• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH
IT Infrastructure, Managed Service, Network Security

MSPs: Our Knights in Shining Armor

We asked managed service providers (MSPs) about their experiences helping customers navigate murky waters after they've been compromised.

December 3, 2019 Zachary Comeau Leave a Comment

Managed Service Providers, MSPs, MSP horror stories

Technology managers, IT professionals and managed service providers are often the unsung heroes of the office.

They are the gatekeepers of your company’s secured networks and the knight in shining armor when that network is breached. As such, IT providers usually have some pretty good stories to tell about rescuing their clients from the dungeons of hackers.

If it weren’t for managed service providers keeping us safe, all of our information would be on the dark web and we’d be in the hole a few grand from ransomware.

At a recent ASCII Group summit in Boston, Tech Decisions asked some service providers about their clients, what keeps them up at night, and to expand on some MSP horror stories.

Will O’Neal, founder and president of Mid-Atlantic Computer Solutions

“One of our clients had a relatively new employee who got a text from the boss that said he was super busy and they needed the employee to go the Apple store and buy $900 worth of iTunes gift cards. Another text said to scratch the back and text the numbers to a client at this phone number.

She lost $900. She really wanted to impress the boss. It was just so easy to see what was going on. Thirty seconds after she did it, she knew it just wasn’t right.

There’s a reason hacking is profitable.”

Andy Espo, CEO of Macintosh Consulting

“We had a client who lost $25,000 in a phishing scheme and a week later did exactly the same thing. They lost about $1,000 the second time.

One time, there was an email going around that said hackers were able to compromise clients’ webcams and recorded videos of them having sex. They said,’ If you don’t send us money, we’ll release the video to the internet.’ One of our clients was in PR, and were like, ‘Oh my God, what do I do?’ Relax. It didn’t happen.”

Keith Newell, owner, Kean Computing

“I presented my largest customer with a business continuity solution, but he refused to do it. He said, “You’ve always saved me in the past.”

I made him sign off on that, saying he refused to do the business continuity solution. I’m currently running a business continuity appliance at their office and I’m paying for it as part of our managed services contract just so if s*** does hit the fan, it’s not going to kill me.”

Raffi Jamgotchian, president, CTO of Triada Networks:

“We find many clients have the problem of people hacking into their personal accounts as a means into their business ones. We found that when you educate them on their personal stuff, it trickles down into their business. They tend to take care of their personal stuff more diligently, and that habit can transfer easily to their business.

A niche investment model firm had the owner’s and his assistant’s personal accounts compromised, and as a result, he realized he couldn’t do ANY business from his personal account anymore.”

Read Next: 12 Advanced Commercial Surveillance Cameras for Your Business or Org

Bill Powers, principal at Aurental Consulting and Technology Services

“I had a guy call me up at 10 o’clock on a Friday night, telling me he’d been hacked, his data had been compromised, his company’s data had been compromised, and he didn’t think he was going to survive the weekend. 

I asked him to describe the situation, and he said there was a big red dialogue box up on his computer which read: ‘YOU HAVE BEEN HACKED, DO NOT TURN OFF YOUR COMPUTER & CALL THIS NUMBER IMMEDIATELY!’

You didn’t call the number, did ya? He said no, but I erased everything, including cancelling his credit cards, etc. So I come over on Monday, the screen is still showing the message. I decide I’m going to just shut down the computer. He says ‘oh, no, wait, it says not to do that!’ And I say, ‘I think I’m going to do it anyway, if you don’t mind!’

There was nothing IN the computer, just something ON the computer. If he had made the call, it would have turned out much worse!”

MJ Shoer, founder and principal consultant of MJ Shoer, LLC

“We told a client they needed a new backup, and they said what they were doing was sufficient. Sure enough, their server crashed, it took us days to recover them. The guy had the balls to say to me, ‘WHY DIDN’T YOU JUMP UP ON MY DESK AND YELL AT ME UNTIL I AGREED TO WHAT YOU THOUGHT WAS A BETTER OPTION?!’

‘Because you’re an adult, and I’m not your father!’

I mean, he literally told me he wanted me to jump on his desk like a lunatic and yell at him!”

Tagged With: Cybersecurity, ransomware

Related Content:

  • Thrive SOAR MSSP Thrive Upgrades SOC With SOAR Integration
  • Microsoft Intelligent Data Paltform Microsoft Announces Intelligent Data Platform For Database Integration
  • Why Data and Analytics Are Critical in the…
  • Cisco Catalyst IW9167 Series Cisco Announces Cisco Catalyst IW9167 Series for Industrial,…

Free downloadable guide you may like:

  • The State of the IT Department in 2022

    The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to making business decisions. Check out our new report to see what your peers in IT think about top concerns and opportunities in 2022.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

The State of the IT Department in 2022

The role of the IT professional has shifted from one that supports the business to one that is deserving of a seat at the table when it comes to ma...

Hybrid Work Challenges
The Three Most Common Hybrid Work Challenges Two Years Into the Pandemic

Many of us have been working in a hybrid environment for two years now. Our editors thought this would be a good time to take a look at what’s work...

These 10 IT Certifications Are Critical To An IT Pro’s Success in 2022

Here are 10 cloud, data and security certifications that we identify as critical to an IT professional’s resume in 2022 and beyond, according to a ...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.