Thousands of MSPs engage in merger and acquisition (M&A) discussions each year, and perhaps 1,000 MSPs complete M&A deals during a 12-month window. The M&A discussions can trigger a range of emotions and business outcomes. But now, they can also trigger heightened cyberattack risks.Indeed, businesses must now worry about ransomware attacks that specifically exploit the M&A discussions, according to a Private Industry Notification from the Federal Bureau of Investigation (FBI). The specifics: Ransomware crews are likely using "significant financial events," such as mergers and acquisitions, to identify cyber hijacking targets, the FBI warned in the alert.Back-up critical data offline. Ensure copies of critical data are in the cloud or on an external hard drive or storage device. Secure your back-ups and ensure data is not accessible for modification or deletion from the system where the original data resides. Install and regularly update anti-virus or anti-malware software on all hosts. Only use secure networks and avoid using public Wi-Fi networks. Use two-factor authentication for user login credentials, use authenticator apps rather than email as actors may be in control of victim email accounts and do not click on unsolicited attachments or links in emails. Implement least privilege for file, directory, and network share permissions. Cybersecurity specialists also weighed in on the issue. “Organizations need to consider the cost of the initial ransom requested and the cost of a damaged public image or leaked proprietary information to a competitor,” said Josh Brewton, vCISO at Cyvatar, an Irvine, California-based managed security services provider. “There are many different driving factors, but they all end at the same point; the need for a secure and resilient network utilizing defense-in-depth to minimize the possibility of such events,” he said.Garret Grajek, chief executive at YouAttest, a cloud-based identity and governance administration solution provider, said reconnaissance is a “key part” of any malware attack. “The attackers try to collect as much publicly available information on the target. And now that all entities, people and enterprises are living beings on the internet, there is much to be gathered,” he said. “The key is to assume that data is being collected on the entity that wishes to stay protected and to shore up their defenses.”Additional insights from Joe Panettieri.
Sales and marketing, MSP, Networking
Memo to MSPs: Beware Ransomware Attacks Amid Merger, Acquisition Discussions

Credit: Getty Images
You can skip this ad in 5 seconds