The Outsourced IT Provider Playbook: What You Should Expect from Your MSPLet me ask you something.

If you hired a security guard for your building, would you be okay if they only showed up after a break-in?

Of course not.

So why settle for an IT provider who only reacts when something goes wrong?

🧠 What Most Business Owners Think

A lot of business owners see their MSP as the “fix-it” team.
Something breaks, they call support.
Email’s down? Call support.
Printer won’t connect? Call support.

But here’s the truth:
Modern MSPs should be preventing problems—not just solving them.

🕵️‍♂️ Real-World Scenario: Client Onboarding

When onboarding a new client, most have had someone that took care of their IT support.
They assumed everything was secure.

During an audit, here’s what we usually find:

  • No Conditional Access policies
  • Legacy authentication still enabled
  • Global admin accounts are also the same as the primary user
    • Or their IT provider doesn’t want to give the business owner access
  • No sensitivity labels or DLP
  • Guest users with full directory access

And the kicker? Many don’t realize that these even exist.

⚠️ Why This Matters for Business Owners

Image: https://www.selectsecuresolutions.com/files/2023/01/it-support-service-provider-resized.png

Your MSP isn’t just your tech support.
They’re your digital risk manager, your compliance partner, and your security strategist.

If they’re not proactively reviewing your environment, updating configurations, and educating your team, they’re leaving you exposed.

🛡️ What You Should Expect from Your MSP

Here’s a simple checklist to hold your IT provider accountable:

✅ Security & Identity

  • Enforces MFA with number matching for all users
  • Blocks legacy authentication protocols
  • Implements Conditional Access for all cloud apps
  • Uses Privileged Identity Management (PIM) for admin access
  • Reviews guest access and external sharing regularly

✅ Device & Data Protection

  • Deploys Intune baselines (BitLocker, Defender, updates)
  • Uses Mobile Application Management (MAM) for BYOD
  • Applies sensitivity labels and DLP policies
  • Audits enterprise apps and OAuth permissions

✅ Monitoring & Response

  • Monitors for token hijacking, mass downloads, and anomalous logins
  • Alerts on mail forwarding rules and rogue app grants
  • Provides monthly security reports with actionable insights

✅ Strategic Guidance

  • Prepares you for Copilot and AI-driven tools
  • Helps align with compliance frameworks (CIS, NIST, etc.)
  • Offers security awareness training for your team
  • Reviews your GDAP setup and admin hygiene

🧠 Analogy Time: Your MSP = Your Digital Building Manager

Think of your MSP like the manager of a high-rise office building.
They don’t just fix broken elevators—they:

  • Install security cameras
  • Manage access badges
  • Monitor fire alarms
  • Run evacuation drills
  • And make sure the building meets safety codes

Your digital environment deserves the same care.

🚀 Coming Up Next…

In the next post, we’ll talk about your team—the human firewall—and how to build a culture where employees feel confident asking for help before clicking something suspicious.

👣 Your Action Step Today

✅ Ask your Outsourced IT Provider:
“Can you show me how we’re protected against identity-based attacks, rogue apps, and data leaks?”

If they hesitate or say “we’ll get back to you,” it’s time to dig deeper.

Want help reviewing the secuerity posture of your business?
We’ll walk through it with you—no jargon, no judgment, just clarity.