Blogs
on October 8, 2024
Chase, please tell us about your background and what brought you to your role as Principal Strategist at JumpCloud.
I’ve spent over a decade in the tech industry, in cloud computing and cybersecurity. Over that time, I’ve been able to indulge my passion for all things identity-related and JumpCloud has been a perfect fit. JumpCloud’s mission to simplify and secure IT management for businesses of all sizes— especially for the traditionally overlooked small and medium-sized enterprises (SMEs)—is unique, and I’d argue we’re uniquely good at it. My role is to help shape our product vision to ensure we’re meeting the evolving needs of our customers in an increasingly complex IT landscape.
The survey highlights a growing reliance on Managed Service Providers (MSPs) for IT management. What implications does this have for cybersecurity?
The increasing reliance is an interesting one. Consider that 76% of SMEs rely on an MSP for at least some functions. SMEs report that better security, productivity, and cost-savings are all key benefits of using an MSP—but—there are also signs that SMEs are starting to expect more from their MSP partners. On one hand, MSPs give SMEs access to more advanced security tools and practices, which can significantly enhance an SME’s security posture. However, this also introduces some risk, as attackers could target MSPs to try to gain access to multiple client networks and we’ve seen examples of this with recent supply chain attacks. So SMEs are understandably a little wary: while 67% of SMEs plan to increase their MSP investment over the next 12 months, 39% are concerned about how MSPs handle security. It’s crucial for SMEs to maintain visibility and control over their IT landscape, even when working with an MSP.
What are the key security considerations that IT departments should keep in mind when working with MSPs?
Clear communication and defined responsibilities are critical. IT departments should ensure there’s a comprehensive understanding of which security tasks are handled by the MSP and which remain in-house. Conduct regular security audits of the MSP’s practices. Data handling and privacy should be clearly outlined in service agreements, with strict protocols for how the MSP accesses and manages sensitive information. It’s also important to have a well-defined incident response plan that outlines how security events will be handled and communicated between the MSP and the client.
IT departments should also maintain oversight and not completely abdicate their security responsibilities because they think their MSP will handle everything. Regularly reviewing logs, access patterns, and security reports from the MSP can help maintain this oversight.
To Know More, Read Full Interview @ https://ai-techpark.com/aitech-interview-with-chase-doelling/
Related Articles -
Top Five Best AI Coding Assistant Tools
Spatial Computing Future of Tech
Trending Category - Mobile Fitness/Health Apps/ Fitness wearables
Posted in: Business
Topics:
aitech interview, chase doelling, cloud computing, cybersecurity, identity and access management, jumpcloud, threat detection
Be the first person to like this.