Quickpass Rebrands to CyberQP, Raises $12M to Help MSPs with Privileged Access Management.

Quickpass Rebrands to CyberQP, Raises $12M to Help MSPs with Privileged Access Management.

BLOG POST

Quickpass Rebrands to CyberQP, Raises $12M to Help MSPs with Privileged Access Management.

Post Date:

Read Time: 5 Minutes

Featured Product Tours:

MSP Insights

Vancouver, BC

Quickpass, a leading provider of Privileged Access Management and Helpdesk Security Automation for MSPs, announced today that it has officially rebranded to CyberQP. The company has raised an additional $12M from its financial partner, Arthur Ventures, to continue to bring Privileged Access Management to MSPs.

According to the CEO, Mateo Barraza, the rebranding was necessary to accurately portray the company’s mission. “The ‘Quickpass Cybersecurity’ name took us far, but as our product evolved it stopped accurately portraying what we did. Our new name helps clarify what we are here to do: help MSPs with Privileged Access Management.”

CyberQP is dedicated to helping MSPs and their customers protect their critical assets. Their Privileged Access Management and Helpdesk Security Automation provide comprehensive security solutions that are essential for MSPs to protect against cyber threats.

The additional funding from Arthur Ventures will help CyberQP continue to grow its offerings and expand its reach to more MSPs all over the world. The company and its investors are fully committed to the MSP community and believe that MSPs are the only group of people who can secure SMBs.

“We are thrilled to have the continued support of Arthur Ventures and their confidence in our ability to help MSPs protect their customers,” said Mateo Barraza, CEO of CyberQP. “This funding will help us continue to develop innovative solutions and provide top-tier security services to MSPs.”

 

The Latest News & Events

5 Ways to Rotate Active Directory Service Account Passwords

5 Ways to Rotate Active Directory Service Account Passwords

BLOG POST

5 Ways to Rotate Active Directory Service Account Passwords

Post Date:

Read Time: 5 Minutes

Featured Product Tours:

MSP Insights

Password security for Active Directory is becoming extremely important for companies across the globe due to the proliferation of ransomware and security breaches. One area that may not get a lot of attention but is equally important to have a solution for are service accounts.

Since manually resetting service account passwords and having to make sure you update the password anywhere the account is being used can be a lot of work, most IT companies just do not do it. There are however some alternative approaches you can take to manually rotating service account passwords. Each method has some pros and cons.

1. Create a script to automate the updating of passwords in the in the Windows Service and/or Scheduled task with PowerShell, such as in this article from ITProToday.

Pros

  • Removes the manual effort for the taks required after resetting the service account password
  • Free

Cons

  • Requires you to create and maintain your own script which takes time and testing
  • Still need to manually reset the service account password in Active Directory

2. Add an MFA (Multi-Factor Authentication) solution to your Active Directory accounts and never change the password

Pros

  • Adds an additional level of security to your windows account
  • Don’t need to worry about changing passwords and updating the password in Windows services and scheduled tasks

Cons

  • Cost. You will need to pay per user per month for a third party hosted MFA solution
  • Must enter the username, password, and MFA code every time you login unless you have a push notification solution which is generally more costly
  • Even though you have MFA it is still possible to hack and if they do and the password never changes then you may be an easier target
  • Does not cover when technicians leave your company. Even with MFA on the account you would at the very least want to reset the password then

3. Set the password to an extremely long and complex password, store the password in a securely encrypted password vault that only a limited amount of people has access to and never change the password.

Pros

  • Never need to reset the password
  • Password is difficult to hack since it’s very long and complex
  • Access to the password is limited to only a few people
  • Password is only accessible by the users who have permission to the vault and know the secret passphrase

Cons

  • Only a limited number of users will have access to the password if it is needed. Requires those users share the password with other technicians when needed
  • The password never changes and even though it is long and limited users have access if those users get infected with key logging malware the password can still be hacked

4. Use an Active Directory Managed Service Account if supported by the process or application. Managed Service Accounts have passwords that are managed by Active Directory and automatically rotated so they do not require administrators to rotate the passwords and thus they can be very advantageous. There are some restrictions so be sure to review the documentation from Microsoft or on this blog article.

Pros

  • Password rotation is handled automatically by Active Directory
  • Automated process
  • Passwords are automatically updated in Windows Services

Cons

  • Does not support scheduled tasks
  • Setup time required with PowerShell
  • Cannot span multiple computers. It cannot be installed on more than one computer at once
  • Must be supported by the application that uses the Window Service

5. Use a third-party solution to automate the rotation of service account passwords. CyberQP offers a solution that will rotate Windows Service accounts on a specified schedule and update the password in the Windows Service and Scheduled Task then restart the service after to finalize the change

Pros

  • Complete automated solution
  • Supports Windows Services and Scheduled Tasks
  • Easy setup. No scripting knowledge required
  • Integrates with IT Glue password manager
  • Saves time and money

Cons

  • Paid solution

What is a Service Account?

Service Management Console

A service account is an Active Directory account that is used to authenticate a process that runs on a Windows Server or PC such as an accounting system or for SQL databases processes.

Windows Services are managed in the Services Management Console shown below.

When you open an individual Windows Service and click on the ‘Log On’ tab you can review which account is used to authenticate that Windows Service.

When you review which accounts that are used for authenticating Windows Services you will notice that some use the Local System account while others are using a specific Active Directory account with a password.

If the Local System account is specified there is no password used and therefore no password to rotate. The Local System account is a highly privileged account that is used by a number of Windows Services but is not suitable for all Windows Services.

Scheduled Tasks

Service Accounts can also be used for authenticating Windows Scheduled Tasks that are accessed within the Task Scheduler application.

Similar to Windows Services in the Services Management Console you can use the Local System Account or a specific Active Directory domain account to authenticate the Scheduled Task.

Why Should You Rotate Service Account Passwords?

This is a very important question. The answer is it depends on the circumstance. Active Directory accounts used for Windows Services and Scheduled tasks can be hacked just like any other account. In a lot of cases the accounts used for Windows Services and scheduled tasks have elevated permissions and therefore pose a greater risk if the account is breached.

What Happens When You Reset a Service Account Password?

Service Management Console

When you reset a service account password you must also update the password in either the Windows Services Management Console or in the Scheduled Task that uses the account. If you do not do this the process that the Windows Service manages will eventually stop when the process needs to re-authenticate or when you need to restart the service whichever comes first. For the scheduled task, the task will fail to run at the next scheduled time.  

This is a manual process to open the Windows Service, click on the Log On tab, enter the updated password, click apply then restart the service for the changes to take effect.

Scheduled Tasks

For Scheduled tasks you must open the scheduled task click OK then type in the updated password in the pop-up window then click Ok to complete the change.

If you would like to find out more about CyberQP’ Password Rotation solution, I encourage you to visit this page. If you have any questions or would like to proceed, book a demo with a CyberQP representative.

The Latest News & Events

5 Ways to Rotate Active Directory Service Account Passwords

Naz.API Leaks Data from Over 70 Million Accounts

BLOG POST

Naz.API Leaks Data from Over 70 Million Accounts

Post Date:

Read Time: 5 Minutes

Featured Product Tours:

MSP Insights

What Happened?

A report from Troy Hunt, the creator of the website Have I Been Pwned, alerted readers to a major data leak from Naz.API, a database containing data from over 70 million accounts and over a billion unique records. Hunt’s investigation has revealed “a significant volume of new data” and newly compromised accounts, and these accounts’ owners are at risk.

Key Takeaways

According to the report, a “well-known,” unnamed technology firm discovered the dataset in a hacking forum post published in September 2023, through a bug bounty submission, and contacted Hunt with these details. 

An investigation into these findings revealed that 34.97% (over one-third) of the email addresses in this dataset were new, and not available in Have I Been Pwned’s database. The report’s findings indicate that these credentials were compiled from infostealers exfiltrating  credentials from compromised endpoints and environments, and data stolen in several credential stuffing attacks and previous breaches. (In fact, Hunt also recognized his own information from an illegal website that allowed threat actors to search for people’s data.) 

The report also shared a screenshot of the stealer logs, which contained a URL to login, an email address to log in, and the password in his findings.

In total, Hunt identified 319 files, with a total file size of 104 GB. He was also able to verify that the credentials were real by contacting several people listed in these infostealer logs, and by using website password request forms or registration forms to confirm that the email address exists in their account bases.

Why This Matters to Helpdesks

Are You Rotating Your Credentials?

The size of this data leak poses a major risk to MSPs and end users alike, and truly emphasizes the risks associated with stale or reused credentials and standing privilege, such as persistent admin accounts. 

Are You Implementing Zero Standing Privilege?

That’s why security best practices require individuals and organizations to mitigate their risk by regularly rotating critical credentials, and limiting privileged access through solutions like Just-in-Time access.

Next Steps

CyberQP’s security experts recommend that concerned MSPs and end users take the following actions to mitigate their risk:

  • Check if your data has been compromised with a service like Have I Been Pwned.
  • Add another layer of protection to your key accounts, including complex passwords or passphrases and multi-factor authentication (2FA/MFA).
  • For privileged accounts, utilize a password vault and implement additional protection, such as end user identity verification. 
  • MSPs can implement a moving target defense for their privileged accounts by regularly rotating credentials to deter threat actors and prevent them from achieving a foothold in your environment or executing lateral movement attacks.  
  • MSPs can also reduce their attack surface with Just-in-Time accounts that only grant privileged access for the amount of time a user needs it. Solutions like these also enable them to meet compliance and cyber insurance best practices by achieving zero standing privilege. 

CyberQP redefines Zero Trust Helpdesk Security with leading-edge Privileged Access Management (PAM) and End-User Access Management (EUAM) solutions. Our platform enables secure elevated access for both technicians and end users, along with robust self-serve and identity verification capabilities. Backed by SOC 2 Type 2 certification, we empower IT professionals to eliminate identity and privileged access security risks, enforce compliance, and enhance operational efficiency. Our mission is simple: “Empowering Access, Redefining Privilege” for help desks around the globe. To learn more visit: https://cyberqp.com/tours

The Latest News & Events

Quickpass Rebrands to CyberQP, Raises $12M to Help MSPs with Privileged Access Management.

CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges

PRESS

CyberQP Releases Groundbreaking Zero Trust Helpdesk Security Platform to Eliminate Standing Privileges

Vancouver, B.C., CanadaCyberQP, a leading provider of access management solutions, has launched its Zero Trust Helpdesk Security Platform—combining QGuard for Privileged Access Management (PAM) and QDesk for End-User Access Management (EUAM). This unified solution helps IT teams reduce risk, improve efficiency, and eliminate standing privileges across the organization.

Game-Changing Access Control

A key innovation of the platform is End-User Elevation, which allows users to gain temporary admin access without persistent privileges. By automating approval processes and monitoring activity in real-time, CyberQP dramatically reduces attack surfaces while maintaining security and compliance. 

“We built this platform to address major security gaps caused by always-on access,” said Mateo Barraza, CEO & Co-Founder of CyberQP. “With QGuard and QDesk, businesses can finally enforce true Zero Trust principles across their environments.” 

Platform Highlights

  • Just-in-Time Access: Grant technicians and users time-limited access only when needed—no standing privileges, no exposed passwords. 
  • Credential Rotation: Automatically rotate credentials to prevent stale logins and reduce vulnerability to attacks. 
  • Self-Service Tools: End users can reset passwords and manage accounts without technician intervention, cutting down ticket volume and costs. 
  • Helpdesk Verification: Instantly verify user identities to prevent social engineering and fraud. 
  • Comprehensive Visibility: A unified dashboard delivers insights across privileged and end-user access activity. 

CyberQP integrates with PSA platforms including ConnectWise, Datto Autotask, and Halo PSA, and meets key compliance and cyber insurance requirements with SOC 2 Type 2 certification.

Availability

The CyberQP Zero Trust Helpdesk Security Platform is available now. For more information, visit www.cyberqp.com.

About CyberQP

CyberQP redefines Zero Trust Helpdesk Security with leading-edge Privileged Access Management (PAM) and End-User Access Management (EUAM) solutions. Our platform enables secure elevated access for both technicians and end users, along with robust self-serve and identity verification capabilities. Backed by SOC 2 Type 2 certification, we empower IT professionals to eliminate identity and privileged access security risks, enforce compliance, and enhance operational efficiency. Our mission is simple: “Empowering Access, Redefining Privilege” for help desks around the globe.

The Latest News & Events

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

5 Ways to Rotate Active Directory Service Account Passwords

Introducing The Future of Zero Trust Helpdesk Security: Meet the Comprehensive CyberQP Platform

BLOG POST

Introducing The Future of Zero Trust Helpdesk Security: Meet the Comprehensive CyberQP Platform

Post Date:

Read Time: 5 Minutes

Featured Product Tours:

MSP Insights

When I heard this, I knew immediately how excited this one is going to make many of our partners. CyberQP has just launched its game-changing Zero Trust Helpdesk Security Platform, designed to tackle one of the biggest challenges in IT security: managing all the layers of privileged and end-user access without the headache. 

Let’s face it: cyber threats are getting smarter. Bad actors today are using sophisticated social engineering attacks like Vishing and impersonation to circumvent traditional cybersecurity tools. But with CyberQP’s platform, companies can lock down access, boost productivity, and rest easier knowing their systems are secure. 

A Powerful Duo: QGuard + QDesk

At the heart of this new platform are two powerful tools: QGuard and QDesk. 

QGuard is your go-to solution for Privileged Access Management (PAM). It eliminates standing privileges, reduces the risk of credential-based attacks, and ensures technicians get only the access they need—when they need it. No more passwords to steal or stale admin accounts floating around.

QDesk takes End-User Access Management (EUAM) to the next level. It simplifies identity verification, manages password resets, and streamlines secure access for end users. Best part? It integrates seamlessly with your existing PSA tools like ConnectWise and Autotask.  

End-User Elevation: A Game Changer

We get it—sometimes end users need admin access to get their jobs done. But granting full, unrestricted access? That’s a risk no one wants to take. That’s where End-User Elevation comes in. With this new feature, end users can request time-limited, process-based admin access that’s automatically revoked once they’re done. Technicians can approve just the applications or installations that require elevation, keeping security intact. 

  • Auto Approval Rules Engine: Customize automatic approvals for trusted applications.
  • Process-Based Elevation: Approve only what’s necessary without exposing the whole system.
  • Audit Logs: Maintain complete visibility with detailed records of all elevation requests.

Why Zero Trust Matters

The CyberQP platform is built with Zero Trust principles at its core. That means no one is trusted by default—every request is verified, every action is logged, and access is always limited to the bare minimum required. 

This approach drastically reduces the attack surface, preventing ransomware attacks, credential theft, and other malicious activities. 

See It In Action

Ready to experience a more secure, efficient helpdesk? CyberQP’s Zero Trust Helpdesk Security Platform is available now. Say goodbye to standing privileges and hello to smarter, safer access management. 

Book a Demo and see how we’re redefining privilege management.

Paul Redding

Paul Redding

SVP, Channel Marketing and Communities

Paul Redding began his career as the CEO of an MSP specializing in clients from highly regulated industries such as healthcare and US Department of Defense supply chain. Following his exit, Paul reemerged as a prominent thought leader and passionate advocate in the IT channel. Leveraging his extensive experience helping organizations navigate and maintain cybersecurity compliance, Paul now collaborates with partners worldwide to help them implement top-tier security practices, streamline support processes by eliminating repetitive tasks, and foster deeper, more profitable client relationships.

CyberQP redefines Zero Trust Helpdesk Security with leading-edge Privileged Access Management (PAM) and End-User Access Management (EUAM) solutions. Our platform enables secure elevated access for both technicians and end users, along with robust self-serve and identity verification capabilities. Backed by SOC 2 Type 2 certification, we empower IT professionals to eliminate identity and privileged access security risks, enforce compliance, and enhance operational efficiency. Our mission is simple: “Empowering Access, Redefining Privilege” for help desks around the globe. To learn more visit: https://cyberqp.com/tours

The Latest News & Events