Glitch effect

How to Survive a Nightmare Attack

Glitch effectGlitch effect
Watch the Webinar
By submitting this form, you accept our Terms of Service & Privacy Policy
Oops! Something went wrong while submitting the form.

What would you do if you had a security incident that could ruin your client relationships and your business? It’s a nightmare scenario - and it’s one that a New York-based MSP faced a year ago.

Progressive Computing was one of the victims of the attack on the Kaseya VSA RMM tool on July 2, 2021. Hackers installed ransomware across their entire client base, simultaneously affecting 2,500 endpoints across 80 clients with 200 physical sites in four different time zones.

Watch our webinar to hear from the team at Progressive Computing as they share their story of the last 12 months. It’s not just a story of the technical side of recovery and restoring their systems, it’s also one of fighting through a mass-scale attack and coming out the other side scarred, but wiser and stronger.

Becky Teal
Community Lead, Huntress
LinkedIn icon
Robert Cioffi
COO & CO-FOUNDER, Progressive Computing

[PH] Learn More About Phishing

[PH] Huntress delivers everything you want from a security tool, all designed with the unique needs of outsourced IT and security teams in mind.
[PH] Phishing attempts can show up as messages from your bank, your boss, your utility providers, or even the government. One click from one user can compromise an entire network and inadvertently let hackers deploy ransomware, steal information, or worse.
[PH] The median time it takes for a user to click a link and enter information is less than 60 seconds. With a turnaround time that quick, it's no wonder phishing is one of the preferred methods used by hackers. (2024 Verizon Data Breach Report)
Glitch effectGlitch effectBlurry glitch effect