CIO Influence
CIO Influence News Cloud Security

Kaseya Ransomware Attack, Lessons to Learn Shared by Ransomware Experts

Kaseya’s Highly-Anticipated M&A Summit Helps MSPs Navigate the Evolving Mergers & Acquisitions Landscape
NYC area cybersecurity expert shares lessons to learn from the Kaseya ransomware attack, including supply chain vulnerabilities—in a new article from eMazzanti Technologies

A NYC area ransomware expert and IT security services provider explains what happened in the recent Kaseya Ransomware attack and lessons to learn in a new article on the eMazzanti Technologies website.

The informative article first describes how the cybercriminal gang REvil exploited a vulnerability in Kaseya’s remote monitoring tool then used the update process to push ransomware to managed services providers (MSPs) and their customers.

Recommended ITech News: ShardSecure Now Available in AWS Marketplace

The author then describes Kaseya’s quick response and explains ransomware preventative measures business leaders can implement. Steps to take include updating business continuity plans, security assessments, continuous monitoring, zero trust strategies, and securing the supply chain.

“While incredibly ambitious, the Kaseya ransomware attack is hardly an isolated incident,” stated Almi Dumi, CISO, eMazzanti Technologies. “It joins a recent spate of similar attacks, including SolarWinds and Colonial Pipeline.”

Below are a few excerpts from the article, “Kaseya Ransomware Attack, Lessons to Learn.”

Recommended ITech News: Motivo, Inc. Raises $12 Million Series A to Accelerate AI-Enabled Chip Design and Improve Manufacturing Yields

Highlights Supply Chain Vulnerabilities

“In the current attack, REvil infected Kaseya with malicious code attached to its virtual system administrator software. That infection spread to approximately 60 Kaseya customers, all MSPs. And those 60 customers unwittingly passed the infection downstream to up to an additional 1,500 businesses.”

Update Business Continuity Plans

“No matter how diligently an organization addresses cybersecurity, the chances of experiencing an attack run high. Ironically, Kaseya won several cybersecurity excellence awards just months before the attack. Consequently, businesses should take time to regularly update their business continuity and incident response plans.”

Conduct Security Assessments and Monitoring

“The Kaseya attack happened very quickly. Only two hours lapsed between the time servers were infected and the time the ransomware deployed on individual devices. The speed and sophistication of the attack underscores the need for continuous monitoring.”

Recommended ITech News: Dynamic Spectrum Alliance Urges Countries Worldwide to Adopt License-Exempt Access to the Entire 6 Ghz Band

Implement Zero Trust Strategy

“A zero trust security strategy means that the system verifies every access request before granting access to data and resources. Thus, every time a user or device attempts to access information, the system requires validation. This can take the form of multi-factor authentication, endpoint security, identity, and access management and so forth.”

Expert Help to Improve Business Security

eMazzanti Technologies has maintained a security first mindset for 20 years. It follows the highest security standards and stays abreast of cybersecurity tools and best practices. The company’s cybersecurity experts provide risk assessments to identify areas of weakness. Then, they help business leaders implement a comprehensive data security plan, including 24/7 monitoring.

Recommended ITech News: FlipServe Announces The Launch Of Its Multi-Cloud Platform To Provide Businesses And Developers With AWS, Azure, And GCP Servers At More Affordable Prices

Related posts

How COVID-19 Has Accelerated the Shift to Cloud Computing

JD Little

CTG Achieves AWS Service Delivery Designation for Amazon Connect

CIO Influence News Desk

Astar Network Offers AWS Activate by Amazon Web Services to Support its Builders and Incubation Programs

CIO Influence Staff Writer

Leave a Comment