Ivan Mladenovic, President and CEO, Preemo
Is this driving more customer engagement and business for you as a result?
“It’s certainly driven more engagement from clients, but not entirely positive. Our clients are naturally reading the news, and then asking questions. Each interaction requires a calculated, consistent response, ensuring they know the facts, both about the Kaseya breach, about our own systems, and how they differ. It’s certainly opened up new conversations about cybersecurity, and helped in closing opportunities that have been lingering.”
Are you looking for more vendors to partner with to prevent these types of attacks on your organization and customers?
“We’re always looking for new vendors to address this type of attack, but we’re looking at existing vendors even more. The big players (Connectiwse, Datto, etc.) are embedded in so many MSPs, and it’s their responsibility to give the MSPs confidence that this won’t happen to them.”
Are you worried about your PRM providers such as Kaseya and ConnectWise in terms of the security of their network and vulnerabilities?
“I’m sure after this Kaseya breach, and others in the past, everyone is progressively more worried, and we need to be prepared, both proactively and reactively, on handling a breach of our own.”
Are you getting more calls from security vendors to partner with them because their solutions could prevent such attacks?
“No, but we’re proactively looking for opportunities to further secure our environment.”
Are you partnering with other MSPs to solve these types of supply chain problems for your customers?
“The immediate response from the MSP community after the Kaseya breach was “how can I help,” further reinforcing how united this community is, despite its competitive nature.”
Have you been able to raise your per-seat or services prices as a result of these attacks?
“No, we’re not looking to capitalize on raising prices just because of a single breach. We’re ensuring that clients understand the road map to a protected business, and have us as a resource for analysis, selection, deployment, and management.”