Skip to content

Adding layers of security with password pepper

When it comes to password security, the more layers of protection your personal or business security system has, the better. There is no such thing as a bullet-proof online service; you never know which malicious tactic hackers may employ to access your accounts. Password pepper is yet another additional security layer protecting against brute force attacks, dictionary attacks, and rainbow tables. Read on to find out what a password pepper is, how it works, and how it can improve your cybersecurity.

What is a password pepper?

The password pepper or peppering—as it’s also called—is strictly connected to the password hashing process. Websites don’t store users’ passwords in plain text because it would allow anyone with access to see them. In most cases, users’ passwords are hashed: Encryption algorithms convert them into complicated strings of characters. This way, even if a site’s database gets breached, hackers must decrypt hashes to get hold of users’ credentials.

A pepper is a secret value—a random string of characters—added to a password before hashing. Unlike salt, another cryptographic way of adding an extra layer of security to your password, pepper doesn’t change. Like a chef’s secret ingredient, it stays the same across all dishes: user’s online accounts or — if part of the source code— across users’ databases.

How does password peppering work?

The password pepper changes the value that’s being hashed, resulting in a modified and more secure password hash. The pepper can be hard-coded into the website’s source code or added manually by the private or business user.

In the first scenario, the online platform’s owner chooses the pepper, taking responsibility for the code’s strength and security. The same pepper is used throughout the site’s database: There are no individual password peppers for users. Following a data breach, hard-coded pepper might be more trouble than it’s worth. If cybercriminals gain access to the source code, they could quickly discover the pepper, and it could compromise the hashed passwords. Also, in this setup, changing the breached pepper requires modifying the source code and redeploying the application, which is rather cumbersome.

For the above reasons, we’ll focus on the second scenario: Peppering passwords by hand. It requires setting up a strong, random code — you can use our password generator for it — and keeping it safe, separately from your login credentials. Adding a pepper to your login credentials means that even if you use a robust password manager like NordPass, you’ll still have to memorize your secret code or keep it in another safe place.

 

Using password peppering to improve your online security

Password peppering can protect your accounts in case your passwords get compromised. The rising numbers of cybercrime—the most lucrative criminal activity nowadays—show that you can never be too careful or introduce too many layers of protection. No online service provider may be completely bullet-proof breach-wise, which is what LastPass learned the hard way at the end of 2022.

Adding a pepper to your passwords has to be done manually, which extends the time needed to access your accounts. It can be annoying, especially if you are used to the seamless login experience, but it will definitely improve your online security.

People are creatures of habit and convenience and tend to ditch the security practices that are too demanding. Hence, we do not recommend peppering all your passwords — pepper the most important ones. Here’s how to do it:

  1. Create a strong and complex pepper you’ll be able to remember.

    You can think of a pepper as a password: the longer and more complex it is, the better. Make it random and use different kinds of symbols. However, don’t go overboard; the best way to keep your pepper safe is to memorize it!

  2. Create your “base password” and store it in your password manager.

    Use a password generator to create a complex string of characters: Let’s call it “your base password.” Now, save it in your password manager’s encrypted vault.

  3. Add password pepper and update passwords to your most important accounts.

    Once you’ve created your base password, add the pepper and that will be your actual new password. Update your most important accounts using it. Now, when logging in, you’ll have to add the pepper every time to access the account.

    Note: You can include the pepper anywhere in the string of characters constituting your base password. However, to avoid overcomplicating it, add it at the beginning or end of your base password.

  4. Don’t store your pepper in the password manager vault.

    The idea behind peppering your passwords is not to keep all your eggs in one basket. Hence, keeping your secret code in your password manager vault doesn’t make sense. If your passwords leak, the pepper leaks as well. To make password peppering work, keep your pepper safe somewhere else, preferably your head.

Password peppering from a business perspective

From a business perspective, password peppering can cause more trouble than it’s worth. It may interrupt the teams’ cooperation and information sharing, extend the time spent on tasks that could easily be automated, and mess up the results of compliance and password security audits.

Let’s look at other security measures more suited to the business environment. Unlike password peppering, they promote transparency and allow immediate response to cyber threats.

  • Password policy

The password policy is a set of rules and guidelines for creating and managing passwords in the organization. It informs employees how long their passwords should be, what kinds of characters they need to include, and how often they should change them. When enforced automatically by the company’s password manager, password policies give business network administrators control over every password used in their company.

  • Password health

Password health metrics track your company’s vulnerable passwords. The NordPass Password Health feature provides insight into the weak, older than 90 days, and reused passwords employees rely on. It allows omitting the risk of data breaches connected with weak passwords instead of mitigating the results of hacker attacks.

  • Data Breach Scanner

Data Breach Scanner notifies you in real time about all data leaks related to your company emails and domains. It can be a real game-changer since, according to IBM’s 2023 data security report, companies take 277 days on average to identify and contain a breach. If you respond to the security incident at once, chances are cybercriminals won’t have enough time to use the information against your company.

These are pivotal years for password security. We’re witnessing a shift towards a more user-friendly and secure authentication method: passkeys. Passkeys allow access to your online accounts the same way you unlock your smartphone—via fingerprint or face ID. This new technology combines biometric verification with cryptographic keys, reducing the risks of phishing, brute-force attacks, and other cyber threats.

Some of the largest tech giants—including Amazon, Apple, Google, and Meta—have already joined the FIDO Alliance, an industry association created to “solve the world’s password problem.” NordPass is also a part of FIDO and, along with other members, actively promotes passkeys and makes them accessible to users. That’s why our password manager provides you a way to securely store, access, and share passkeys.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Understanding the Business Continuity Plan (BCP) and Its Importance

These days, cybercrime is rampant. It’s no longer a matter of “if” you’re going to suffer an attack but “when” it will happen. All companies want to be ready for any crisis – that’s where a business continuity plan comes into play. 

Setting up a strategy helps understand the next steps during and following a potential cyber incident. So what is a business continuity plan, exactly? What does it encompass? And what makes it so important to organizations? Today, we’re exploring all these questions in-depth.

What is a business continuity plan?

A business continuity plan (BCP) is a document that sets guidelines for how an organization should continue its operations in the event of a disruption, such as fires, floods, other natural disasters, or cybersecurity incidents. A BCP aims to help organizations resume operations without significant downtime.

Despite their utility for business security, BPCs are not as commonplace as expected. According to ZipDo, 43% of businesses across the globe don’t have a business continuity plan in place.

Business continuity vs disaster recovery plan: What’s the difference?

Sometimes, people use the terms disaster recovery plan (DRP) and business continuity plan (BCP) interchangeably. However, these are two separate types of plans. A business continuity plan helps organizations stay prepared to deal with a potential crisis and, hence, usually encompasses a disaster recovery plan. Although the two overlap and are often set into motion to optimize procedures during crisis events, their purposes differ.

The key difference between BCPs and DRPs is their goal. Business continuity plans aim to reduce downtime during the incident to a minimum. Disaster recovery plans focus on reducing any faults or abnormalities in the system caused by the event and returning things back to normal. They also tend to be more extensive, including additional steps like containing, examining, and restoring operations and covering employee safety measures.

In terms of functionality, a disaster recovery plan focuses on operational steps to restore data access to business as usual following an incident. On the other hand, a business recovery plan is set in place while the incident is still ongoing, ensuring that the operations proceed despite the circumstances.

Benefits of business continuity planning

The number of news headlines announcing data breaches has numbed us to the fact that cybercrime is very real and frequent and poses an existential risk to companies of all sizes and industries.

According to the 2023 Data Breach Investigations report, ransomware is present in 24% of all breaches and is among the top four most common types of cyberattacks. In fact, 24% of breaches involved ransomware, with damages costing businesses an average of $4.82 million.

Most cyberattacks are financially motivated, as the global cost of cybercrime exceeded $8 trillion in 2022 and is expected to exceed $13 trillion by 2028. The picture is quite clear — cybercrime is a lucrative venture for bad actors and potentially disastrous for those on the receiving end.

The importance of business continuity plans cannot be understated, as to thrive in these unpredictable times, organizations go beyond conventional security measures. Many companies develop a BCP parallel to secure infrastructure and consider it a critical part of the security ecosystem. The purpose of a business continuity plan is to significantly reduce the downtime in an emergency and, in turn, reduce the potential reputational damage and — of course — revenue losses.

Business continuity plan template

Business Continuity Plan Example

[Company Name]

[Date]

I. Introduction

  • Purpose of the Plan

  • Scope of the Plan

  • Budget

  • Timeline

The initial stage of developing a business continuity plan starts with a statement of the plan’s purpose. It explains the main objective of the plan, such as ensuring the organization’s ability to continue its operations during and after a disruptive event.

The Scope of the Plan outlines the areas or functions that the plan will cover, including business processes, personnel, equipment, and technology.

The Budget specifies the estimated financial resources required to implement and maintain the BCP. This includes costs related to technology, personnel, equipment, training, and other necessary expenses.

The Timeline provides a detailed schedule for developing, implementing, testing, and updating the BCP.

II. Risk Assessment

  • Identification of Risks

  • Prioritization of Risks

  • Mitigation Strategies

The Risk Assessment section is an essential part of the business continuity plan that identifies potential risks that can disrupt an organization’s critical functions.

The Identification of Risks involves identifying potential threats to the organization, such as cybersecurity breaches, supply chain disruptions, or power outages. This step is critical to understand the risks and their potential impact on the organization.

Once the risks have been identified, the Prioritization of Risks follows, which helps determine which risks require the most attention and resources.

The final step in the Risk Assessment section is developing Mitigation Strategies to minimize the impact of identified risks. Mitigation strategies may include preventative measures, such as system redundancies, data backups, and cybersecurity measures, as well as response and recovery measures, such as emergency protocols and employee training.

III. Emergency Response

  • Emergency Response Team

  • Communication Plan

  • Emergency Procedures

This section of the plan focuses on immediate actions that should be taken to ensure the safety and well-being of employees and minimize the event’s impact on the organization’s operations.

The Emergency Response Team manages the response to an emergency or disaster situation. This team should be composed of individuals trained in emergency response procedures who can act quickly and decisively during an emergency. The team should also include a designated leader coordinating the emergency response efforts.

The Communication Plan outlines how information will be disseminated during an emergency situation. It includes contact information for employees, stakeholders, and emergency response personnel, as well as protocols for communicating with these individuals.

The Emergency Procedures detail the steps during an emergency or disaster situation. They should be developed based on the potential risks identified in the Risk Assessment section. The procedures should be tested regularly to ensure their effectiveness.

IV. Business Impact Analysis

The Business Impact Analysis (BIA) section of a business continuity plan is a critical step in identifying the potential impact of a disruption to an organization’s critical operations.

The BIA is typically conducted by a team of individuals who understand the organization’s critical functions and can assess the potential impact of a disruption. The team may include representatives from various departments, including finance, operations, IT, and human resources.

V. Recovery and Restoration

  • Procedures for Recovery and Restoration of Critical Processes

  • Prioritization of Recovery Efforts

  • Establishment of Recovery Time Objectives

     

The Recovery and Restoration section of a Business Continuity Plan (BCP) outlines the procedures for recovering and restoring critical processes and functions following a disruption.

The Procedures for Recovery and Restoration of Critical Processes describe the steps required to restore critical processes and functions following a disruption. This may include steps such as relocating to alternate facilities, restoring data and systems, and re-establishing key business relationships.

The Prioritization of Recovery Efforts section identifies the order in which critical processes will be restored based on their importance to the organization’s operations and the overall mission.

Recovery time objectives (RTOs) define the maximum amount of time that critical processes and functions can be unavailable following a disruption. Establishing RTOs ensures that recovery efforts are focused on restoring critical functions within a specific timeframe.

VI. Plan Activation

  • Plan Activation Procedures

The Plan Activation section is critical in ensuring that an organization can quickly and effectively activate the plan and respond to a potential emergency.

The Plan Activation Procedures describe the steps required to activate the BCP in response to a disruption. The procedures should be clear and concise, with specific instructions for each step to ensure a prompt and effective response.

VII. Testing and Maintenance

  • Testing Procedures

  • Maintenance Procedures

  • Review and Update Procedures

This section of the plan is critical to ensure that an organization can effectively respond to disruptions and quickly resume its essential functions.

Testing Procedures may include scenarios such as natural disasters, cyber-attacks, and other potential risks. Clear objectives, testing scenarios, roles and responsibilities, and evaluation criteria to assess the plan’s effectiveness are also part of the procedural structure.

The Maintenance Procedures detail the steps necessary to keep the BCP up-to-date and relevant.

The Review and Update Procedures describe how the BCP will be reviewed and updated regularly to ensure its continued effectiveness. This may involve reviewing the plan regularly or after significant changes to the organization’s operations or threats.

What should a business continuity plan checklist include?

Organizations looking to develop a BCP have a lot to consider. Variables such as the organization’s size, its IT infrastructure, personnel, and resources all play a significant role in developing a continuity plan. Remember, each crisis is different, and each organization will have its own view on handling it according to all the variables in play. However, all business continuity plans include a few fundamental elements.

  • Clearly defined areas of responsibility

    A BCP should define specific roles and responsibilities for emergencies. You must detail who’s responsible for what tasks and clarify what course of action a person in a specific position should take. Clearly defined roles and responsibilities in an emergency event allow you to act quickly and decisively and minimize potential damage.

  • Crisis communication plan

    In an emergency, communication is vital. It is the determining factor in crisis handling. Establishing clear and effective communication pipelines is critical. Alternative communication channels should not be overlooked either. Make sure to outline them in your business continuity plan.

  • Recovery teams

    A recovery team is a collective of professionals who ensure that business operations are restored as soon as possible after the organization confronts a crisis.

  • Alternative site of operations

    Today, when we think of an incident in a business environment, we usually think of a cybersecurity-related event. However, as discussed earlier, a BCP covers many possible incidents. In a natural disaster, determine potential alternate sites where the company could continue to operate.

  • Backup power and data backups

    Whether a cyber event or a real-life physical incident, ensuring that you have access to a power source is crucial to continue operations. A BCP often contains lists of alternative power sources like generators, locations of such tools, and who should oversee them. The same applies to data – regularly scheduled backups can significantly reduce potential losses incurred by a crisis event.

  • Recovery guidelines

    If a crisis is significant, a comprehensive business continuity plan usually includes detailed guidelines on how the recovery process will be carried out.

Business continuity planning steps

business continuity plan steps

Here are some general guidelines that an organization looking to develop a BCP should consider:

Analysis

A business continuity plan should include an in-depth analysis of everything that could negatively affect organizational infrastructure and operations. The analysis phase should also include assessing different levels of risk.

Design and development

Once you have a clear overview of potential risks your company could face, start developing a plan. Create a draft and reassess it to see if it accounts for even the smallest of details.

Implementation

It’s critical to get everyone on the same page regarding crisis management. Implement the BCP within the organization by providing training sessions for the staff to familiarize themselves with the plan.

Testing

Make sure to test the plan rigorously. Run through a variety of scenarios in training sessions to assess its overall effectiveness. By doing so, everyone on the team will be closely familiar with the business continuity plan’s guidelines.

Maintenance and updating

The threat landscape constantly changes and evolves, which means you should regularly reassess your BCP and take steps to update it. By tuning your continuity plan to recent developments, you can stay one step ahead of a crisis.

Business continuity planning standards

Business continuity plans don’t just appear out of thin air. They must strictly adhere to industry standards, including ISO and regional standards, to ensure that business is sufficiently prepared for a crisis scenario.

Following a standard is advantageous to businesses as the relevant information and the requirements are continuously being updated. This ensures that the implemented strategies don’t fall behind the security requirements. The ISO 223XX standard series, in particular, aims to provide a clear and internationally recognized framework for continuity planning.

ISO 22301

ISO 22301, or the Security and Resilience Standard, provides organizations with a framework to plan, operate, improve, and otherwise maintain response and recovery strategies. The business continuity plan acts as the documented management system (known as a business continuity management system, or BCMS) that aims to prevent disruptive incidents and, if they occur, ensure a full recovery. It goes hand in hand with ISO 22313.

ISO 22313

This business continuity plan standard provides guidance on implementing the ISO 22301 requirements. It details the precise steps on how the business continuity management system should be implemented in an organization.

ISO 27001

ISO 27001 provides a framework for managing information security. This standard ensures that an organization implements the right risk assessment and controls to upkeep the development, improvement, and protection of information management systems (ISMS). The NordPass ISMS is certified according to ISO 27001.

ISO/IEC 27031

These guidelines cover the principles of how ready an organization’s information and communication technology (ICT) infrastructure should be for business continuity. It covers all potential events and incidents that may impact the infrastructure, leading to the implementation of a BCP.

ISO 31000

ISO 31000, or the Risk Management Standard, exists to help all organizations handle potential risks. Its main purpose is to allow organizations to compare their internal risk management practices to the global standards. However, ISO 31000 can’t be used for certification purposes.

Level up your company’s security with NordPass Business

A comprehensive business continuity plan is vital for the entire organization’s security posture. However, in a perfect world, you wouldn’t have to use it. That’s is where NordPass Business can help.

Weak, reused, or compromised passwords are often cited among the top contributing factors in data breaches – unsurprising, considering that an average user has around 170 passwords. Password fatigue is real and significantly affects how people treat their credentials. NordPass Business counters these issues.

With NordPass Business, your team will have a single secure place to store all work-related passwords, credit cards, and other sensitive information. Accessing all the data stored in NordPass is quick and easy, which allows your employees not to be distracted by the task of finding the correct passwords for the correct account.

NordPass Enterprise helps keep your corporate credentials secure at all times. Everything stored in the NordPass vault is secured with advanced xChaCha20 encryption, which would take hundreds of years to brute force.

If you’are interested in learning more about NordPass Business and how it can help fortify corporate security, do not hesitate to book a demo with our representative.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

NordLayer features in review: Active Session Timeout

Logging into your organization’s network is one of the first things employees go through daily. Each successful authentication also opens up a direct route into your company’s resources, creating a session between the two systems. 

However, trust shouldn’t be without limits—indefinitely keeping the session open can be detrimental to your security. This is something that a hacker could exploit when looking for ways to hijack your employees’ connections. Therefore, NordLayer unveils a new security feature designed to prevent this risk—Active Session Timeout.

Active Session Timeout using NordLayer

The new NordLayer feature allows you to choose a user’s session duration. When the time expires, the user is logged out from the Control Panel or NordLayer application and required to re-authenticate. This makes the action window during which the hacker could decrypt the connection shorter, making it much harder to hijack. This can be very beneficial if your users are handling sensitive data.

How does NordLayer’s Active Session Timeout feature work?

This feature automatically logs users out of the NordLayer application or Control Panel after the set period. It affects all users regardless of whether they were connected to the gateway during that time.

The setting is enforced automatically, and the session length can be adjusted by the admin in the Control Panel for the entire organization. The minimum duration length in the Control Panel and application can be set up to 1 day. Meanwhile, NordLayer’s default—and maximum—session duration time is 30 days. It adds a safeguard that is sure to be appreciated by a company’s IT personnel.

How is NordLayer’s Active Session Timeout different?

Unlike typical session management, NordLayer’s feature offers more flexibility and control. It not only addresses the typical use cases but also adds an extra layer of security, which is especially useful in remote working scenarios:

  • The feature will have a setting allowing you to select a preferred session duration period.

  • Session control has a predefined optimal default time of 30 days if there’s no preference for session duration time.

  • The functionality is applicable for both Control Panel and NordLayer application, so gives more control to manage admins’ and users’ reauthentication.

 

Benefits of Active Session Timeout

Stricter session management is recommended by various organizations like The Open Web Application Security Project (OWASP). It can significantly contribute to your organization’s cybersecurity hygiene.

The benefits of Active Session Timeout controls include better security adherence in the organization, more efficient users and internal policy management, and increased overall network and data protection.

  • Enhanced security: shorter session durations minimize the window of opportunity for unauthorized access.

  • Compliance alignment: the feature allows organizations to align with security protocols, thus reducing vulnerabilities.

  • Risk mitigation: in scenarios like device theft, the exposure period is significantly reduced, leaving a smaller time window for bad actors to exploit.

  • Integrates with Single sign-on authentication schemes. This feature enables network administrators to control access to work resources more precisely and align them with their internal policies.

This functionality has benefits to all organization units, from the end user to the manager:

Benefits of the Active Session Timeout by NordLayer

Overall the feature automates and optimizes processes for all organization units, adding an additional functionality to network and data security.

Entering NordLayer’s Active Session Timeout

To adjust your currently used session duration:

  1. Head to the Control Panel and click Settings

  2. Select Security configurations and find the Active Session Timeout section

This allows you to change session duration times for your users in applications and the Control Panel. You can choose the desired time from 1 day to 30 from the dropdown menu.

The user will be shown a dialog box just before the session ends, asking to reauthenticate to start a new session running.

How to set session duration in the NordLayer Control Panel

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Expanding MSPs and MSSPs with cybersecurity solutions

The landscape for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) is on the brink of significant transformation. As businesses increasingly depend on digital technologies, the role of MSPs and MSSPs is expanding beyond traditional IT services to more complex and integrated solutions, particularly in cybersecurity. 

Key takeaways

  • Market growth and investment in security: Gartner’s projection that security service spending will reach $90 billion in 2024 highlights a growing demand for comprehensive cybersecurity services.

  • Cybersecurity as a central focus: with 42% of security and risk management spending geared towards security services, MSPs and MSSPs must prioritize enhancing their cybersecurity capabilities to grow and expand customer relationships.

  • The critical role of SSE in cybersecurity: the integration of Secure Service Edge (SSE) frameworks, including technologies like ZTNA, FWaaS, CASB, and SWG, is essential for MSPs and MSSPs to protect client data and ensure robust network security efficiently.

  • Expanding service offerings: with cloud security, data protection, and identity and access management, an MSP business can differentiate itself, attract more clients, and enter new markets.

  • Enhancing client retention and trust: effective data protection and robust IAM practices not only retain clients but also build trust, positioning MSPs and MSSPs as reliable partners in cybersecurity.

  • Scalability and compliance: offering scalable solutions and staying ahead of compliance help MSPs and MSSPs meet the evolving needs of their clients and adhere to regulatory requirements.

According to Gartner, spending on security services, which includes consulting, IT outsourcing, implementation, and hardware support, is anticipated to reach $90 billion in 2024. This impressive figure highlights how businesses increasingly prioritize fortifying their digital defenses.

Moreover, the global market for managed security services is expected to grow at an average annual growth rate (CAGR) of 11.66% over the next five years, with a projected market size of $36,129 million by 2024. This rapid growth underscores an expanding opportunity for MSPs and MSSPs to offer comprehensive cybersecurity services.

The emphasis on cybersecurity is more pronounced than ever, with 42% of security and risk management spending expected to be directed towards security services. This trend indicates a shift from traditional IT support to more specialized security-focused offerings.

For MSPs and MSSPs, this move means that enhancing their cybersecurity capabilities is not just an option but a necessity. As cyber threats evolve and multiply, providing robust security solutions will be a critical factor in maintaining and expanding new customer relationships.

Cybersecurity solutions for MSPs’ and MSSPs’ growth

MSPs and MSSPs are pivotal in safeguarding client data and ensuring robust network security for companies that need external security and technological support. But what solutions best aid MSPs and MSSPs in this task?

The Security Service Edge (SSE) framework is an agile and flexible solution that is easy to customize based on business needs. SSE through Zero Trust Network Access (ZTNA) combines access controls, FWaaS helps with network segmentation by managing the traffic flow, Cloud Access Security Broker (CASB) enhances cloud security, while Secure Web Gateway (SWG) prevents unsecured traffic from entering the network.

By strategically adopting SSE frameworks, MSP and MSSP providers can leverage advanced cybersecurity solutions like cloud security, data protection, and Identity and Access Management (IAM) to drive business growth and enhance client safety.

Cloud security

At the heart of SSE, cloud security is fundamental for MSPs and MSSPs aiming to protect clients’ cloud-based systems and data. This solution includes encrypting data both at rest and in transit, deploying security configurations that automatically update to counter new threats, and implementing strict access controls.

By offering comprehensive cloud services, MSPs and MSSPs can assure clients of their ability to protect sensitive information against emerging threats, thus strengthening client trust and satisfaction. It’s crucial for establishing new customers and expanding on MSP growth.

Data protection

Data is the lifeline of modern businesses, making its protection critical to expanding for sustained growth and compliance. Under SSE, data protection strategies encompass various technologies like backup solutions, encryption, and intrusion detection systems.

These tools help MSPs and MSSPs prevent data breaches and ensure quick recovery from incidents, minimizing downtime and financial loss. Effective data protection not only helps retain existing clients but also positions MSPs and MSSPs as reliable guardians of data security that are attractive to prospective clients.

Identity and access management (IAM)

IAM is crucial for controlling who can access what within a network. This includes multi-factor authentication, single sign-on services, and user access reviews., All of these are aligned with SSE principles to ensure that only authorized users gain entry to sensitive systems and data.

By implementing robust IAM practices, MSPs and MSSPs can offer tailored access solutions that bolster security while improving the user experience. This supports client operations in a secure, efficient manner.

SSE solutions benefits for MSPs and MSSPs

  • Expanding service offerings: By adding cutting-edge SSE solutions in cybersecurity offerings, MSPs and MSSPs can differentiate themselves from competitors, appeal to a broader client base, and enter new markets.

  • Enhancing client retention: by providing dependable, state-of-the-art cybersecurity measures, MSPs and MSSPs can improve client satisfaction and loyalty while increasing their revenue. Clients who feel their data is secure are more likely to renew their contracts.

  • Building trust through compliance: demonstrating compliance with data protection regulations makes MSPs and MSSPs providers partners of choice in industries where data security is paramount.

  • Offering scalable solutions: SSE enables the provision of scalable cybersecurity solutions that grow with clients’ businesses. This flexibility is attractive to clients at all growth stages, ensuring that MSPs and MSSPs can meet evolving security needs.

By focusing on primary challenges to counter modern cyber threats and offering tailored advanced security solutions, MSPs and MSSPs can position themselves as strategic partners in their clients’ digital transformation journeys. These solutions are not complex, resource-intense, and complex

Cloud services allow managed service providers to expand their scope and revenue with little costs for clients, making it a win-win situation for all parties.

Expand MSPs and MSSPs with NordLayer

To capitalize on growth opportunities, MSPs and MSSPs must focus on expanding their service offerings. Opting to collaborate with a strong partner ensures a firm background for future client relationships.

While MSPs and MSSPs operate as consulting services that help businesses understand and implement the right security strategies for their specific needs, NordLayer stands strong as a network access security tool provider that offers solutions in different setups:

Secure Remote Access

Scenario: With a dispersed workforce, companies need to ensure secure access to corporate resources from anywhere in the world.

NordLayer solution: Provides secure and scalable remote access solutions that MSPs can manage for their clients, ensuring employees can access what they need securely and efficiently.

Enhanced network security

Scenario: Businesses face increasing threats from cyber attacks but often lack the internal expertise to effectively counter these risks.

NordLayer solution: Offers advanced network security features, including threat protection and data encryption, enabling MSPs to bolster their clients’ defenses against cyber threats.

Simplified compliance

Scenario: Companies operating in regulated industries require robust compliance measures to protect sensitive data and avoid penalties.

NordLayer solution: Helps MSPs ensure their clients meet compliance standards by providing tools for data protection, secure access, and audit trails.

Streamlined IT infrastructure

Scenario: Businesses seek to minimize IT complexity while ensuring their teams have the necessary tools and access.

NordLayer solution: Enables MSPs to offer streamlined, cloud-based security solutions, reducing the need for multiple vendors and simplifying the IT landscape for their clients.

Cybersecurity without internal experts

Scenario: Many SMBs cannot afford or find the cybersecurity talent needed to protect their operations.

NordLayer solution: MSPs can step in to fill this gap, using NordLayer’s intuitive platform to provide top-notch cybersecurity services without the need for in-house experts.

Scalable security solutions

Scenario: Growing businesses need security solutions that can expand with them without requiring constant reinvestment or reconfiguration.

NordLayer solution: Offers scalable security services that MSPs can easily adjust to fit the changing needs of their clients, supporting growth without compromising security.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

Dealing with a loved one’s digital presence after they’re gone: What does our new study reveal?

What happens to someone’s email when they pass? Or how do you close a deceased person’s social media profiles? Do the digital pieces of our existence just fade into nothingness or maybe remain out there indefinitely?

These and other questions are no longer just morbid curiosity but rather something that most of us will have to tackle in our lifetime. Taking care of your loved ones digital legacy can be  challenging, not only because of the obvious emotional load but also because you might not know where and how to start.

Today, we’re diving into the topic of digital legacy and our latest research on the challenges related to its management.

Research findings

At NordPass, we recently conducted a market study on digital legacy — the online privacy paradox of a deceased person. It revealed that in order to close all accounts of the deceased, you have to equip yourself with loads of different documents, collect as much information about the deceased as possible, and be ready to use all kinds of communication channels.

During the research, we found that about 36% of analyzed online platforms publicly provide guidance on how to manage accounts posthumously. The information presented on their websites or other official channels allowed our team to draw some illustrative conclusions.

First, the process of managing digital legacy is not only filled with red tape but also rather varied across different platforms and services. In some cases, you might be asked to fill out an online form, while in other instances a platform might ask you to contact them via email, phone, post, or even schedule an in-person appointment.

When you request an account closure for a deceased person, the platforms usually ask for official documentation, including, but not limited, to death certificates, personal identification, and even legal confirmation of the right to manage a deceased’s estate. Researchers noticed that to close down the majority of a deceased’s accounts, you might need to provide over 20 different documents.

It means that, in theory, certain platforms might ask only for, let’s say, your passport, deceased’s death certificate, and the last will, while other sites might require completely different documents. This could be an obituary, birth or marriage certificate, last will, power of attorney, a small estate affidavit, or other documents. In certain cases, these documents might be required to be officially translated and notarized, which is yet another burden.

In addition to legal documentation, platforms ask for various information about the deceased. For instance, a full legal name, display name, username, email, phone number, social security number, account number, or full payment information used to pay for the platform’s service. This extended list of required information can be rather overwhelming, especially because we often don’t have ready access to all the details of our loved ones’ online accounts and financial activities. Not knowing these specifics can add to the stress and overall emotional burden during an already difficult time.

While there are many cases when people simply leave their deceased relatives’ or friends’ accounts hanging out there on the internet indefinitely, our researchers also looked into platforms’ policies regarding inactive accounts. They found that a quarter of companies publicly note that they remove inactive accounts. Of those, most do so after two years of inactivity, but some say they remove the accounts only after seven years.

Up to 6% of the analyzed platforms also offer internet users another way to handle online accounts — to memorialize the account of the deceased, which means it remains publicly visible but is marked for people to know the person is deceased.

Considering the sheer number of online accounts that a person accumulates over their lifetime, many of which are forgotten, the task of completely terminating a person’s digital footprint once they pass becomes a challenging, if not all-out, impossible task. Another study that we’ve recently conducted showcased that, on average, a person has around ​​168 passwords on their hands. Unfortunately, even if you have all the necessary documentation and procedural knowledge, the accounts of a deceased person might linger on the internet indefinitely just because you never knew about them, and that’s something that we might need to come to terms with.

Research methodology: The market desk research was conducted by NordPass. The company’s researchers evaluated 100 popular online platforms worldwide, chosen based on Statista and SimilarWeb information.

To conduct this study, researchers looked only at publicly available sources online—platforms’ owned websites or official accounts. They looked for information on how to close deceased accounts and investigated how many platforms provide such information, what procedures they offer, what documents and personal information items they ask for, and what are their policies regarding inactive accounts.

What is digital legacy, and why it’s important

You can think of digital legacy as a collection of data and overall presence left behind online when someone passes. The data includes social media profiles, email accounts, photos stored online, online shopping accounts, and other digital interactions. Just as physical possessions are part of someone’s life, digital content can also be an inseparable part of an individual’s legacy that needs to be managed once they’re no longer here.

Emotional importance

Today, the moments we cherish, more often than not, end up stored online. Just think about it: Photos, videos, as well as conversations are stored on social media platforms. When taking care of your loved ones digital legacy, consider whether the loved one wished to terminate their online data or was okay with allowing you to make the choice.

Quite often, digital legacies, much like traditional wills, can carry substantial financial and legal weight. It is critical to handle such digital assets to ensure that the accounts are appropriately closed or transferred to legal heirs. Failing to do so could lead to legal disputes.

Security concerns

Unsecured digital legacies are prone to breaches and data misuse. Cybercrooks are essentially free to try and access inactive accounts for as long as they like to get their hands on the data behind the account. All that data might be used for identity theft or fraud. Ensuring the security of posthumous accounts protects not only the person’s legacy but also the surviving relatives’ private and financial data.

Tips and strategies to ease digital legacy management

If you find yourself in a situation where you’re tasked with managing someone’s digital legacy, here are some tips to make the complex and emotionally overwhelming process a little bit easier and more efficient.

Start with financial accounts

When it comes to the first steps in effective digital legacy management and planning, focus on financial accounts first: These include bank accounts, investment portfolios, digital payment apps, and similar. Try to prioritize closing or transferring such accounts to prevent any financial losses or troubles. Furthermore, once you close down the financial accounts, you will also essentially cut out any subscriptions that a deceased person might have had and, by extension, those accounts as well. Taking care of accounts related to finance will likely take up a sizable chunk of time due to excessive red tape associated with finance, but once those accounts are sorted, everything else will go down quicker and easier.

Advise your loved one to use digital legacy features

Today, quite a few online services and platforms offer distinct features designed to manage accounts once someone passes away. For example, Facebook allows users to appoint a “Legacy Contact,” who can manage a user’s account in the event of their death. Apple and Google have also introduced ways to designate individuals who can access the deceased account. Consider having a talk with your loved ones about such features and their importance.

Secure account information

Using a password manager to manage logins along with other sensitive data is recommended not only for when you are alive and well but as a part of your digital legacy management. Password managers provide storage for passwords and often come equipped with a variety of security features that allow you to protect sensitive data that you might come across while dealing with a deceased’s digital legacy. For instance, NordPass comes with Emergency Access—a feature that allows you to designate an individual who would have access to your NordPass vault in the case of an emergency.

Educate and prepare

These days, it is absolutely critical to be aware of the digital legacy concept; after all, it concerns every one of us. While the topic might be morbid, discussing digital legacies with your family and friends is essential. It’s important to encourage them to take their own steps in managing their digital presence as well as to make your loved ones aware of your digital legacy plans.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×