Atluri, Gresshma (2025) Backdoors to the enterprise: Cyber threats and defense tactics for network managed service providers. World Journal of Advanced Research and Reviews, 26 (2). pp. 1381-1394. ISSN 2581-9615
![WJARR-2025-1677.pdf [thumbnail of WJARR-2025-1677.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-1677.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Managed Service Providers (MSPs) have emerged as critical components in the modern cybersecurity landscape, creating unique security challenges due to their privileged access across multiple client environments. This trusted position establishes MSPs as high-value targets for sophisticated threat actors seeking to compromise numerous organizations through a single-entry point. Key vulnerabilities include privileged credentials mismanagement, insufficient network segmentation, Remote Monitoring and Management (RMM) tool exploitation, and inconsistent security implementation across client environments. Effective defense mechanisms incorporate Zero Trust principles, privileged access management, client network segregation, comprehensive monitoring, regular security assessments, and defense-in-depth strategies. As the threat landscape evolves, MSPs must adapt through specialized threat intelligence, security awareness training, information sharing, continuous control improvement, and advanced detection technologies. Emerging challenges encompass hybrid cloud architectures, IoT proliferation, supply chain attacks, regulatory requirements, quantum computing threats, talent shortages, AI-enhanced attacks, and edge computing security considerations.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.2.1677 |
Uncontrolled Keywords: | Access Management; Cloud Security; Credential Protection; Network Segregation; Threat Intelligence |
Depositing User: | Editor WJARR |
Date Deposited: | 20 Aug 2025 10:41 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/2857 |