Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Ingram Micro Restores All Business Operations Globally After Ransomware Attack

CRN by CRN
July 10, 2025
Home News
Share on FacebookShare on Twitter


‘This [attack] confirms above anything else that every client of every size needs to be vigilant. I’m not saying Ingram wasn’t, but this is why we do what we do for our clients,’ says Mark Essayian, president of KME Systems.

Ingram Micro has restored all business operations around the globe after it suffered a ransomware attack last week.

In a statement posted to its information page regarding the attack, the Irvine, Calif.-based distributor stated Wednesday night that it is “pleased to report that we are now operational across all countries and regions where we transact business.

“Our teams continue to perform at a swift pace to serve and support our customers and vendor partners,” the statement continued. “We are grateful for the support we’ve received from our customers and industry colleagues. This is an industry based on strong and committed relationships that make all the difference.”

The Safepay ransomware organization is responsible for the attack, according to Bleeping Computer. Ingram Micro proactively took its systems offline ahead of the July 4 weekend and restored systems through a layered approach throughout this week.

The cyberattack underscores the complexity of today’s threat environment in which even the most robust preparations can be challenged by persistent adversaries.

[Related: Ransomware Volume Drops Even As Number Of Active Groups Surges: GuidePoint Security]

“You can run all your tabletop exercises and disaster recovery drills, but until you actually go through it, there’s always something new to learn,” Guy Baroan, president of Elmwood Park, N.J.-based Baroan Technologies, told CRN. “What really matters is how quickly and properly they brought back systems back online. That shows how prepared they really are.”

While Ingram Micro’s systems were down, Baroan implemented contingency plans and worked with a secondary distributor to fill urgent client needs.

“This is just the state of the state,” he said. “Every firewall, every remote access device has software. Every software update could be a new vulnerability. It’s a constant cat-and-mouse game.”

He said the attack is a “stark reminder” that even the most secure companies are not impervious to attacks. As MSPs increasingly rely on an interconnected ecosystem of vendors, a single vulnerability can have rippling effect, he added.

“It’s not about being too big or thinking it’ll never happen to you,” he said. “It’s just not true. Anyone can get hit anytime. And the cybercriminals aren’t stopping.”

But with transparency, collaboration and the right recovery process, Ingram Micro, and any organization facing a similar crisis, can emerge stronger, he said.

“In a few months, we’ll be looking at Ingram as an even better, more resilient company,” Baroan said. “Because that’s what happens when you face something like this head-on and with integrity.”

Mark Essayian, president of Irvine, Calif.-based KME Systems, said that Ingram Micro’s investment in education, support and speed of business has “fundamentally changed” his expectations of the distributor over the years.

“Now people were mad if they couldn’t get something in three seconds. That tells you how successful their platform has been,” he told CRN.

While inconvenient, Essayian echoed Baroan’s sentiment in that the ransomware attack serves as a reminder of the cybersecurity risks even large corporations face.

“This [attack] confirms above anything else that every client of every size needs to be vigilant,” he said. “I’m not saying Ingram wasn’t, but this is why we do what we do for our clients.”



Source link

Tags: Cloud SecurityCyber ResilienceCybersecurityEndpoint SecurityManaged Securitynetwork securityransomware
CRN

CRN

Next Post
‘YOLO’-buying EVs: As ,500 tax credit ends, consumers may rush to cash in. Here’s how to get a good deal

'YOLO'-buying EVs: As $7,500 tax credit ends, consumers may rush to cash in. Here's how to get a good deal

Recommended.

RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

RedCurl Shifts from Espionage to Ransomware with First-Ever QWCrypt Deployment

March 26, 2025
VMware backup: Key decision points if you migrate away from VMware | Computer Weekly

VMware backup: Key decision points if you migrate away from VMware | Computer Weekly

January 27, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio