The recent CrowdStrike outage was caused by a faulty software update to their Falcon sensor program. This update, released on Friday, July 19, 2024, contained a coding error that led to a "Blue Screen of Death" on millions of Windows computers worldwide. The issue primarily affected businesses and large organizations, causing significant disruptions in various sectors, including airports, supermarkets, and hospitals.
CrowdStrike quickly identified and fixed the problem, but the recovery process has been complex for many users. Source
At Celfocus, we aim to protect our assets from incidents such as this, by performing several preventative actions:
Vulnerability refers to a flaw or weakness in a system, network, or application that can be exploited by a threat actor to gain unauthorised access, cause damage, or disrupt operations. Vulnerabilities can arise from various issues such as software bugs, configuration errors, or inadequate security practices. Effective vulnerability management involves identifying, prioritizing, and remediating these weaknesses to reduce the risk of exploitation and protect the organization's assets.
There are several vulnerabilities that affect most devices, but here are some of the most common ones:
We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organization.
Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:
Email: information.security@celfocus.com
The recent CrowdStrike outage was caused by a faulty software update to their Falcon sensor program. This update, released on Friday, July 19, 2024, contained a coding error that led to a "Blue Screen of Death" on millions of Windows computers worldwide. The issue primarily affected businesses and large organizations, causing significant disruptions in various sectors, including airports, supermarkets, and hospitals.
CrowdStrike quickly identified and fixed the problem, but the recovery process has been complex for many users. Source
At Celfocus, we aim to protect our assets from incidents such as this, by performing several preventative actions:
Vulnerability refers to a flaw or weakness in a system, network, or application that can be exploited by a threat actor to gain unauthorised access, cause damage, or disrupt operations. Vulnerabilities can arise from various issues such as software bugs, configuration errors, or inadequate security practices. Effective vulnerability management involves identifying, prioritizing, and remediating these weaknesses to reduce the risk of exploitation and protect the organization's assets.
There are several vulnerabilities that affect most devices, but here are some of the most common ones:
We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organization.
Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:
Email: information.security@celfocus.com
The recent CrowdStrike outage was caused by a faulty software update to their Falcon sensor program. This update, released on Friday, July 19, 2024, contained a coding error that led to a "Blue Screen of Death" on millions of Windows computers worldwide. The issue primarily affected businesses and large organizations, causing significant disruptions in various sectors, including airports, supermarkets, and hospitals.
CrowdStrike quickly identified and fixed the problem, but the recovery process has been complex for many users. Source
At Celfocus, we aim to protect our assets from incidents such as this, by performing several preventative actions:
Vulnerability refers to a flaw or weakness in a system, network, or application that can be exploited by a threat actor to gain unauthorised access, cause damage, or disrupt operations. Vulnerabilities can arise from various issues such as software bugs, configuration errors, or inadequate security practices. Effective vulnerability management involves identifying, prioritizing, and remediating these weaknesses to reduce the risk of exploitation and protect the organization's assets.
There are several vulnerabilities that affect most devices, but here are some of the most common ones:
We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organization.
Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:
Email: information.security@celfocus.com