When Expertise Matters: The Perils of Technology Providers Overextending into Unfamiliar Technologies
- Jacob Walsh
- Aug 19
- 6 min read
Updated: 5 days ago
Hiring an outside expert to build a website, develop an application or run your cloud environment is supposed to simplify technology adoption and make complex systems more secure. In reality, anyone can set up shop as a “web developer,” “software engineer” or “infrastructure specialist.” If that provider – whether a managed service provider (MSP), an independent consultant, a freelance web developer or any other self‑styled technology guru – advertises support for platforms like Microsoft 365 (M365), SquareSpace or Amazon Web Services (AWS) without fully understanding how they work, your business can end up more vulnerable than if it had done nothing at all. Misconfigured cloud settings are one of the leading causes of data leaks and security incidents today, and inexperienced providers often overlook subtle but critical configuration steps. Worse, some vendors rely on buzzwords and vague promises to win clients; overselling features and under‑delivering on results erodes trust and creates unrealistic expectations.
Misunderstood Platforms and Misconfigurations
Microsoft Power Apps: a case of default insecurity
Low‑code tools such as Microsoft Power Apps make it easy to build custom portals and dashboards, but they also expose data if administrators do not adjust default settings. An investigation by UpGuard in 2021 found that more than 38 million records across 47 government entities and private companies were exposed through Power Apps portals that allowed anonymous access to sensitive data. The problem was not a software flaw but a configuration choice: administrators failed to enable table permissions on OData API feeds, making lists of sensitive information publicly accessible. Despite documentation warnings, many organizations never realized that the default settings left customer personal information, social security numbers and contact‑tracing records open to the internet. A provider who doesn’t understand these nuances might launch a Power Apps portal for a client and, in doing so, unintentionally create a data‑leak risk.
Microsoft 365: more than flipping a switch
Microsoft 365 offers a robust suite of collaboration tools, but it is also easy to misconfigure. Partners Plus, an IT service company, notes that misconfigurations in M365 are among the leading causes of security breaches for small and mid‑sized businesses. Common mistakes include:
Using global administrator accounts for day‑to‑day work. Granting everyone global admin rights may be convenient, but if a single account is compromised, attackers gain unrestricted access to the entire M365 environment. Least‑privilege practices are essential but are often overlooked by providers who assume cloud platforms are secure by default.
Leaving legacy protocols enabled. POP and IMAP are still enabled on many tenants even though they don’t support multi‑factor authentication (MFA). Attackers exploit these protocols to bypass MFA, yet inexperienced providers sometimes leave them running.
Failing to enforce MFA. Some organizations still allow optional MFA, leaving accounts “one password away from exposure”. Without strong authentication, credential theft leads directly to data breaches.
Sharing sensitive files via anonymous links. M365 makes it simple to share documents using links that require no login; one mis‑shared link can give outsiders access to confidential files.
Not monitoring forwarding rules. Attackers often set up auto‑forwarding rules that silently send all emails to an external address, and they can run for months if no one is monitoring them.
These missteps show that M365 requires careful configuration and continuous monitoring. A provider that simply “turns it on” without adjusting defaults can leave clients exposed. Even disabling user accounts isn’t enough if you ignore session tokens; research by the Cloud Security Alliance notes that disabled users can continue to access SharePoint and OneDrive until their access tokens expire, leaving data vulnerable Fixing this requires explicit policies to sign out inactive users and invalidate session tokens—a detail that inexperienced administrators may not know.
AWS: misconfigured buckets and public data
Amazon Web Services is marketed as “secure by default,” but S3 storage buckets and other services still require configuration. Pegasus Airlines suffered a data breach in 2022 when an AWS S3 bucket was left publicly accessible, exposing 6.5 terabytes of sensitive information including flight crew personal data. BlackFog’s analysis notes that the breach underscores the need for server‑side encryption, strict bucket policies and real‑time misconfiguration detection. The Cloud Security Alliance likewise warns that inadequate or misconfigured S3 permissions can allow unauthorized access to sensitive data. Incompetent providers might set up cloud storage with overly permissive access control lists or forget to enable encryption, inadvertently allowing attackers to browse or download confidential data.
SquareSpace: not as simple as it seems
Even website builders can have hidden complexities. In July 2024 a number of businesses had their domains hijacked after migrating from Google Domains to SquareSpace. Researchers explained that attackers could create an account using a domain’s email address before the legitimate owner completed the migration, because SquareSpace didn’t require email verification for new accounts. Once inside, the attacker could set their own password and gain control of the domain. Domain owners discovered they had no audit logs or notifications for many actions, and even “domain manager” accounts had privileges to transfer or redirect the domain. The help guide recommended enabling multi‑factor authentication and disabling reseller access, but many users didn’t know these controls existed A provider who simply migrates domains without understanding these risks can inadvertently hand control of your website and email to attackers.
Why Doing Nothing Might Be Safer
These examples illustrate a dangerous pattern: using powerful cloud tools without understanding their configuration can create new attack surfaces. The very act of moving data into a misconfigured cloud service may expose more information than if you had left it on‑premises. In some cases, a provider’s “upgrade” may go beyond your team’s capacity to manage or monitor it, leaving you dependent on someone who doesn’t know what they’re doing.
Relying on unqualified providers can lead to:
Data breaches and compliance violations. Exposure of sensitive records can result in regulatory fines and lawsuits.
Service downtime and business disruption. Hijacked domains can redirect customers to malicious sites; ransomware can encrypt data stored in misconfigured cloud storage.
Loss of control. Default settings may allow administrators or attackers to make changes without your knowledge, and there may be no audit trails or notification to let you know.
Beware of Buzzwords and Vague Promises
It isn’t just cloud services that can be misconfigured. Some technology vendors and consultants sell solutions they barely understand, peppering their proposals with fashionable buzzwords like AI, blockchain, or next‑generation. When pressed for details, these providers often become vague or change the subject. Overpromising and under‑delivering is a common mistake in the managed services industry; overselling creates false expectations and erodes credibility. Businesses should be wary of one‑size‑fits‑all packages or grandiose claims about what a platform can do without a clear explanation of how those outcomes will be achieved.
One way to cut through this marketing fog is to enlist a neutral third party to evaluate proposals and configurations. A service such as BS Free IT can act as an intermediary, helping to validate whether a provider’s claims match reality. Because BS Free IT is not tied to any specific vendor, it can review your existing systems, identify misconfigurations or unnecessary components, and provide an honest assessment of the risks. This level of independent oversight helps ensure you are not locked into a relationship with a provider who uses hype rather than expertise.
Protecting Your Business: Questions to Ask Your Technology Provider
To avoid these pitfalls, businesses should vet service providers carefully. Consider asking:
What experience do you have with projects like mine? Ask for examples and references from similar businesses so you can gauge their track record.
How will you keep my data and systems safe? Invite them to explain in plain language how they’ll set up accounts, limit access to sensitive information, and avoid common mistakes. Missing or vague details are a key indicator of an unprepared vendor.
How will you keep an eye on things once we’re up and running? A good provider should actively monitor the systems they manage and warn you if they see something unusual or risky.
What happens if something goes wrong? Find out how they handle outages or security incidents and how they’ll notify and involve you in the solution.
Will you teach us what we need to know? Look for providers who offer clear instructions and basic training so you’re not left in the dark about how to use or manage your new tools.
Who owns our data and how easy is it to leave? Make sure you retain control of your information and can transition to a new provider without being locked in.
Final Thoughts
Modern platforms promise agility and productivity, but they also come with hidden complexities. Providers who truly understand these technologies can unlock tremendous value and security for their clients. Those who simply sell the buzzwords without mastering the underlying systems may leave your business at greater risk than doing nothing at all. By insisting on transparent expertise, proper configuration and continuous monitoring, organizations can ensure that outsourcing to a technology vendor genuinely enhances their security instead of undermining it.
