Skip to content

One Thing IT Shouldn't Do For You

“My client’s MSP completes their cyber insurance application for them. They know more about the company's security practices than the client.”, said “Bob” the insurance broker. The business and technology attorney, “Stan”, and I had a similar, alarmed reaction. This lunch comment led the three of us to the all-too-familiar topic:

  • What is an MSP?
  • What do they do?
  • Why does it matter?

It’s common in the technology space to hear people toss around terms and labels for who does what. The problem is, unless you have firsthand knowledge, the words are often misapplied and misunderstood. MSP is a perfect example of this. 


The Perfect Parable

Describing an MSP is like the parable of the elephant and the six blind men.

These men had never seen an elephant and were eager to discover what one looked like. At last, the day came when these six curious men encountered their first elephant. Each touched a part of the elephant. Based on their uninformed experience and limited knowledge, each man decided he knew what an elephant looked like. 

And that’s how an MSP becomes the elephant in the room.



What Is an MSP?


MSP is short for Managed Service Provider. These folks have been outsourced technology providers since the early days of business meets technology. As technology has evolved and become more complex, MSPs’ skills, sophistication, and expertise have remained largely stagnant. 


Why Does This Matter?

This is important. There's a huge disconnect between the services that an MSP provides and the essential expertise that a company leader believes they’re receiving. MSPs imply through omission – and company leaders assume  – that they take care of all your technology needs. This simply isn’t possible. 

Technology's complexity requires a foundation of business-first thinking for even the smallest company.


What Services Do MSPs Provide?

In our experience, MSPs primarily focus on:

  • Applying Windows updates and patches to on-premises servers, desktops, and laptops
  • Some many extend this support to cloud infrastructure providers such as Azure and AWS
  • Supporting on-premises, company-owned devices including servers, desktops, laptops, printers, routers, and switches
  • Third-party backup solution of some kind
  • Microsoft-provided virus protection
  • Some many offer more comprehensive proactive security monitoring through third-party providers



What Don’t MSPs Do?

These are just some of the core technology areas that need continuous oversight in every company:

  • Support employee-owned devices used for company business
  • Support mobile devices
  • Recommend, help create, and enforce company-wide technology policies and procedures
  • Provide systematic, proactive employee onboarding, midboarding, and offboarding support
  • Unless they have hired experienced, certified cybersecurity specialists, they do not provide the essential cybersecurity protection companies expect
  • Support for the software and applications you rely on for day-to-day operations
  • Valuable data protection that we know third-party providers don't provide either
  • Monitoring for unauthorized or potentially risky applications


One additional thought--

While MSPs are third-party providers, your internal IT team often has many of the same skillsets. So whether outsourcing to an MSP or relying on your internal IT folks, you need to have a clear understanding of what they bring to your overall technology foundation. 



What You Should Never Ask IT To Do For You

Coming back to our lunchtime conversation, never ask an internal or outsourced IT team member to complete a cyber insurance – or any form of insurance coverage– application for you.

Why?

Their knowledge of your business and security practices only extends to what they know they have done at a single point in time. 

  • They don't know how third-party application providers safeguard your company data
  • They don't even know where all of your data lives
  • They don't have control over how third-party applications enforce MFA
  • They don't have control over what employees are doing on their personal devices for company business
  • They don't have control over applications that users are downloading or accessing online unless your company has a strict, enforceable shadow IT policy
  • They don't know who has been granted access to your network, and your risk exposure

The list goes on, but you get the point.

A conscientious IT provider wants to please you. This means doing what you ask even when they might be uncomfortable or unqualified to do so.

 

One Easy Action Item

Your business and technology needs are continually changing. Decisions aren't one and done. Scheduling regular conversations with all of your IT team -- both internal and outsourced -- is a smart, tech-savvy leadership practice.

We know the thought of a business-centered conversation with technology people can feel painful. This ebook will help you start the discussion. It includes some questions to ask and plain English answers to listen for. We've also included a handy matrix of who does what on today's IT teams. 

Grab your free copy. No email or annoying lead form required.

 

Working Together

When you're ready to uncover the unexpected possibilities that technology can create for you, your company, and your customers, let’s start with a where-are-you-now discovery. 

Successful companies don’t fall into the one-size-fits-all trap. Together, we’ll build your unique business meets technology roadmap with plenty of actionable questions and practical planning.


Linda Rolf
Fractional CIO Plus
Quest Technology Group
407.843.6603
www.quest-technology-group.com