5 Rookie Cybersecurity Mistakes to Avoid [MSP Edition]

A glowing cube with shield icons sits at the center, connected to circuit lines. Red error messages and warning signs on both sides suggest rookie mistakes or cybersecurity mistakes causing technical issues in a digital environment.

Did you remember to enable MFA by default? 

Do you know if a former staff member still has access to AWS cloud environments? 

This isn’t a pop quiz, but rather a guide that highlights the common security mistakes MSPs must be aware of to protect client environments and sensitive data. 

Failure to enforce password hygiene, conduct routine cyber risk assessments, or properly deprovision cloud access for former employees and inactive third parties can leave clients’ systems and inboxes vulnerable to attacks. In this article, we’ll explore the top 5 rookie cybersecurity mistakes and how MSPs can avoid them. 

Neglecting to invest in employee phishing awareness 

How confident are you in your employees’ phishing awareness training levels? Corporate inboxes are prime threat vectors for attackers. Untrained employees might not be able to recognize a spoofed domain masking a malicious reply-to address, a fake MFA reset link pointing to an attacker-controlled SSO landing page, or a PDF with malicious JavaScript embedded when opened. 

Employees may also fall for seemingly legitimate OAuth consent requests that grant attackers persistent access to critical infrastructure. One click is all it takes to expose sensitive data at scale or deploy ransomware across critical systems. A recent phishing campaign exploited a flaw in the Microsoft 365 Direct Send feature to bypass traditional email security filters.

Attack methods have become so sophisticated through the use of AI that even the most experienced security professionals struggle to distinguish genuine requests from advanced social engineering attempts. Here are 33 phishing statistics you should take note of as well. 

Guardz tip: Conduct routine phishing simulations using a variety of campaign templates to ensure employees are familiar with company policies and security protocols. Test and measure their performance on a monthly or quarterly basis to identify areas for improvement or document where additional training may be needed. Phishing awareness and employee cybersecurity training is essential for every organization, regardless of sector or size. 

Misconfigured cloud services 

“Small” misconfigurations in cloud storage buckets and compute environments can expose your entire infrastructure to compromise. Whether it’s an unpatched Azure VM, an overly permissive AWS S3 bucket policy, or a misconfigured Kubernetes cluster running with elevated service account permissions, attackers can exploit these gaps with minimal effort using automation tools that can be purchased on the dark web.

Cloud risks become even more difficult to detect when clients engage third-party service providers who may inadvertently introduce new vulnerabilities. The attack surface expands across multiple identities, workloads, and shared responsibility boundaries, making it harder to maintain visibility into configuration drift, unauthorized access, and risky privilege escalation paths. 

Guardz tip: Set and enforce cloud policies and ensure that everything is documented in your SLAs, including configuration baselines, access controls, network segmentation rules, monitoring requirements, and remediation timelines. This creates accountability and alignment between your clients and any third-party vendors working within the environment. 

Ignoring multi-factor authentication (MFA)

Multi-factor authentication (MFA) is the most foundational security building block for protecting accounts and sensitive systems. 

Microsoft found that more than 99.9% of compromised accounts don’t have MFA. Not only do you risk unauthorized access to client environments, but you also expose critical assets such as admin portals and backup servers to direct compromise. Attackers can also steal session tokens from unsecured networks or exploit exposed endpoints to run privileged commands. The list goes on. You get the picture.

Guardz tip: Configuring multi-factor authentication (MFA) is one of the simplest and most effective ways to prevent unauthorized access and phishing attacks. Enforcing MFA by default, integrating it with SSO solutions, and using phishing-resistant methods like FIDO2 tokens can significantly reduce the risk of credential-based compromises. Require employees to create strong passwords, ideally 15 characters or more, and ensure they do not reuse the same credentials across company accounts. This is a fundamental control and a rookie cybersecurity mistake that should never be overlooked.

Granting excessive permissions without review 

A study found that 23% of cloud identities have critical or high-severity excessive permissions. 

How about those inactive users who still have access to cloud environments? Are they former employees who haven’t been properly offboarded? Can you recall the last time you conducted a full audit of user access and permissions across all client accounts? 

A publicly exposed API key can provide attackers with unauthorized access to your clients’ cloud infrastructure, where they can remain undetected, silently exfiltrating data through infostealers, creating backdoors, or deploying malicious scripts to compromise workloads, alter configurations, and move laterally across environments. 

A single admin user can have over a thousand permissions tied to their identity. If that cloud account is compromised, the blast radius can grow exponentially, and a massive breach may follow. Don’t put yourself or your clients at that risk. 

Guardz tip: Start by enforcing the principle of least privilege access across the organization. The same goes for third parties, vendors, contractors, and partners, who should only have the minimum level of access. Stale accounts are often overlooked, especially if those admins change roles or leave the company. Conduct regular access and permission audits of all cloud environments and ensure that credentials are rotated or revoked as necessary. 

Prevent Cybersecurity Mistakes with Guardz 

Don’t fall for that suspicious “no-reply” email or malicious PDF file attachment. 

The Guardz unified platform connects the security dots across endpoints, cloud, data, identities, and more. 

A user management dashboard shows a list of users with their email addresses, names, and roles. A pop-up appears for Bob@acme.com, offering sharing options via email, Google, and Outlook, and a delete button.

Guardz scans and analyzes current authentication and access control settings. It then recommends areas for immediate improvement, such as suspending user accounts, modifying sharing permissions, and checking user compliance. 

Whether you’re securing 500 or 5,000 endpoints, you simply cannot afford to make any mistakes with your clients’ sensitive data and assets. Avoid those rookie cybersecurity mistakes.  Join thousands of MSPs protecting their clients with Guardz. Get started today.

Categories:

Subscribe to
Our Newsletter.

Continue Reading

Large 20 with digital icons overlays a binary code background. Text reads: MSP Events & Conferences You Can’t Miss in 2026. Highlighted colors are green and purple, giving a tech-inspired look.

20 MSP Events and Conferences You Can’t Miss in 2026

Graphic showing the text The Most Popular Passwords of 2025 & How to Avoid Them with a weak password above a strong password, both inside colorful boxes against a background of blurred code, highlighting common passwords and tips to prevent a password breach.

123456 Breach: The Most Common Passwords of 2025 and How to Avoid Them 

A digital illustration of a shield with a technology icon in the center, surrounded by binary code, warning symbols, and glowing elements, representing cybersecurity or data protection.

Top 10 Data Breaches of 2025 

A person in a futuristic chair sits at a high-tech control panel, looking out at a starry space scene with planets and mountains. The dashboard glows with colorful buttons and screens, like the perfect single post template for exploring new worlds.

Guardz, Your Cybersecurity
Co-Pilot for MSPs

Demonstrate the value you bring to the table as an MSP and gain visibility into your clients’ external postures.

Holistic Protection.
Hassle-Free.
Cost-Effective.