What is the message to the rest of the MSP community that has not been impacted here?
For those not impacted by the Kaseya vulnerability but run a remote monitoring tool, now is the time to forewarn your clients how this could absolutely happen to them as well. Then you can be prepared to quickly restore them. Bottom line: MSPs need to prepare their clients and let them know this could happen to you too and we are the type of MSPs that are going to help you quickly restore.
Likewise those MSPs need to be preparing. We even released in 2019 with NinjaRMM (All in One MSP Tool Provider) an absolutely amazing one hour and 45 minute video giving MSPs step by step guidance. What is crazy is that 2019 video on YouTube is just as actionable here in 2021. The reality is not enough people watched it and hardly anybody took action on it.
Are there MSPs that rely on Kaseya for remote management and monitoring waiting for “all clear” from Kaseya rather than working on their own to restore their client’s data from backups?
That is true for some MSPs, but we have seen some MSPs to be honest that have done a great job. I can’t tell you how much of Huntress’ threat intelligence is coming from MSPs.
I think there is a big difference between MSPs that are truly operationally mature and those that aren’t doing this.