More MSP 501ers Share Insights on Kaseya Attack as Company Works to Patch Things Up

As Kaseya works to get the issue fixed and its customers patched, our #MSP501ers continue to share their thoughts.

Allison Francis

July 12, 2021

11 Slides
Cyber skills

Already have an account?

Getty Images

We asked our 2021 MSP 501ers to weigh in on the Kaseya VSA supply chain ransomware attack last week. And boy, did they ever. With more timely responses and sage advice pouring in over the weekend, we decided to share more of their thoughts.

Meantime, Kaseya has been doing some serious damage control. 

On Sunday, Kaseya released its patch to VSA on-premises customers and completed restoration of services. All of its SaaS customers are now live. In addition, support teams are continuing to work with VSA on-premises customers who have asked for help with the patch (VSA is Kaseya’s remote monitoring and management (RMM) service). All of the attacked MSPs were using the VSA on-premises product.

Our 2021 501ers had quite a bit to say on this issue in terms of the impact the Kaseya and other breaches have had on MSP businesses. We’ve included more of their responses in the slideshow above.

Read more about:

MSPsVARs/SIsMSP 501

About the Author

Allison Francis

Allison Francis is a writer, public relations and marketing communications professional with experience working with clients in industries such as business technology, telecommunications, health care, education, the trade show and meetings industry, travel/tourism, hospitality, consumer packaged goods and food/beverage. She specializes in working with B2B technology companies involved in hyperconverged infrastructure, managed IT services, business process outsourcing, cloud management and customer experience technologies. Allison holds a bachelor’s degree in public relations and marketing from Drake University. An Iowa native, she resides in Denver, Colorado.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like