All You Need to Know About the CrowdStrike Incident (Tips to Recover Fast If You’re Affected)

 

As you may have heard, on July 19, 2024, an update in the popular cybersecurity software CrowdStrike caused a critical error on Microsoft machines. Although this was not a security breach and not Microsoft’s fault, many Microsoft users were affected.

CrowdStrike released a recovery process note within hours, and many machines were quickly restored. However, due to complications with encryption and access controls, some users are still struggling with recovery, with some services expected to be down for weeks.

Seeing an opportunity to capitalize on the confusion, numerous phishing and other scams have begun circulating. Only seek assistance from official sources such as CrowdStrike’s official support forum, a Microsoft representative, or a certified Microsoft Partner. 

The most important message to communicate to your staff is to avoid clicking on unsolicited emails claiming to be from CrowdStrike representatives.

For the official recovery method, visit the CrowdStrike site directly and start a conversation there.

This incident is a reminder of the need for an advanced cybersecurity framework. We advise organizations to consider upgrading to Microsoft Defender XDR for its superior threat protection and rapid incident response capabilities.

At GCS, we’ve been actively involved in helping our clients navigate the fallout from this incident. As a top Microsoft-certified partner, we’re equipped to help you transition to Microsoft Defender XDR.

If you’re not a GCS client but want to strengthen your security posture, especially in light of this event, we’re here to provide the guidance and support you need – book a consultation today.

Pin It on Pinterest