Bandwidth Podcast

Security Is a Moving Target — and ISPs Feel That Every Day

Written by Rick Seemann | Jan 20, 2026 1:56:14 PM

Security is never perfect. Anyone who’s operated a network for more than five minutes knows that. It’s a moving target, and the risks that cause the most damage are usually the ones we stop paying attention to. 

In this episode of Bandwidth, we spent time unpacking the security blind spots that quietly trip up ISPs — not the obvious stuff everyone already budgets for, but the small oversights that compound over time and put both your network and your reputation at risk. 

The era of sloppy phishing emails and obvious scams is over. Today’s threats look professional, sound familiar, and often come from places you already trust. That’s what makes them dangerous. 

 

The Risk of Forgetting What’s Still Running 

One of the first vulnerabilities we talked about is legacy hardware. Not because it’s old, but because it’s easy to forget. 

Most ISPs are diligent about firmware updates — until the updates stop coming. Hardware reaches end of life quietly. It still passes traffic. The lights are still on. But the vendor has stopped patching known vulnerabilities, and attackers absolutely have not forgotten about them. 

End of life doesn’t mean “still working.” It means unsupported. It means exposed. And it means you’re now carrying risk that only grows with time. 

That risk gets worse when management access was never fully locked down. Public SNMP communities. Broad IP access. Old assumptions that no longer hold up. These aren’t edge cases — they’re common, and they’re easy to miss when you’re focused on keeping customers online. 

 

Default Allow Is the Silent Killer   

Another blind spot we see all the time is access control. Most environments still operate on a default-allow mindset: block the bad things as you notice them. 

The more resilient approach is the opposite. Block everything, then only allow what you explicitly need. 

That applies to firewalls, management interfaces, APIs — all of it. It sounds simple, but it’s counterintuitive, and it takes discipline. Devices don’t ship that way by default. And once environments grow past a handful of systems, maintaining consistency gets hard fast. 

This is where address lists, centralized management, and repeatable configuration patterns matter. Security doesn’t fail because people don’t care — it fails because chaos creeps in when there’s no structure to contain it. 

 

 

Your People Are Part of the Attack Surface 

Security training can’t stop at the office door. 

Installers, contractors, and field techs often have access to more sensitive information than anyone realizes. Install schedules. Customer addresses. Network credentials stored on phones and tablets that live outside the corporate firewall. 

If someone compromises one of those devices, they don’t just get data — they get context. They know who’s expecting a visit, when, and from whom. That’s not theoretical. That’s a real-world risk. 

The same standard has to apply to everyone with access. Employees. Contractors. Vendors. If someone isn’t willing to go through the same training and screening, they shouldn’t have access to your systems. That may sound strict, but it’s a lot less painful than explaining a breach during an audit. 

 

Physical Security Still Matters 

One of the easiest things to overlook is physical trust. 

Branded shirts. Old logos. Trucks with decals. All of it creates legitimacy in the real world. That’s why unused branded gear shouldn’t be donated or reused. It should be destroyed. 

People rely on quick visual checks. A logo on a chest or a truck often passes the sniff test. That makes excess gear a real liability — not a goodwill gesture. 

 

When a Vendor Gets Breached 

Eventually, a vendor in your stack will have a security incident. When that happens, panic doesn’t help. 

The first step is isolation. Revoke API keys. Rotate credentials. Limit access immediately. 

Then comes assessment. What was breached? How deep did it go? Was it PII? Was it data that actually impacts your customers, or internal-only information with limited exposure? 

From there, you have to decide whether you can continue to trust that vendor — and you need to ask hard questions about what they did to fix the problem. 

If customers are affected, transparency isn’t optional. Trying to stay quiet only guarantees that you lose control of the story later. Communicating early, with clear facts and consistent messaging, protects trust — even when the news isn’t good. 

 

Consistency Builds Trust 

One of the fastest ways to create a trust problem is inconsistent answers. 

If a customer asks how their data is stored and gets three different explanations from your team, you’ve created confusion at best — and a compliance issue at worst. 

Teams need permission to say, “I don’t know, but I’ll get you the answer.” That’s better than guessing. 

Policies should be documented, accessible, and consistent. Whether that means clear internal references, designated experts, or tooling that gives staff the same approved answer every time, the goal is simple: accuracy over speed. 

 

Security Never Gets Finished 

Security isn’t something you check off a list. It’s ongoing. 

Threats change. Tactics evolve. Social engineering gets more targeted. One click from the wrong person can create cascading consequences across an entire organization. 

That’s why this topic keeps coming back up — because it affects your staff, your customers, and the partners you rely on. 

The work is never done. But the more intentional you are about fundamentals — access control, training, documentation, and transparency — the better positioned you are when something eventually goes wrong. 

The full conversation, including our Love It or Hate It segment and real-world examples from the field, is available in this episode of Bandwidth. You can watch or listen on YouTube, Spotify, or Apple Podcasts. 

When we connect communities, we unlock what’s possible.  

Listen to the Full Episode 

Catch the full conversation on the Bandwidth podcast. Available now on SpotifyApple Podcasts, and the Bandwidth YouTube Channel.