To Know
-
Preventative Actions
Keep an eye out
CALL To Evolution
Sep 2024
To Know
-
Preventative Actions
Keep an eye out
CALL To Evolution
Sep 2024
EDITION EDITORIAL & OVERVIEW
Preventative Actions
#
57
CALL To Evolution
-
Sep 2024

What happened during the global IT outage?

The recent CrowdStrike outage was caused by a faulty software update to their Falcon sensor program. This update, released on Friday, July 19, 2024, contained a coding error that led to a "Blue Screen of Death" on millions of Windows computers worldwide. The issue primarily affected businesses and large organizations, causing significant disruptions in various sectors, including airports, supermarkets, and hospitals.

CrowdStrike quickly identified and fixed the problem, but the recovery process has been complex for many users. Source

At Celfocus, we aim to protect our assets from incidents such as this, by performing several preventative actions:

  • Vendor Assessments: Regularly evaluate vendors for their reliability, security practices, and contingency plans;
  • Preparation: Develop and update an incident response plan that includes steps for dealing with third-party outages;
  • Data Backups: Regularly back up data and ensure redundancy of the backups stored in multiple locations;
  • Simulation Drills: Conduct tabletop simulations to ensure the team is prepared to handle real incidents;


Word of the Edition – Vulnerability

Vulnerability refers to a flaw or weakness in a system, network, or application that can be exploited by a threat actor to gain unauthorised access, cause damage, or disrupt operations. Vulnerabilities can arise from various issues such as software bugs, configuration errors, or inadequate security practices. Effective vulnerability management involves identifying, prioritizing, and remediating these weaknesses to reduce the risk of exploitation and protect the organization's assets.


There are several vulnerabilities that affect most devices, but here are some of the most common ones:

  • Injection Flaws: Attackers trick systems into running harmful commands;
  • Weak Authentication: Poor login controls let attackers access accounts;
  • Cross-Site Scripting (XSS): Hackers insert bad code into websites to steal data;
  • Security Misconfiguration: Incorrect security settings make systems vulnerable;
  • Outdated Software: Old software can have flaws that attackers exploit.

 

Join the challenges!

  • Remote working safely: With this challenge, you will understand the necessary security precautions to take while working remotely or while travelling.
  • Safebrowsing: With this challenge, you will learn the requirements for safe browsingin your devices.

 

Information Security Contacts

We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organization.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:

Email: information.security@celfocus.com

No items found.
No items found.

What happened during the global IT outage?

The recent CrowdStrike outage was caused by a faulty software update to their Falcon sensor program. This update, released on Friday, July 19, 2024, contained a coding error that led to a "Blue Screen of Death" on millions of Windows computers worldwide. The issue primarily affected businesses and large organizations, causing significant disruptions in various sectors, including airports, supermarkets, and hospitals.

CrowdStrike quickly identified and fixed the problem, but the recovery process has been complex for many users. Source

At Celfocus, we aim to protect our assets from incidents such as this, by performing several preventative actions:

  • Vendor Assessments: Regularly evaluate vendors for their reliability, security practices, and contingency plans;
  • Preparation: Develop and update an incident response plan that includes steps for dealing with third-party outages;
  • Data Backups: Regularly back up data and ensure redundancy of the backups stored in multiple locations;
  • Simulation Drills: Conduct tabletop simulations to ensure the team is prepared to handle real incidents;


Word of the Edition – Vulnerability

Vulnerability refers to a flaw or weakness in a system, network, or application that can be exploited by a threat actor to gain unauthorised access, cause damage, or disrupt operations. Vulnerabilities can arise from various issues such as software bugs, configuration errors, or inadequate security practices. Effective vulnerability management involves identifying, prioritizing, and remediating these weaknesses to reduce the risk of exploitation and protect the organization's assets.


There are several vulnerabilities that affect most devices, but here are some of the most common ones:

  • Injection Flaws: Attackers trick systems into running harmful commands;
  • Weak Authentication: Poor login controls let attackers access accounts;
  • Cross-Site Scripting (XSS): Hackers insert bad code into websites to steal data;
  • Security Misconfiguration: Incorrect security settings make systems vulnerable;
  • Outdated Software: Old software can have flaws that attackers exploit.

 

Join the challenges!

  • Remote working safely: With this challenge, you will understand the necessary security precautions to take while working remotely or while travelling.
  • Safebrowsing: With this challenge, you will learn the requirements for safe browsingin your devices.

 

Information Security Contacts

We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organization.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:

Email: information.security@celfocus.com

No items found.
No items found.

What happened during the global IT outage?

The recent CrowdStrike outage was caused by a faulty software update to their Falcon sensor program. This update, released on Friday, July 19, 2024, contained a coding error that led to a "Blue Screen of Death" on millions of Windows computers worldwide. The issue primarily affected businesses and large organizations, causing significant disruptions in various sectors, including airports, supermarkets, and hospitals.

CrowdStrike quickly identified and fixed the problem, but the recovery process has been complex for many users. Source

At Celfocus, we aim to protect our assets from incidents such as this, by performing several preventative actions:

  • Vendor Assessments: Regularly evaluate vendors for their reliability, security practices, and contingency plans;
  • Preparation: Develop and update an incident response plan that includes steps for dealing with third-party outages;
  • Data Backups: Regularly back up data and ensure redundancy of the backups stored in multiple locations;
  • Simulation Drills: Conduct tabletop simulations to ensure the team is prepared to handle real incidents;


Word of the Edition – Vulnerability

Vulnerability refers to a flaw or weakness in a system, network, or application that can be exploited by a threat actor to gain unauthorised access, cause damage, or disrupt operations. Vulnerabilities can arise from various issues such as software bugs, configuration errors, or inadequate security practices. Effective vulnerability management involves identifying, prioritizing, and remediating these weaknesses to reduce the risk of exploitation and protect the organization's assets.


There are several vulnerabilities that affect most devices, but here are some of the most common ones:

  • Injection Flaws: Attackers trick systems into running harmful commands;
  • Weak Authentication: Poor login controls let attackers access accounts;
  • Cross-Site Scripting (XSS): Hackers insert bad code into websites to steal data;
  • Security Misconfiguration: Incorrect security settings make systems vulnerable;
  • Outdated Software: Old software can have flaws that attackers exploit.

 

Join the challenges!

  • Remote working safely: With this challenge, you will understand the necessary security precautions to take while working remotely or while travelling.
  • Safebrowsing: With this challenge, you will learn the requirements for safe browsingin your devices.

 

Information Security Contacts

We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organization.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:

Email: information.security@celfocus.com

No items found.
No items found.
Go Back
Let Us Know Your Thoughts About Our Newsletter!
Start by
Saying Hi!
© 2024 Celfocus. All rights reserved.
Let Us Know Your Thoughts About Our Newsletter!
Start by
Saying Hi!
© 2024 Celfocus. All rights reserved.
65
100
evolution-through-challenges-and-imagination
96
reshaping-experiences
75
vodafone-tv
70
nice-to-meet-you-57
80
the-role-of-data-academies
65
preventive-actions
64
celfocus-delivery-portfolio
98
call-celfocus-com-articles-its-up-to-us
97
silver-lining
60
konstruktor
85
the-simulation
55
next
50
creativity
45
hard-to-ignore
40
filterworld
35
genetics
30
limitations-vs-creativity
25
future-proof-yourself
20
alternative-sources