Ransomware attack against Kaseya’s Virtual System Administrator platform should be a wakeup call, authors say. Organizations need to use endpoint analytic tools that can differentiate corrupt behavior from legitimate commands, they say. These attacks, and the legitimate software that serves as a disguise for the attacks, ultimately originate outside of the company environment, they could be characterized as supply chain attacks. Having a comprehensive and effectively managed monitoring platform active 24×7 is becoming more than just a good idea: it is increasingly becoming a necessity.”]

