Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
How Progressive Computing Combated a Large-Scale Cyberattack
Published:
August 23, 2022

How Progressive Computing Combated a Large-Scale Cyberattack

By:
Rachel Bishop
Share icon
Glitch effectGlitch effectGlitch effect

Let’s set a scene that’s all too familiar to those of us who work in cybersecurity.

It's the Friday afternoon before the Fourth of July weekend. So far, things are quiet. You’re excited for the long weekend, fireworks and barbeques.

But then, the unthinkable happens, and all hell breaks loose. Ransomware strikes your entire customer base. Not one, not two—but your entire client base. 

You feel yourself go numb. Then, you’re at a standstill for the next two minutes as you process the nightmare that just landed on your doorstep.

So, what’s next? 

Progressive Computing

This nightmare scenario was an unfortunate reality for Robert Cioffi, COO and co-founder of Progressive Computing.

On July 2, 2021, hackers launched a cyberattack on Kaseya’s VSA, which affected approximately 50 managed service providers (MSPs). 

The REvil ransomware group launched an attack that spread from the MSPs to between 800 and 1,500 businesses worldwide, leaving them virtually paralyzed. 

Progressive Computing was one of the victims of the attack on the Kaseya VSA RMM tool. Hackers installed ransomware across their entire client base, simultaneously affecting 2,500 endpoints across 80 clients with 200 physical sites in four different time zones. 

We hosted a webinar with Robert, where he candidly shared his team's story from the last year, providing his perspective on what went through his head leading up to and following the attack. It’s an incredible story of how they were able to fight through a mass-scale attack and emerge even stronger. 

Key Takeaways

We won't spoil the entire story for you—it's a good one and one worth hearing firsthand. But, we’ll share some key takeaways that Robert offered to any MSP that finds itself in the same stressful situation.

1. Have an incident response plan.

With no formal incident response plan in place, Robert and the Progressive Computing team were desperately trying to find a fix. But how do you begin to fix something when you don't even know what the actual fix is? 

He credited the core values and the culture his team has built as their saving grace. But he urged others to learn from the mistakes Progressive Computing made and reasoned that even a half-baked plan is better than nothing. 

However, the right response plan can make or break how you handle cyber incidents, so we recently met again with Robert and our panel of MSPs and experts to discuss the ins and outs of incident response planning (you can watch that full webinar here).

2. Call your cyber liability insurance provider.

As Robert says in the webinar, the first step any MSP should take in the event of a cyberattack is to contact their cyber liability insurance provider.

With attorneys specializing in these kinds of circumstances, they will be your first responders in helping you begin to navigate these situations. 

Quote_Progressive1_v2

3. Don't be so quick to use the "B" word.

Robert warns of using the “B” word, breach, because of the legal implications the word carries. Often, it’s better (and less legally scathing) to use words like incident or event.

Quote_Progressive2

4. Remember that culture wins over strategy.

As Robert began to guide his team through what seemed like an impossible situation, he reflected on the core values of Progressive Computing. Those values are

  • Commitment: Determination to do what it takes
  • Team: Together, we get it done 
  • Humble confidence: Service without ego 
  • Respect, always 

Robert knew that by coming together as a team and remembering their core values, they would find their way through—no matter what.

Quote_Progressive3

5. Lean on the MSP community.

A major point of emphasis from this story is the need for a peer group—a  community you can lean on when if find yourself in situations like these. 

We’re all about community at Huntress, so we were quick to reach out and offer our services to help Robert and his team navigate through this attack. 

The best part? We weren't alone in offering help! What started as a couple of business owners and their staff showing up to help Progressive Computing turned into a wave of people offering support. With this community, Robert and his team were able to come out on the other side. 

But this led Robert to a new question: “It got me thinking, how do we create a system so that any MSP can break the glass in case of emergency?”

Enter the Volunteer Response Corps.

Volunteer Response Corps

With the Volunteer Response Corps, there is truly light emerging from darkness. Robert explains that this organization will be a “for us, by us” group of MSPs that work together to help others in their time of need. It’s a clear way for the MSP community to unite and fight back against these savvy attackers.

Quote_Progressive4

Robert detailed how this organization came to fruition in the webinar. 

The Huntress Neighborhood Watch Program

In the Progressive Computing story and many others like it, we see the triumph of community. Their story (and so many like it) is why we felt compelled to develop The Huntress Neighborhood Watch Program, which we designed to provide MSPs with practical programs and resources to raise the security level for the entire cybersecurity community. 

Huntress partner or not, these resources are available to all!

Categories
Business Growth
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • A Journey Back to the World of MSP Security

    Dima Kumets explains why he wanted to make his way back to the world of MSP security—and how he ended up as a Principal Product Manager at Huntress.
  • Fake Browser Updates Lead to BOINC Volunteer Computing Software

    Huntress has observed new behaviors in conjunction with the malware SocGholish. Read on to understand the implications of this threat and how you can better protect yourself.
  • The Value of Managed EDR for the Modern MSP

    Our partners at Clear Guidance Partners experienced the value of our EDR capabilities in real-time, pitting them against an active ransomware attack.
  • One Year Later: Lessons Learned from the Colonial Pipeline Cyberattack

    We recap some of the lessons we have learned over the past year thanks to the Colonial Pipeline attack.
  • Cybersecurity Basics: A Chat With Syncro

    Read our webinar recap to learn what Henry Washburn of Huntress and Ian Alexander of Syncro outlined to help MSPs protect SMBs from cybersecurity threats.
  • Breaking Down Ransomware Attacks and How to Stay Ahead

    Break down how a ransomware attack works. Why ransomware is on the side, and how Huntress helps you stay protected.
  • #ShadyHacks with Kyle Hanslovan

    Huntress CEO Kyle Hanslovan's live hack demo: modern hacker playbook, with stolen credentials, MFA bypass, and M365 token hijacking. Get defense tips, stay protected.
  • Bringing the Hunt to Australia and New Zealand

    Huntress is bringing the hunt to Australia and New Zealand! Hear from the Regional Director of Huntress ANZ what this expansion means.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy