Nice to meet you.

Enter your email to receive our weekly G2 Tea newsletter with the hottest marketing news, trends, and expert opinions.

The Evolution of Help Desks in Cybersecurity For Businesses

March 13, 2024

help desk to cyber security

The role of help desks continues to expand, and now that hackers see them as potential weak links, companies need to improve their cybersecurity capabilities. 

Not long ago, a hacking group known as Scattered Spiders targeted a Las Vegas casino’s help desk to gain access to valuable and sensitive data, costing millions in financial losses and a sullied reputation.

That incident has become a wake-up call for enterprises that haven’t spent the time and energy training the front-line employees who work their help desk or transitioning away from potential human error to automation. 

If there’s a silver lining to the fact help desks are getting plucked like low-hanging fruit, it’s that industry leaders can quickly harden their cybersecurity posture.

From help desks to cybersecurity: strengthening enterprise defenses in 2024 and beyond

It’s essential to remember that help desks run entirely by “real people” are a double-edged sword.

Clients, customers, and colleagues typically prefer speaking with someone who empathizes with their situation and possesses strong problem-solving skills. 

On the other hand, studies indicate that over 95% of all security breaches can be traced back to that same real person making a mistake or being involved in an insider attack. Furthermore, an IBM study estimated it took organizations an average of 277 days to identify and contain a data breach

The question is whether business decision makers want to continue taking a not-so-calculated risk.

Below are some common vulnerabilities that help desks present when not effectively equipped to identify, avoid, and assist in repelling threat actors.

  • Phishing and vishing schemes: Whether the hackers who target help desk employees have sophisticated skills or are just bold, untrained employees are vulnerable to trickery. 
    Electronic messages can persuade some to provide information that can be used to penetrate a network. Sometimes, scammers call and convince help desk staff members to provide them with a temporary username and password. The results are usually disastrous.
  • Weak passwords: All company employees are tasked with using strong passwords and changing them on a regular basis. 
    Perhaps no one presents a greater risk than the help desk staff because their login credentials usually enjoy wide-reaching system access. Guessing a help desk employee’s username and password is akin to handing digital thieves the keys to Fort Knox.
  • Policy failures: In too many cases, companies onboard untrained workers to handle help desk duties, demonstrating the positions are not necessarily highly valued. 
    Failing to put good decision makers in these posts cracks the door for hackers to exploit help desks. Regardless of who handles help desk responsibilities, they must be fully trained to follow strict company security protocols.

Much of the problem with susceptible help desks stems from what some call “cyber fatigue.” Systemic apathy weighs on people tasked with proactively defending and repelling threats affecting too many organizations. 

By onboarding a managed IT firm with a help desk and cybersecurity expertise, enterprises can reverse the seemingly downward spiral that could get them hacked. The time is now to strengthen help desks and insulate valuable and sensitive digital assets from prying eyes and thieves.

The significance of help desks in business cybersecurity

When smartly designed and implemented, a help desk can be vital and effective in an operation’s cybersecurity hygiene.

However, companies will need to get to a place where the help desk provides more than solutions to common technical problems, offers insight, or directs people to someone who can provide further assistance.

An IT cybersecurity help desk with enhanced protections in place can deliver the following benefits.

  • Incident response: The help desk is typically the first point of contact. By default, it may also be the first place garden-variety hackers try to exploit with phishing, vishing, and social engineering schemes. Hardening the IT help desk can serve as the first line of defense by identifying and reporting emerging threats.
  • Infrastructure: Utilizing enterprise-level software, architecture, and other critical infrastructure closes vulnerabilities that cybercriminals seek to exploit. 
    From a position of weakness to strength calls for cybersecurity specialists with help desk experience to integrate cutting-edge technologies and forward-thinking defensive strategies. Everything must be maintained and updated, particularly software products.

When the cybersecurity facet of a help desk has been fully realized, it can serve wide-reaching purposes. These diverse benefits far exceed the support of staff members and customers.

One of the areas that organizations often feel overburdened involves regulatory compliance.

A secure and well-functioning IT help desk helps shield personal identity information such as employee Social Security numbers, tax records, bank accounts, and other sensitive information.

When working in conjunction with other cybersecurity pillars, a help desk allows companies to meet or exceed the high standards set by laws like the EU’s GDPR and the HIPAA in the U.S. Safeguarding data, starting with the help desk, can change how operations address state, national, and international regulatory compliance.

Best practices for help desks in cybersecurity

Help desks provide an excellent transformational opportunity. Upgrading from a service-only element to an IT cybersecurity help desk changes the entire dynamic of data privacy and protection.

This evolution starts with installing the knowledge and best practices necessary to change the current handling of requests and routine solutions into an impenetrable cybersecurity barrier. 

Below are the essential shifts and best practices necessary to complete the process and maintain a robust cybersecurity-based help desk.

Risk awareness

Companies continue to invest in cybersecurity awareness training to lower insurance costs and liability and protect critical data. This investment must also extend to help desk staff members if they are to become an outfit’s first line of defense.

In cases where companies outsource all or a portion of their help desk needs, enlisting a managed IT firm that offers cybersecurity help desk support is crucial.

Incident tracking

Whether a human staff member or machine learning tool uncovers an anomaly, incident reporting, tracking, and real-time responses are vital. Falling into the average of 277 days to identify and purge a threat is entirely unacceptable.

A well-oiled help desk and trained staff members will likely identify and report potential threats long before hackers access valuable data. That’s why it’s mission-critical to establish a threat intelligence protocol.

SIEM systems

A security information and event management (SIEM) system can be utilized to scrutinize user behaviors.

Cybersecurity experts can program automated tools to identify even minor changes to the way a legitimate employee's profile is typically used. In this fashion, a SIEM proves an invaluable threat-hunting asset.

Should a hacker seize control of someone’s network profile, the subtle differences effectively send up an intruder flare. Companies that adopt and use SIEMs proficiently through their help desks gain a competitive advantage over cyber attackers.

Ongoing monitoring

The nature of help desks is often to provide solutions 24 hours a day, 7 days a week. That positions them as natural gateways to integrate 24/7 cybersecurity monitoring, threat hunting, and responses.

Security alerts can be routed to help desk personnel — if and only if they have cybersecurity expertise — to minimize the time and energy spent chasing false positives. Changing the philosophy of a basic help desk into one that furthers the operation’s cybersecurity objectives hardens your attack surface.

Perhaps the key to a successful cybersecurity-based help desk is the training and expertise of the people making decisions. Ongoing awareness training reminds staff members to follow this simple rule: See something, say something. 

What seems like a minor computer hiccup could very well be a telltale sign of an insider attack, malware propagation, or a digital intruder. With the right people overseeing your help desk, any employee can alert the team to investigate what could be a debilitating ransomware attack.

The MGM attack: when help desks fail

The 2023 hack of MGM Resorts International presents cybersecurity experts and other corporations with a teachable moment. The Las Vegas casino was stung by a loosely organized band of miscreants known as “Scattered Spiders.”

Identified as Gen Z hackers, the group went big game hunting, bringing the MGM Hotel and Casino to its knees.

What’s critical for this discussion is the fact these relatively inexperienced cybercriminals used the mistake of a help desk employee to insert ransomware into the casino’s network, forcing it to go analog for upwards of 10 days.

After days of using paper, pencils, and old-fashioned room entry keys, the operation assured guests normal operations had resumed. Then, the terrible news hit.

Although the hackers were eventually expelled, they made off with a veritable treasure trove of guests', employees', and contractors' personal identity information. Social Security numbers, credit cards, passports, and driver’s licenses had been exposed. 

How they pulled off an attack on an organization that places an extremely high emphasis on physical and digital security demonstrates it could happen to any company with a weak help desk.

Scattered Spiders engaged in significant social engineering research. They apparently knew enough about at least one reasonably high-level person to convince the help desk worker they were that very individual.

This type of background research can typically be pulled from professional networking platforms such as LinkedIn and social media profiles such as Facebook, X, and Instagram, among others.

The help desk worker could have vetted the caller thoroughly, asking personal identity questions that should be on file. But the caller, employing what is known as a “vishing” phone call, was given a temporary username and password to log into the MGM network. 

After a clever maneuver to flood the actual employee with phony confirmation requests until the staff member cried uncle and clicked “approve,” the online criminals ran roughshod over one of the world’s largest hospitality operations.

In hindsight, a better-prepared help desk could have denied the temporary access request and served as an emergency alert system. Had the staff member who fielded the vishing call recognized any telltale signs the request was not legitimate, that information could have been promptly sent to MGM’s cybersecurity team.

A subsequent investigation may have resulted in a digital security team embarking on a threat-hunting mission.

Even if they didn’t find evidence of an impending cyber attack, notifications would have been sent to all employees to report any suspicious emails, text messages, or calls. That’s precisely why evolving to a determined cybersecurity help desk is mission-critical in light of the efforts by Scattered Spiders and other criminal organizations.

Will help desk automation improve cybersecurity?

In a fast-evolving technology landscape, there’s some debate about using or overusing automation in wide-reaching industries. Although an IT cybersecurity help desk enjoys the support of a specialized team with expertise in data protection, automation also plays a significant role.

Using AI and machine learning technologies adds to a proactive cybersecurity help desk.

It’s vital for companies to keep in mind the need for cybersecurity doesn’t end when the 9-to-5 crew clocks out.

A hacker sitting in a café halfway around the world is inclined to target vulnerable networks while its leadership team is fast asleep. Rather than pay real-life employees to drink coffee and stand at a help desk post, automation maintains a watchful digital eye.

Integrating technologies to handle as-desired aspects of the help desk cybersecurity posture makes them cost-effective and scalable. Machine learning and AI alert systems do not take vacations, call out sick, or require matching funds to be placed in their 401(k). They simply carry out the tasks cybersecurity experts and management teams require.

When that cybercriminal attempts a forced digital entry during the dead of night, a real person receives an alert and takes action to expel the threat actor. Ideally, an intelligently designed IT cybersecurity help desk balances automated features with human decision making. 

How will help desks evolve in the future to reinforce cybersecurity posture?

It’s abundantly clear the future of help desks will continue to bring humans and technology closer together to harden company defenses. AI and machine learning provides a unique opportunity to ferret out garden variety hackers and advanced persistent threats the moment they log into a business network using a staff member’s credentials. 

The same holds true of disgruntled employees or moles trying to steal industry secrets. Seemingly minor differences in user behavior trigger alerts that would otherwise go unnoticed until it's too late.

That’s why industry leaders are investing in 24/7 monitoring with help desk automation, and third-party managed IT cybersecurity experts to protect their sensitive and valuable data. 

As companies improve their help desks to combat cyber attacks, more will cure an inherent problem — not having a cybersecurity incident response plan. According to an S&P Global Corporate Sustainability Assessment, approximately 20% of companies do not have an incident response plan to deal with data breaches systematically.

Onboarding cybersecurity experts to drag IT help desks into the future doesn’t appear to be optional if industry leaders want to stay in business. For example, the fallout from the MGM hacks didn’t end with the casino and hotel organization suffering a short-term loss of control and $100 million. 

After customers and industry partners learned their private information was stolen, multiple class action lawsuits were filed. The cybersecurity wing of the FBI investigated the organization and incident. Those are the types of dark clouds that persist and threaten a company’s reputation long after the dust settles.

The future of your organization’s IT help desk and cybersecurity

The decision to upgrade an IT help desk to include proactive cybersecurity measures requires thoughtful consideration. Some companies only rely on their 9-to-5 help desks to field customer service calls and support office personnel during work hours. 

As long as the people operating the help desk and the system being used do not have far-reaching network capabilities, placing it under the overall corporate cybersecurity umbrella may be viable. This would involve cybersecurity awareness training for help desk employees, enterprise-level firewalls, antivirus software, and other necessary protections.

But suppose your organization allows help desk employees to send and receive electronic messages from various sources, research and help resolve digital hiccups, or issue temporary usernames and passwords. 

In that case, hackers will see it as low-hanging fruit ready for harvest.

It may be in your best interest to embrace the future and upgrade your current system to a cybersecurity help desk, especially with the help of a proven, reliable managed services provider that can identify, report, and help expel threats before you suffer financial losses, civil lawsuits, and a tarnished reputation.

Explore an in-depth guide providing insights into setting up an efficient help desk system.

Edited by Jigmee Bhutia


Get this exclusive AI content editing guide.

By downloading this guide, you are also subscribing to the weekly G2 Tea newsletter to receive marketing news and trends. You can learn more about G2's privacy policy here.