Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Kaseya Ransomware Attack & Zero Trust

News of the ransomware attack on Kaseya was widespread, since the attack took place over the American Fourth of July weekend in 2021. The attackers used a vulnerability in the company’s remote monitoring tool, exploiting a zero day vulnerability that impacted more than 1,000 businesses in several countries, stalling business operations. This type of attack within the ransomware space is known as a “supply chain attack”, where hackers use an IT tool trusted by users and networks, to access the system and damage and encrypt files. 

As one of many recent high profile attacks, there has been more discussion about the need for organisations to adopt a strategy called “zero trust”. Zero trust means that no one is fully “trusted” on the network, regardless of their administrative status or if they’re an employee. It looks at all activity as a potential threat and requires IT departments to restrict privileges and require users to authenticate their identity and credentials. 

Here’s how a zero trust architecture can protect your business:

  • It gives you full visibility of your system to see the traffic and potential malicious activity
  • It minimises the attack surface by adding authentication steps that can halt attackers during their movement through your systems
  • It can detect and stop hacks, when using zero trust-related IT and cybersecurity tools on all devices
  • It provides more control by minimising permissions access and ensuring only authorised employees can make significant changes

Contact us today to discuss a cyber security strategy for your organisation and how you can implement zero trust to prevent attacks.

CATEGORIES

Cyber Attack - Cyber Security - Ransomware

TAGS

cyber attack - cyber risk - cyber threats - cyberattack - cyberprotection - kaseya - ransom - Ransomware - zero trust

SHARE

PrevPreviousRansomware: Understanding & Preventing It
NextTop 3 Cyber Security Risks for Your Remote EmployeesNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.