplement to a powerful cybersecurity tool; it’s a necessity. It equips IT departments with an additional layer of detection and prevention capabilities, previously unattainable without traditional, more expensive SIEM solutions. Building on the CrowdStrike EDR platform, the Identity Protection module’s robust design, powerful features, and cost-effectiveness make it an indispensable choice for any organization seeking comprehensive cybersecurity solutions.

Strengthening Cyber Defenses with CrowdStrike Identity Protection

In the ongoing battle against cyber threats, CrowdStrike’s Identity Protection Module emerges as a force multiplier, empowering organizations to fortify their defenses, mitigate risks, and safeguard their digital landscapes efficiently and economically.


Are you a current client of CIO Solutions? Talk to your vCIO to continue the conversation!

Not a client yet, but wondering how to improve your business’s cybersecurity? Let’s talk!

Safeguarding Your Business Beyond Device Security: The Rising Importance of Identity Protection

By Eric Egolf, CEO

IN THIS ARTICLE:

In today’s digital landscape, IT security is a hot topic of discussion, and for good reason. Security is a constantly changing and complex field and while it may seem repetitive, as we rely on technology and digital interactions more for core business operations, companies have more to lose when their security posture is lacking. Staying ahead of the curve and paying attention to the emerging trends of IT security is now vital to keeping your business safe. 

In terms of priorities, securing individual endpoints (computers, laptops, servers, etc.) should be the initial step. If your organization hasn’t addressed this yet, that should be first and foremost. If you have this covered (maybe you have already implemented a solution such as CrowdStrike EDR), we can start to look ahead toward the next important concept on the rise: securing corporate user identities.  

User Identity- Who’s Who & What They Can Access 

A “user identity” is the digital version of who you are online. It includes things like your credentials (username and password), and other personal information that you use to access and control what you do on different websites and systems.

For our purposes, we will focus specifically on the corporate user identity (the usernames and passwords used to access your corporate data and applications) and how to secure it. Note that this does not include consumer user identity i.e., the credentials that employees use for personal online activity. 

When a user’s credentials are stolen, devastating credential abuse happens every day on devices without any security software. If your endpoints have powerful prevention, detection, and response capabilities, then the impact of this breach won’t be as disastrous as it would be on endpoints that aren’t secured.  

But considering how much power is associated with corporate user identities, it only makes sense that now, in addition to securing the endpoints, the next important security technology on the rise is identity protection- securing and detecting anomalies in the user identities accessing your business’s data.   

In the coming years, we see Identity Protection tools becoming equally as important as Endpoint Protection ones.  

On The Rise: Identity Protection Solutions 

Identity protection needs to be considered separately from securing a workstation. Endpoint security is done via software that is installed on the individual device or workstation (such as antivirus (AV) and Endpoint Detection Response (EDR) solutions).  

User Identity, on the other hand, is secured by monitoring databases of the corporate identities that access your business data. Identity Protection solutions catch risks in configuration and detect anomalies in credential usage.  

Some examples include: 

  • Someone logging in with a stale user account (user account that hasn’t been used in 90 days). 
  • Using a user account from a machine that doesn’t normally use it – different than baseline behavior.
  • Using an account from two geographically distributed locations, North and South California in the same hour.  

Identity Protection tools are an emerging technology that show incredible potential for increasing a business’s ability to detect and prevent user identity (specifically credential) abuse that they would have otherwise been blind to. 

At CIO Solutions, we offer CrowdStrike’s best-of-breed solutions including EDR and CrowdStrike’s latest module: Identity Protection. These solutions combine the power of modern Artificial Intelligence, a flexible cloud-native design, and now the power of Identity Protection logs to increase your organization’s security capabilities. 


Are you a current client of CIO Solutions? Talk to your vCIO to continue the conversation!

Not a client yet, but wondering how to improve your IT security? Let’s talk!

Neglecting MFA: The Scary Reality of Your Business Risk

IT security is more important than ever. Cyber-attacks and data breaches are a daily occurrence, they just don’t all make headlines. Businesses that fail to take proactive security measures put not only themselves at risk, but their customers too.

One of today’s foundational security measures is multi-factor authentication (MFA). But here’s the scary part: many businesses still aren’t using MFA, which means they’re at risk of some serious consequences.

IN THIS ARTICLE:

MFA Explained 

MFA is a security feature that requires users to provide a combination of two or more authentication factors to gain access to a system or application. This is typically something the user knows (like a password) and something the user has (like a phone or security token). These are used to verify the user’s identity. Unlike solely relying on a password for access, requiring more than one authentication method adds an extra layer of security. If the user’s password is stolen, the second authentication factor helps to prevent unauthorized access to sensitive information and systems.  

Business Consequences of Not Implementing MFA 

MFA is a relatively simple solution that can significantly increase your preventative security posture. In today’s world, it’s only a matter of time before a user’s credentials are compromised. Without a second verification method, that’s all it takes for a bad actor to get into your systems. The fallout of that can be severe.

Here are some examples of what can happen if your business doesn’t use MFA on critical business applications: 

  1. Data Breaches

    Without MFA, hackers can easily gain access to business accounts or systems by stealing or guessing a user’s password. No one’s password policy is good enough to prevent this. Once inside, your sensitive data including customer information, intellectual property, and financial records are at risk. 

  2. Financial Losses

    Along the same lines, without MFA, stolen credentials can give bad actors all the access they need to transfer funds, make unauthorized purchases, or steal sensitive financial information. This can result in significant financial losses, legal fees, and regulatory fines. 

  3. Reputational Damage

    A breach can damage a business’s reputation quickly which is difficult to recover from. Customers may lose trust in your business and look elsewhere. Depending on the severity of the breach, it can cause prospects to think twice about choosing your company. Reputations take a long time to build, can be damaged in an instant, and may take years to recover. 

  4. Compliance Violations

    If your business has cyber-liability insurance (something all businesses should have these days), MFA is a requirement. Failing to adhere to this could risk your insurance coverage. Additionally, many industries, such as healthcare and finance, are subject to strict compliance regulations that require the use of MFA. Failing to comply with these regulations can result in legal penalties, fines, and even license revocation.

  5. Operational Disruption

    The day-to-day impact of a breach resulting from the failure to implement MFA can be damaging on its own. Bad actors who gain access to your business systems can disrupt your operations or even shut down your systems. This results in downtime, lost productivity, lost revenue, and negative customer experiences.

The scary truth is businesses that avoid implementing multi-factor authentication (MFA) put themselves at significant risk for avoidable incidents. Cybercriminals are always looking for easy targets, and the absence of MFA makes your business just that. 

It’s true that implementing MFA won’t solve all security problems; it’s just one part of a robust security posture. But failing to take this foundational prevention step can lead to catastrophic events. The consequences for your business can range from uncomfortable to completely disastrous. 

It’s crucial that businesses take proactive measures to protect themselves and their customers. Implementing MFA on your key business applications is a simple yet effective way to increase security and mitigate risks. As the old saying goes, “an ounce of prevention is worth a pound of cure.”


Are you a current client of CIO Solutions? Talk to your vCIO to continue the conversation!

Not a client yet, but wondering how to improve your IT security? Let’s talk!

Email Safety | 5 Ways to Spot a “Phishy” Email

Quick Tips & Best Practices

We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal.

Threat actors have gotten good at using our busy days and frequent use of email to trick users into providing information, making mistakes, or taking actions. That may look like tricking an Accounts Payable employee into wiring payments to a different account number or getting a user to enter login credentials by pretending to be a well-known company and sending a fake “response required”, “unusual activity”, or “update account details” email.

In the busy day-to-day, here are a couple of tips to keep in mind for practicing email safety both in your work and personal life so you don’t fall victim to these manipulation tactics.

5 Signs an Email Is Suspicious

Bad actors find success when their targets are busy, hurried, and accept things at face value. When you get a suspicious email, PAUSE and check to see if any of these signs are present:

P Passwords or sensitive info requested Pay attention to what the email is asking you to provide (passwords, social security numbers, account information, credit card info, etc.). This information shouldn’t be shared via email.
A Attachments you weren’t expecting Don’t trust attachments you didn’t ask for and avoid opening invoices, Word docs, and any other attachments that you didn’t request or weren’t expecting
U Urgency or intensity in the tone Notice the tone- is the sender requesting secrecy, stating something is past due or urgent, and generally trying to make you react quickly?
S Sender name & domain don’t match Check if the sender’s display name and email address don’t match, (name shows as John Smith, but the email is ra4azeu526@gmail.com) or if the email address domain is unfamiliar (usually from @company.com but this email is coming from @business.com)
E Errors in spelling & grammar Particularly from reputable, large companies, pay attention to spelling and grammar mistakes

Best practices if you think an email is suspicious:

  • HOVER, don’t click
    • Don’t blindly trust the display text, use your cursor to hover over links. This will display what the embedded link address is and give you more information. When in doubt, don’t click.
  • DELETE, don’t engage
    • Err on the side of caution and delete the email from your inbox rather than unsubscribing or engaging with it at all.
  • VERIFY, use a different method of communication to verify the source
    • Don’t respond to the email. Call, text, or chat with colleagues/vendors/executives to verify that email requests are from them.
  • LEAVE, go directly to vendor websites instead of through the email
    • Open your browser and go directly to the company’s website to log in to any accounts, change passwords, etc. Don’t go from any links in the email to reset passwords.

When it comes to email safety, be extremely skeptical.

This is an area in which it’s good to be hesitant, exercise extreme caution, and be wary. Email is quick and convenient, but now more than ever it’s important to slow down, stay vigilant, verify often, and change up communication methods.  

 


Are you a current client of CIO Solutions? Contact your vCIO or Customer Success Manager to continue the conversation around your IT security and anti-phishing education tools!   

Not a client yet, but curious about maturing your IT solutions? Let’s talk!