{"id":1180,"date":"2026-03-19T09:00:00","date_gmt":"2026-03-19T09:00:00","guid":{"rendered":"https:\/\/exposiq.ch\/it-service-providers-as-security-risk-supply-chain-security-for-smes\/"},"modified":"2026-03-19T09:00:00","modified_gmt":"2026-03-19T09:00:00","slug":"it-service-providers-as-security-risk-supply-chain-security-for-smes","status":"publish","type":"post","link":"https:\/\/exposiq.ch\/en\/it-service-providers-as-security-risk-supply-chain-security-for-smes\/","title":{"rendered":"IT Service Providers as Security Risk: Supply Chain Security for SMEs"},"content":{"rendered":"<p>Swiss SMEs are increasingly outsourcing their IT to external service providers. Managed service providers (MSPs), IT system houses, and cloud consultants manage networks, servers, and endpoints. This often makes sense &#8212; but it creates a risk that is not discussed enough: your IT service provider has extensive access to your systems. And if they are compromised, so are you.<\/p>\n<h2>The Problem: Trust Without Oversight<\/h2>\n<p>A typical SME scenario: the IT service provider has administrator rights on the domain controller, VPN access to the internal network, access to the firewall configuration, and root passwords for all servers. They manage the backups, maintain software updates, and handle onboarding for new employees.<\/p>\n<p>This is an enormous relationship of trust. And in most cases, there is <strong>absolutely no independent oversight<\/strong> of whether the service provider follows secure practices themselves. Is their own network protected? Do they use multi-factor authentication? Are their remote access tools up to date? Are their clients&#8217; credentials stored securely?<\/p>\n<p>The honest answer: most SMEs do not know. And most do not ask.<\/p>\n<h2>Supply Chain Attacks Are on the Rise<\/h2>\n<p>Supply chain attacks &#8212; attacks conducted through suppliers and service providers &#8212; are among the fastest-growing threat categories. The logic is compellingly simple: why would an attacker target 100 SMEs individually when they can gain access to all 100 companies through a single IT service provider?<\/p>\n<p>Recent history provides striking examples:<\/p>\n<ul>\n<li><strong>Kaseya VSA (2021):<\/strong> The ransomware group REvil compromised the remote management software Kaseya VSA. Through its update mechanism, ransomware was distributed to over 1&#8217;500 companies worldwide &#8212; all customers of MSPs that used Kaseya. The affected SMEs had done nothing wrong themselves.<\/li>\n<li><strong>SolarWinds (2020):<\/strong> Attackers infiltrated the build process of SolarWinds Orion software. The manipulated update was distributed to over 18&#8217;000 organisations, including government agencies and large enterprises.<\/li>\n<li><strong>MOVEit Transfer (2023):<\/strong> A vulnerability in the file transfer software MOVEit was exploited by the Clop group. Over 2&#8217;600 organisations and 77 million individuals were affected &#8212; many of them indirectly, because their service provider used MOVEit.<\/li>\n<li><strong>ConnectWise ScreenConnect (2024):<\/strong> Critical vulnerabilities in the remote support software enabled attackers to take over client systems through compromised MSP instances.<\/li>\n<\/ul>\n<p>These incidents are not isolated cases but a pattern. The European Union Agency for Cybersecurity (ENISA) classifies supply chain attacks as one of the top threats. And the Swiss Federal Office for Cyber Security (BACS) regularly warns about this risk.<\/p>\n<h2>How IT Service Providers Become a Gateway<\/h2>\n<p>The attack vectors through IT service providers are diverse:<\/p>\n<h3>Compromised Remote Management Tools<\/h3>\n<p>MSPs use tools such as ConnectWise, Kaseya, Datto, or TeamViewer to manage their clients&#8217; systems. These tools are designed to have extensive access to managed endpoints and servers. A vulnerability in the remote management tool or stolen credentials from an MSP technician opens the door to all client networks simultaneously.<\/p>\n<h3>Insecure Practices at the Service Provider<\/h3>\n<p>Not every attack is based on a software vulnerability. Common problems at IT service providers:<\/p>\n<ul>\n<li>Password reuse: the same admin password is used across multiple clients<\/li>\n<li>Missing MFA: remote access to client systems is protected only by passwords<\/li>\n<li>Unencrypted password databases: client credentials are stored in Excel spreadsheets or unsecured password managers<\/li>\n<li>Outdated own systems: the service provider patches their clients&#8217; systems but not their own<\/li>\n<li>No least-privilege principle: every technician has access to all client systems<\/li>\n<\/ul>\n<h3>Shared Infrastructure<\/h3>\n<p>Some service providers operate shared monitoring or backup systems. If this central infrastructure is compromised, all connected clients are affected.<\/p>\n<h2>How to Assess Your IT Service Provider<\/h2>\n<p>Trust is good, but it should be based on an informed foundation. Here are concrete questions you should ask your IT service provider:<\/p>\n<ol>\n<li><strong>Access control:<\/strong> Who specifically has access to our systems? Is there a role-based permissions model, or does every technician have full access?<\/li>\n<li><strong>Multi-factor authentication:<\/strong> Is access to our systems protected by MFA? Does this apply to all of the service provider&#8217;s technicians?<\/li>\n<li><strong>Password management:<\/strong> How are our credentials stored? Is a professional password manager with encryption being used?<\/li>\n<li><strong>Own security:<\/strong> Does the service provider conduct regular security assessments of their own environment? Do they hold ISO 27001 certification or a comparable attestation?<\/li>\n<li><strong>Incident response:<\/strong> What happens if the service provider themselves is compromised? Is there a plan to notify affected clients and revoke access?<\/li>\n<li><strong>Software currency:<\/strong> Which remote management tools are in use, and are they up to date?<\/li>\n<li><strong>Logging:<\/strong> Are accesses to our systems logged? Can we review these logs?<\/li>\n<\/ol>\n<p>If your service provider cannot or will not answer these questions, that is a warning sign.<\/p>\n<h2>Why SMEs Need Their Own Vulnerability Scanning<\/h2>\n<p>Regardless of how competent and trustworthy your IT service provider is, there are good reasons to run your own vulnerability scanning:<\/p>\n<p><strong>Independent visibility:<\/strong> Your IT service provider has an inherent interest in presenting their own work in a favourable light. An independent vulnerability scan shows you the objective reality: are the systems actually up to date? Are the firewall rules clean? Are there exposed services that should not exist?<\/p>\n<p><strong>Control over your own risk:<\/strong> Responsibility for your data cannot be outsourced. Even if the IT service provider manages the systems, you as a company bear the liability in the event of a data breach. The nDSG (Swiss Data Protection Act) makes this unambiguously clear.<\/p>\n<p><strong>Early detection of problems:<\/strong> Regular scans detect when a patch has not been installed, a service is misconfigured, or a new vulnerability affects your systems. You can act proactively instead of waiting for the next security incident.<\/p>\n<p><strong>Negotiation basis:<\/strong> With concrete scan results, you can hold informed discussions with your service provider. &#8220;Our scan shows that the Exchange server is missing two critical patches&#8221; is a very different starting point than &#8220;Is everything secure?&#8221;<\/p>\n<p><strong>Supply chain transparency:<\/strong> An external scan of your own infrastructure also reveals whether the systems managed by the service provider have vulnerabilities that the service provider should have remediated.<\/p>\n<h2>Trust, but Verify<\/h2>\n<p>The principle &#8220;trust, but verify&#8221; originally comes from diplomacy, but it is highly relevant in IT security. It does not mean distrusting your IT service provider. It means that as a company, you cannot fully delegate responsibility for your own security.<\/p>\n<p>Concrete measures every SME can implement:<\/p>\n<ul>\n<li><strong>Own vulnerability scanning:<\/strong> Run regular, automated scans independently of your IT service provider<\/li>\n<li><strong>Access inventory:<\/strong> Maintain a current list of all external access points to your systems (VPN, remote desktop, cloud portals)<\/li>\n<li><strong>Contractual provisions:<\/strong> Define SLAs for patch management, mandatory MFA, and incident response times<\/li>\n<li><strong>Regular reviews:<\/strong> Discuss scan results quarterly with your service provider and track open items<\/li>\n<li><strong>Escalation process:<\/strong> Define what happens when critical vulnerabilities are not remediated within a specified timeframe<\/li>\n<\/ul>\n<h2>ExposIQ as Independent Oversight<\/h2>\n<p>ExposIQ enables Swiss SMEs to run simple, independent vulnerability scanning that operates alongside their existing IT service provider. The platform requires no technical expertise: you enter your domains and IP ranges and receive regular, up-to-date overviews of your security posture.<\/p>\n<p>With over 35 scan engines, 64&#8217;000 CVEs, and EPSS-based risk scoring, you can see at a glance which vulnerabilities exist and how urgently they need to be addressed. The results provide an objective basis for conversations with your IT service provider &#8212; or confirm that they are doing a good job.<\/p>\n<p>Hosted in Switzerland, nDSG-compliant, and available from just CHF 99 per month. Because independent oversight is not a vote of no confidence but professional risk management: <a href=\"https:\/\/exposiq.ch\/en\/\">exposiq.ch<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Swiss SMEs are increasingly outsourcing their IT to external service providers. Managed service providers (MSPs), IT system houses, and cloud consultants manage networks, servers, and endpoints. This often makes sense &#8212; but it creates a risk that is not discussed enough: your IT service provider has extensive access to your systems. And if they are &#8230; <a title=\"IT Service Providers as Security Risk: Supply Chain Security for SMEs\" class=\"read-more\" href=\"https:\/\/exposiq.ch\/en\/it-service-providers-as-security-risk-supply-chain-security-for-smes\/\" aria-label=\"Read more about IT Service Providers as Security Risk: Supply Chain Security for SMEs\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"rank_math_focus_keyword":"it service provider security risk supply chain","rank_math_title":"IT Service Providers as Security Risk: Supply Chain Security for SMEs","rank_math_description":"Your IT provider has admin access to your systems. If they are compromised, so are you. Why SMEs need their own vulnerability scanning.","rank_math_robots":"","rank_math_canonical_url":"","rank_math_primary_category":"","footnotes":""},"categories":[8],"tags":[],"class_list":["post-1180","post","type-post","status-publish","format-standard","hentry","category-it-sicherheit","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"_links":{"self":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/posts\/1180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/comments?post=1180"}],"version-history":[{"count":0,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/posts\/1180\/revisions"}],"wp:attachment":[{"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/media?parent=1180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/categories?post=1180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exposiq.ch\/en\/wp-json\/wp\/v2\/tags?post=1180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}