Recent CrowdStrike Incident and How to Stay Prepared

Heads up: You need to update Windows 11 by this deadline

Read This Story

Discover the latest insights from the Deycom team.

We wanted to address the recent issue involving CrowdStrike’s Falcon Sensor security software that led to widespread crashes of Windows computers globally. While most of our clients were unaffected, this incident serves as a crucial reminder of the potential vulnerabilities in IT infrastructures.  

Get our free guide on the CrowdStrike incident here

What Happened?

On the 18th of July, 2024, CrowdStrike released a patch update to their Falcon Sensor security software that inadvertently caused Windows systems to crash.  The patch caused the infamous “blue screen of death.”  Because CrowdStrike is widely deployed, the update affected a wide range of organisations worldwide, including airlines, hospitals, banks, and more.  It seems that computers that were turned off at the time of the update did not receive the faulty patch and remained unaffected and obviously it only impacted on clients using CrowdStrike’s Falcon Sensor security software. 

Impact on Cloud-Based Systems

Interestingly, the issue also impacted cloud-based systems and virtual machines, highlighting the interconnected nature of modern IT environments. Even after CrowdStrike withdrew the update, many systems required manual intervention to recover.

How to Stay Prepared

While this issue was limited to customers using CrowdStrike software, it does highlight what can happen in the event that a rouge software update is released. 

So here are some suggestions on how you can protect your own business? 

  • Regular Backups:  Ensure that all critical systems, including desktop computers, have regular backups. This practice is vital for both on-premises and cloud-based systems to quickly restore functionality in case of an unexpected failure.
  • Update Management: Implement a robust update management process. Test updates in a controlled environment before deploying them across your entire network to catch potential issues early.
  • Emergency Protocols: Develop and maintain clear emergency protocols for IT incidents. This includes having a response team ready to address any disruptions and ensuring that all employees are aware of the steps to take in case of a system failure.  If the worst does happen, can you continue to operate without your IT systems?
  • Redundancy and Diversification: Avoid relying solely on a single vendor or technology. Diversifying your IT solutions can prevent a single point of failure from crippling your entire infrastructure.
  • Regular IT Audits: Conduct regular audits of your IT systems to identify and address potential vulnerabilities. This proactive approach can help mitigate risks before they lead to significant issues.

While this incident with CrowdStrike was unprecedented, it underscores the importance of being prepared for any IT disruptions. Our team is always here to assist you with implementing these best practices and ensuring that your business operations remain resilient.

Please contact us if you would like any further information on this incident or to discuss any aspect of your organisations IT infrastructure.