#crowdstrike issue solution
Explore tagged Tumblr posts
britishbusinessonline · 11 months ago
Text
CrowdStrike Exposes a FUNDAMENTAL Problem in Software
On Friday, the security update from crowd strike caused the biggest IT disaster ever, there’s fundamental problem that I believe lies at the heart of this and that problem will get a lot worse in the future. crowd strike is a cyber security company that helps protect organizations from cyber threats such as malware and ransomware they have a platform Falcon that uses Ai and machine learning to…
0 notes
privatecloudprovider · 11 months ago
Text
How Concourse Hosting Weathered the CrowdStrike Outage
It's been a tough week for Windows systems and the IT teams managing them. I live in a glass house here, so no stones to throw. However, this situation highlights the value of Concourse’s methodical architectural approach to end-to-end managed private cloud and security services for Windows and SQL applications.
At Concourse Hosting, we leverage CrowdStrike Falcon as part of our robust security architecture. Unlike many, our strategy is to avoid immediately adopting the latest updates. Instead, we wait for the n-1 or second-to-latest updates, ensuring that any potential issues are identified and resolved before they affect our systems. Additionally, we roll out updates in a staggered manner based on time zones, minimizing risk and ensuring continuity.
Why Our Approach Works
Most of our systems were unaffected by the recent CrowdStrike issue because they did not receive the problematic update immediately. For the few that did, enough time had passed for CrowdStrike to release a fix. A simple reboot resolved the issue in most cases. In the rare instances where further action was needed, we booted into safe mode, manually removed the problematic file, and then rebooted.
Tumblr media
The Concourse Advantage
Our high-quality managed detection and alert systems, along with our 24/7/365 technical support, ensured the problem was caught immediately. A real person received the alert about the issue on Friday evening. This experienced engineer quickly checked CrowdStrike's updates on Twitter and used their deep technical skills to follow early guidance and remediate the problem.
My thoughts are with the IT Ops teams dealing with these challenges. It's a tough job, and we all strive to keep our systems running smoothly under such pressures.
Learn More
If you'd like to learn more about how Concourse Hosting can provide stable and secure private cloud solutions for your organization, visit Concourse Hosting | Private Cloud Solutions & Services.  
If you'd like to learn more, Concourse Hosting | Private Cloud Solutions & Services.
2 notes · View notes
govindhtech · 11 months ago
Text
CrowdStrike Outage: Customers Independent Cybersecurity Firm
Tumblr media
Supporting customers during the CrowdStrike outage Independent cybersecurity firm. CrowdStrike launched a software upgrade that started affecting IT systems all across the world. They would like to provide an update on the efforts that were made with CrowdStrike and others to remedy and help consumers, even though this was not a Microsoft issue and it affects the entire ecosystem.
CrowdStrike outage
Everyone have been in constant contact with customers, CrowdStrike outage, and outside developers since the start of this incident in order to gather data and hasten resolutions. It are aware of the impact this issue has brought to many people’s everyday routines as well as companies. The primary objective is to help customers safely restore interrupted systems back online by offering technical advice and support. Among the actions made are:
Using CrowdStrike to automate their solution development process.
In addition to providing a workaround recommendation, CrowdStrike has made a public statement on this vulnerability.
The Windows Message Centre contained instructions on how to fix the issue on Windows endpoints.
Deploying hundreds of engineers and specialists from Microsoft to collaborate directly with clients in order to restore services.
In order to inform ongoing discussions with CrowdStrike and customers, us are working together with other cloud providers and stakeholders, such as Google  Cloud Platform (GCP) and Amazon Web Services (AWS), to share awareness on the state of effect they are each witnessing throughout the sector.
publishing the scripts and documentation for manual cleanup as soon as possible.
Customers will be updated on the incident’s status via the Azure Status Dashboard, available here.
They are constantly updating and supporting customers while working around the clock.
CrowdStrike has also assisted us in creating a scalable solution that would speed up Microsoft’s Azure infrastructure’s correction of CrowdStrike’s flawed update.
They have also collaborated on the most efficient methods with AWS and GCP.
CrowdStrike update
Software changes might occasionally create disruptions, but major events like the CrowdStrike event don’t happen often. As of right now, researchers calculate that 8.5 million Windows devices less than 1% of all Windows computers were impacted by CrowdStrike’s update. Even though the percentage was low, the usage of CrowdStrike by businesses that manage numerous vital services has a significant influence on the economy and society.
This event highlights how intertwined the large ecosystem consisting of consumers, software platforms, security and other software vendors, and worldwide cloud providers is. It serves as a reminder of how critical it is that everyone in the tech ecosystem prioritizes disaster recovery utilising existing channels and safe deployment practices.
As the past two days have demonstrated, cooperation and teamwork are the keys to learning, healing, and forward motion. They value the cooperation and teamwork of everyone in this sector, and will continue to keep you informed about the results and future plans.
Overview
An CrowdStrike outage can be a difficult occurrence for any organisation in the ever-changing field cybersecurity . Their resilience and readiness were put to the test recently when a significant CrowdStrike outage affected customers. This post seeks to give a thorough explanation of how they supported the clients at this crucial time, making sure their cybersecurity requirements were satisfied with the highest effectiveness and consideration.
Comprehending the CrowdStrike Incident
One of the top cybersecurity companies’ services experienced problems due to the unanticipated CrowdStrike outage. Many organizations were affected by the outage, which made them susceptible to possible cyberattacks. The primary objective was to minimize the effects of this outage on customers while maintaining security services for them.
Quick Reaction to the Outage
Upon detecting the outage, the dedicated employees moved quickly to resolve it. They prioritized communicating with clients due to recognized the seriousness of the matter. Below is a thorough explanation of the prompt response:
Notification and Communication: Everyone immediately sent out a notification of the outage by email, phone calls, and through own support portal to all impacted clients. Having open and honest communication was essential to reassuring and informing those who hired us.
Activation of the Incident Response Team: They promptly activated the incident response team, which is made up of support engineers and cybersecurity specialists. To evaluate the effects of the outage and create a tactical reaction strategy, this team worked nonstop.
Providing Differential Approaches to Security
Ensuring customers have strong security was the initial focus during the downtime. To guarantee ongoing protection, having put in place a number of other security measures, including:
Temporary Security Solutions: In order to cover for the CrowdStrike outage, they implemented temporary security solutions. Advanced threat intelligence tools, more intrusion detection systems, and improved firewall setups were some of these answers.
Alerts and Manual Monitoring: They increased the manual monitoring efforts at its Security Operations Centre (SOC). In order to ensure prompt action in the event of an incident, having installed extra alarm mechanisms to identify any unusual activity that would point to possible cyber attacks.
Improving Customer Service
It strengthened the support infrastructure in order to reply to the worries and questions of the clients:
24/7 Support Availability: They have extended support service hours to offer assistance whenever you need it. Clients could get in touch with the support team whenever they needed assistance, so they could get it quickly.
Specialised Support Channels: Everyone set up special support channels for problems relating to outages. This made it possible for us to concentrate on helping the impacted clients and to expedite the support process.
Constant Observation and Updates
They continued to provide updates throughout the interruption due to the were committed to being open and satisfying those who trust us:
Regular Status Updates: Having kept you informed on the status of the issue resolution process on a regular basis. The actions being taken to resume regular services and the anticipated time frames for resolution were noted in these updates.
Integration of Customer comments: In order to better understand the client’s unique wants and concerns, and actively sought out their comments. This input was really helpful to us because it adjusted the way to replied and enhanced the assistance offerings.
Acquiring Knowledge and Developing from Experience
They carried out a comprehensive investigation following the CrowdStrike outage in order to pinpoint problem areas and guarantee enhanced readiness for upcoming incidents:
Root Cause Analysis: To identify the causes of the CrowdStrike outage, their team conducted a thorough root cause analysis. They were able to pinpoint areas that required improvement and weaknesses thanks to their investigation.
Process Improvements: Having carried out a number of process enhancements in light of the new information. These included modernizing the security architecture, strengthening communication tactics, and refining the incident response procedures.
Enhancing Their Collaboration with CrowdStrike
Nous collaborated closely with CrowdStrike outage to quickly resolve the issue due to recognized their crucial position in the cybersecurity ecosystem:
Cooperation and Support: In order to guarantee a prompt resolution, they worked in tandem with CrowdStrike’s engineering and technical support teams. They were able to efficiently utilize CrowdStrike’s resources and experience thanks to working together with them.
Post-Outage Review: To assess the CrowdStrike outage and its effects, they jointly reviewed with CrowdStrike once services had fully recovered. This review was crucial to strengthening cooperation and improving the capacity to respond as a team.
In summary
Although the CrowdStrike outage was a difficult occurrence, all proactive and customer-focused strategy made sure that customers got the assistance and security they required. It lies in the unwavering commitment to enhancing its infrastructure and services to deliver the best possible cybersecurity. The desire to remain a dependable and trustworthy partner for their clients, protecting their digital assets from any danger, has been reinforced by what happened during this CrowdStrike outage
Read more on govindhtech.com
2 notes · View notes
trendingallworldnews · 11 months ago
Text
Microsoft Outage: CrowdStrike and the 'Blue Screen of Death' Affecting Users Worldwide
Tumblr media
photo microsoft
Global Impact
Microsoft Windows users across the globe, including those in India, Australia, Germany, the United States, and the UK, are experiencing a critical issue leading to the infamous 'Blue Screen of Death' (BSOD). This problem causes systems to restart or shut down automatically. Notably, companies like Dell Technologies have attributed this crash to a recent update from CrowdStrike, although Microsoft has yet to confirm this as the root cause of the outage.
Affected Sectors
The outage, which began Thursday evening, primarily impacted Microsoft's Central US region. Essential systems for numerous airlines were crippled, affecting American Airlines, Frontier Airlines, Allegiant, and Sun Country in the US, as well as IndiGo and other airlines in India. Additionally, the disruption extended to banks, supermarkets, media outlets, and other businesses, highlighting the significant reliance on cloud services for critical infrastructure.
CrowdStrike: An Overview
CrowdStrike is a prominent cybersecurity platform that offers security solutions to both users and businesses. It employs a single sensor and a unified threat interface with attack correlation across endpoints, workloads, and identity. One of its key products, Falcon Identity Threat Protection, is designed to prevent identity-driven breaches in real time.
The Issue with CrowdStrike's Update
Reports indicate that a buggy update caused CrowdStrike’s Falcon Sensor to malfunction and conflict with the Windows operating system. This has led to widespread BSOD errors. CrowdStrike has acknowledged the problem, stating, “Our Engineers are actively working to resolve this issue and there is no need to open a support ticket.” The company has promised to update users once the issue is resolved.
Microsoft's Response
Microsoft confirmed that the Azure outage was resolved early Friday. However, this incident serves as a stark reminder of the potential consequences when critical infrastructure heavily relies on cloud services. The outage underscores the need for robust and reliable cybersecurity measures to prevent such widespread disruptions in the future.
Understanding the Blue Screen of Death
The Blue Screen of Death (BSOD) is a critical error screen on Windows operating systems that appears when the system crashes due to a severe issue, preventing it from operating safely. When a BSOD occurs, the computer restarts unexpectedly, often resulting in the loss of unsaved data. The error message typically states, “Your PC ran into a problem and needs to restart. We are just collecting some error info, then we will restart for you.”
This type of error is not exclusive to Windows; similar issues can be seen across Mac and Linux operating systems as well.
While the exact cause of the widespread BSOD errors remains unclear, the incident highlights the interconnectedness and vulnerability of modern digital infrastructure. Both Microsoft and CrowdStrike are working to resolve the issues and restore normalcy to affected users and businesses worldwide.
2 notes · View notes
habergroup · 7 days ago
Text
Unlocking Business Potential: The Power of IT Consulting With Haber Group
In today's rapidly evolving digital landscape, technology is no longer just a support function; it's a strategic imperative. For businesses of all sizes, navigating the complexities of IT infrastructure, cybersecurity threats, and emerging technologies can be a daunting task. This is where the expertise of a seasoned IT consulting firm like Haber Group becomes invaluable, acting as a pivotal partner in optimizing operations, enhancing security, and driving growth.
Haber Group, with over two decades of experience serving businesses in the New York area, understands the unique challenges faced by small and medium-sized enterprises (SMEs). Their core philosophy revolves around providing enterprise-level IT practices and solutions at accessible price points, effectively leveling the playing field for smaller businesses competing in a technology-driven world.
One of the key benefits of engaging with an IT consulting firm is the ability to leverage specialized knowledge without the overhead of maintaining an in-house team of experts. Haber Group offers a comprehensive suite of IT support, including technical helpdesk support, proactive computer maintenance, and, crucially, strategic IT consulting. This holistic approach ensures that businesses not only react to immediate IT issues but also proactively plan for future technological needs and potential risks.
Cybersecurity, in particular, has become a paramount concern. With data breaches and ransomware attacks on the rise, businesses can't afford to be complacent. Haber Group's deep expertise in cybersecurity solutions, often incorporating cutting-edge technologies like Microsoft Azure, Cisco, and CrowdStrike, provides robust protection for sensitive data and critical systems. Clients frequently commend their swift response and resolution times, a testament to their proactive 24/7 system monitoring and dedicated team. This translates into tangible benefits such as improved network stability and significant reductions in downtime, directly impacting a business's productivity and bottom line.
Beyond reactive support and security, IT consulting services from Haber Group empower businesses to embrace modern work environments. Their ability to implement server-less IT solutions and support geographically dispersed teams ensures that clients can operate securely and efficiently from anywhere. This flexibility is crucial in an era where hybrid work models are becoming the norm, offering businesses the agility to adapt to changing circumstances and employee preferences.
The success of an IT consulting engagement hinges on more than just technical prowess; it relies on a true partnership. Haber Group's client testimonials consistently highlight their professionalism, responsiveness, and in-depth knowledge of IT systems. They are lauded for their results-oriented approach, delivering creative solutions that effectively address client needs and drive positive business outcomes. This commitment to client success underscores the true value of IT consulting: it's about translating complex technical challenges into clear, actionable strategies that contribute directly to a company's growth and prosperity.
In essence, for businesses looking to not just survive but thrive in the digital age, IT consulting services from Haber Group offer a strategic advantage. By providing expert guidance, robust solutions, and unwavering support, they empower businesses to harness the full potential of technology, ensuring security, efficiency, and sustained success.
0 notes
sahiloditek · 10 months ago
Text
CrowdStrike Falcon sensor | CrowdStrike
Tumblr media
CrowdStrike is a top cybersecurity organization recognized for its innovative Falcon platform, which offers full threat prevention via cloud-based solutions. However, a recent July 19, 2024, IT outage brought on by an incorrect upgrade to the CrowdStrike Falcon sensor resulted in extensive disruptions affecting a number of industries, including banking, hospitals, and airlines. This event serves as a reminder of the vital role that CrowdStrike's Falcon technology plays in preserving operational security. What Is CrowdStrike? CrowdStrike is a leading American cybersecurity company based in Texas, renowned for its advanced threat intelligence and endpoint protection solutions. Founded in 2011 by George Kurtz, Dmitri Alperovitch, and Gregg Marston, the company specializes in detecting and preventing cyber threats using its cloud-based Falcon platform. This platform offers comprehensive security features, including CrowdStrike data protection, incident response, and antivirus support, primarily catering to businesses and large organizations. Their innovative approach and emphasis on automation have established it as a trusted name in cybersecurity. Its clients span various sectors, including finance, healthcare, and government, all relying on CrowdStrike to safeguard their critical data and systems from sophisticated cyber threats.
What is the CrowdStrike Falcon sensor? CrowdStrike Falcon is a cloud-based cybersecurity platform designed to provide comprehensive protection against cyber threats. It offers next-generation antivirus (NGAV), endpoint detection and response (EDR), and cyber threat intelligence through a single, lightweight CrowdStrike Falcon sensor. It’s also known for its advanced threat detection capabilities, leveraging machine learning and behavioural analytics to identify and mitigate attacks. The platform is fully cloud-managed, allowing seamless scaling across large environments without performance impact. It integrates security and IT functions, aiming to reduce complexity and lower total costs while providing real-time protection against malware, ransomware, and other malicious activities.
What Happened in the IT Outage? On July 19, 2024, CrowdStrike, a prominent enterprise security company, faced a major IT outage caused by a malformed update to their Falcon program. Falcon, a cloud-based Security as a Service (SaaS) platform, provides next-generation antivirus, endpoint detection and response (EDR), and other security features. The update, intended to enhance the program, contained a logic error that caused the CrowdStrike Windows sensor to crash each time it tried to process the update. This malfunction was particularly impactful because Falcon operates as part of the Windows operating system, rather than just running on top of it. As a result, when Falcon crashed, it also led to a crash of the entire Windows OS, causing widespread disruptions.
The incident resulted in a "Blue Screen of Death" for many Windows users and prompted a reboot loop on their devices. The outage affected multiple sectors, including transportation, media, and healthcare. Hospitals and health systems around the world experienced significant issues, with some facilities like Scheper Hospital in the Netherlands closing their emergency departments. The problem was specific to Windows systems, particularly those running version 7.11 or above, while Mac and Linux users were not affected.
Impact of the crash on investors The crash of Google's stock on July 19, 2024, had significant implications for investors. Here are some key impacts:
Immediate Financial Losses The crash led to a sharp decline in Google's stock price, causing substantial immediate losses for investors holding significant positions in Google. The broader market also reacted negatively, with the S&P 500 and NASDAQ experiencing declines due to Google's large influence on these indices.
Market Sentiment and Tech Sector Impact The crash contributed to a broader sell-off in the tech sector, affecting other major tech stocks like Apple, Microsoft, and Nvidia. This sector-wide decline was part of a larger rotation of investments as investors moved from large-cap tech stocks to small-cap stocks in anticipation of potential Federal Reserve rate cuts.
Investor Confidence The crash likely eroded investor confidence, particularly among those heavily invested in tech stocks. This could lead to more conservative investment strategies moving forward as investors seek to mitigate risk.
Broader Economic Concerns The event underscored existing concerns about the overall economic environment, including inflation and Federal Reserve policies. These macroeconomic factors played a role in the market's reaction and were significant in shaping investor behavior during this period.
Top CrowdStrike Alternatives
SentinelOne Singularity SentinelOne Singularity is renowned for its advanced threat detection and response capabilities, powered by cutting-edge AI and automation. The platform excels in identifying and neutralizing sophisticated cyber threats in real-time, providing comprehensive protection for endpoints. Its standout features include:
Behavioral AI: Uses behavioral AI to detect and respond to threats without relying on signatures.
Automated Response: Capabilities for automated threat mitigation and remediation reduce the need for manual intervention.
Integration and Scalability: Integrates well with existing IT infrastructure and scales effectively to meet the needs of organizations of all sizes.
SentinelOne is particularly praised for its strong overall performance in various independent tests and real-world scenarios.
Microsoft Defender for Endpoint Microsoft Defender for Endpoint is a robust option for organizations already invested in the Microsoft ecosystem. It offers seamless integration with other Microsoft products and services, ensuring a unified approach to cybersecurity. Key benefits include:
Deep Integration: Integrates deeply with Windows, Microsoft Azure, and Office 365, providing enhanced protection and streamlined management.
Advanced Threat Analytics: Utilizes advanced analytics and threat intelligence to identify and mitigate security threats.
User-Friendly Management: Provides a user-friendly interface for managing security across an organization’s endpoints.
Its ability to integrate with Microsoft services ensures efficient management and robust data protection, making it a natural fit for Microsoft-centric environments.
Palo Alto Networks Cortex XDR Cortex XDR by Palo Alto Networks is designed for organizations looking to adopt an extended detection and response (XDR) approach. It aggregates data from multiple sources to provide a comprehensive view of security threats. Features include:
Holistic Threat Detection: Combines data from endpoints, network, and cloud to detect and respond to threats more effectively.
Advanced Analytics: Uses machine learning and advanced analytics to identify complex threats.
Integration Capabilities: Seamlessly integrates with other Palo Alto Networks products and third-party tools for enhanced security management.
Cortex XDR's sophisticated capabilities make it an excellent choice for organizations seeking an in-depth and integrated security solution.
Bitdefender GravityZone Bitdefender GravityZone is known for its proactive endpoint protection and robust security features. It offers advanced threat prevention and responsive support, making it a reliable alternative for organizations seeking strong data protection. Key features include:
Advanced Threat Prevention: Utilizes machine learning, behavioral analysis, and heuristic methods to prevent advanced threats.
Centralized Management: Provides a centralized console for managing security across all endpoints.
Responsive Support: Known for its responsive customer support and comprehensive security coverage.
Bitdefender GravityZone’s focus on advanced threat prevention and responsive support makes it a dependable choice for maintaining high levels of security.
Conclusion the CrowdStrike Falcon sensor, while designed to offer advanced endpoint protection and threat detection, encountered significant issues during the IT outage on July 19, 2024. The malformed update led to widespread disruptions, causing crashes across Windows systems and affecting various sectors globally. This incident underscores the critical need for robust testing and validation in cybersecurity updates to prevent extensive operational impacts.
Contact Blue Summit for solutions regarding your business. Blue Summit has collaborated with OdiTek Solutions, a frontline custom software development company. It is trusted for its high service quality and delivery consistency. Visit our partner's page today and get your business streamlined. If you want know more about crowd strike outage feel free to visit our website Blue summit Check our other services at Blue summit
0 notes
saan1984 · 10 months ago
Text
AI in networking permits adaptive configurations that cater to individual user necessities. Whether it’s prioritizing specific forms of site visitors or customizing bandwidth allocation, these systems ensure a customized and environment friendly person expertise. Traditionally, networking concerned https://www.globalcloudteam.com/ human intervention to manage configurations, troubleshoot issues, and adapt to altering calls for. With AI, networking becomes an clever entity able to studying, adapting, and optimizing itself without constant human oversight. Machine Studying For Policy Automation You only need to take a quick look on the artificial intelligence in networking cost estimates for CrowdStrike’s outage earlier this year to grasp the extent of potential losses. The rival cybersecurity supplier’s system failures are anticipated to cost its customers a staggering $5.4 billion. While the technological and regulatory solutions implemented by the networks and governments are important, I suppose it’s unlikely that they alone will solve the issue. What’s Driving The Adoption Of Juniper’s Ai-native Networking Platform? Chatbots use pure language processing to know clients and allow them to ask questions and get data. These chatbots learn over time so they can add greater value to customer interactions. For example, a machine learning engineer might experiment with completely different candidate fashions for a computer imaginative and prescient downside, similar to detecting bone fractures on X-ray photographs. “So, the overwhelming majority of data centers really need environment friendly solutions that match into their present air-cooled environments. Arista Networks: Pioneering Ai In Cloud Networking Networking has come a great distance, accelerating pervasive compute, storage, and AI workloads for the subsequent era of AI. Infrastructure technologies key to AI training at scale include cluster networking, similar to RDMA and InfiniBand, bare steel GPU compute, and excessive performance storage. AI networking monitoring techniques are essential for continuous community health evaluation. Instead of just reporting network slowdowns, AI can spotlight the precise swap and the nature of its downside, whether or not it’s a hardware fault or configuration error. Learning by doing is an effective way to level-up any talent, and artificial intelligence isn’t any completely different. For instance, think about all the units linked to a company network. You get an immediate alert, allowing you to research and act before any severe issues arise. AI can use its acquired data to determine that a particular sort of assault tends to spike throughout sure times of the 12 months. With this foresight, you can bolster your defenses and keep ahead of attackers. AI can acknowledge the rapid succession of failed login makes an attempt and automatically lock the focused accounts or IP addresses. This instant response buys you time to further examine and remediate the risk with out inflicting widespread harm. Accelerate Your Path To An Ai-native Future, At Present Every community is exclusive, but AI strategies let us discover the place there are similar points and occasions and information remediation. In some circumstances, machine learning algorithms could strictly focus on a given community. In other use circumstances, the algorithm may be trained across a broad set of anonymous datasets, leveraging much more information. For instance, if they don’t use cloud computing, machine learning tasks are sometimes computationally costly. Battling Ai Fakes: Are Social Platforms Doing Enough? AI improvement is a complex journey, often hindered by the problem of connecting the dots between mannequin coaching, native improvement, and deployment. Developers regularly encounter a fragmented and inconsistent growth surroundings and toolchain, making it tough to maneuver seamlessly from coaching fashions within the cloud to operating them locally. This fragmentation slows down innovation, introduces errors, and complicate...
0 notes
feedyourmind1031 · 11 months ago
Text
Impact of the Global Tech Outage on the Financial Markets
Tumblr media
Last week's global tech outage had a profound impact on businesses and financial markets, highlighting the vulnerabilities and interconnectedness of our digital world. This incident, caused by a security update from Crowdstrike, led to widespread system crashes and significant disruptions across various sectors.
The Incident
The tech outage was triggered by a security update from Crowdstrike, which caused Windows systems to crash and resulted in the infamous blue screen of death. This incident had far-reaching effects, including:
Airlines: Over a thousand flight cancellations in the U.S. as airline systems went offline.
Supermarkets: Checkout systems failed in Australian supermarkets, forcing closures.
Security Checks: Manual operations for security checks at the Paris Olympics, causing significant delays and disruptions.
Crowdstrike assured that this was not a cyberattack but rather a bug that affected only Windows systems. Their other clients using Linux and Mac systems did not experience any issues. However, the incident underscored the fragility of relying heavily on a single operating system for critical operations.
Market Impact
The outage had a negative influence on the stock market, with significant declines in major indices:
DOW: The Dow Jones Industrial Average dropped by -0.93%.
S&P 500: The S&P 500 fell by -0.71%.
NASDAQ: The NASDAQ Composite declined by -0.81%.
These declines reflect the market's reaction to the widespread disruptions caused by the outage. Investors were concerned about the potential long-term impacts on affected companies and the broader economy.
Lessons Learned
This incident serves as a stark reminder of the vulnerability of our interconnected systems. Businesses realized the importance of having robust backup systems and alternative solutions to prevent a complete halt in operations during such outages. The key lessons from this incident include:
1. Diversification of Systems: Relying on a single operating system for critical operations can be risky. Businesses should consider diversifying their systems by incorporating multiple operating systems to avoid a single point of failure. This approach can enhance resilience and ensure continuity during disruptions.
2. Backup Solutions: Having robust backup solutions in place is crucial. Businesses should invest in redundant systems that can take over operations seamlessly in the event of a failure. This includes cloud-based solutions, secondary servers, and backup power supplies.
3. Incident Response Plans: Effective incident response plans are essential for minimizing the impact of outages. Businesses should regularly test and update their response plans to ensure they are prepared to handle unexpected disruptions. This includes training employees on how to respond and communicating effectively with stakeholders during an incident.
Future Implications
The global tech outage may lead to several significant changes in how businesses approach their IT infrastructure and operations. We may see a shift towards adopting alternative operating systems and creating more robust backup solutions to ensure continuity. Potential future developments include:
1. Adoption of Alternative Operating Systems: Businesses may start adopting alternative operating systems, such as Linux and Mac, for critical operations. This diversification can reduce the risk of a single point of failure and enhance overall system resilience.
2. Investment in Redundant Systems: Companies may invest more in redundant systems to ensure that a failure in one system does not lead to a complete halt in operations. This could include setting up secondary servers, using cloud-based solutions, and implementing backup power supplies.
3. Enhanced Cybersecurity Measures: While the Crowdstrike incident was not a cyberattack, it highlighted the importance of robust cybersecurity measures. Businesses may increase their investment in cybersecurity to protect against potential vulnerabilities and ensure the integrity of their systems.
4. Regulatory Changes: Regulatory bodies may introduce new guidelines and requirements for businesses to enhance their IT resilience. This could include mandatory incident response plans, regular testing of backup systems, and reporting requirements for significant outages.
In conclusion, the global tech outage served as a wake-up call for businesses to enhance their resilience and preparedness for future disruptions. By diversifying their systems, investing in robust backup solutions, and implementing effective incident response plans, companies can mitigate the impact of similar incidents in the future. As our reliance on digital systems continues to grow, ensuring their resilience and security becomes increasingly important.
0 notes
uvation · 11 months ago
Text
Tumblr media
Navigating Cloud Outages: A Timeline from Chaos to Control
The cloud, once a nascent technology, has become the backbone of modern business. Its promise of scalability, flexibility, and cost-efficiency has led to unprecedented reliance. However, the journey from early, unreliable cloud services to today's robust infrastructure has been marked by significant challenges, particularly cloud outages.
A cloud outage occurs when cloud-based services experience disruptions, impacting businesses and individuals alike. From email and file storage to critical applications, dependencies on cloud infrastructure have magnified the consequences of these disruptions. This article delves into the evolution of cloud reliability, comparing the frequent outages of the past to the improved performance of today's cloud services. By examining historical trends, analyzing case studies, and exploring emerging technologies, we aim to understand how the industry has addressed this critical challenge.
The Early Days of Cloud Computing: A Tale of Troubles
The early days of cloud computing were fraught with instability. Hardware failures, software bugs, and network congestion were common culprits behind frequent outages. Major providers experienced multiple disruptions, impacting a wide range of services and undermining trust in the cloud.
The Evolution of Cloud Reliability
The cloud industry has undergone a transformative journey in response to these challenges. Investments in redundant infrastructure, advanced monitoring tools, and robust disaster recovery plans have significantly enhanced cloud reliability.
Virtualization and containerization technologies have played a pivotal role in improving resilience. By isolating applications and data, these technologies reduce the impact of failures and facilitate rapid recovery. Additionally, the adoption of DevOps practices and automation has streamlined operations and reduced human error.
A Timeline of Cloud and Data Center Outages
Early Cloud Years (2000s)
2009: Multiple AWS outages caused by lightning strikes, power failures, and hardware issues. These early incidents emphasized the need for robust cloud infrastructure and disaster recovery plans.
The Rise of Cloud Computing (2010s)
2011: Amazon EBS outage impacting numerous services reliant on the storage platform. This event highlighted the interconnectedness of cloud services.
2012: A series of outages affecting various cloud providers, emphasizing the need for redundancy and disaster recovery.
2014: While outages continued to occur, their frequency and impact began to decrease due to industry advancements.
The Era of Digital Transformation (2020s)
2020: The COVID-19 pandemic increased reliance on cloud services, leading to unprecedented strain on cloud infrastructure. Some providers experienced service disruptions due to increased load.
Recent High-Profile Cloud Outages
2021: AWS experienced a significant outage affecting services like Disney+, Netflix, and Slack. The disruption lasted several hours, causing widespread inconvenience and financial loss.
2022: Several high-profile outages affected major cloud providers, Microsoft Azure faced a substantial outage that impacted services globally, affecting businesses reliant on Microsoft's cloud infrastructure.
2023:The latest major outage, in early 2023, involved Microsoft Azure again, where a critical service disruption affected numerous enterprises. During this period, CrowdStrike's endpoint security solutions played a crucial role in maintaining the security and integrity of end-user devices, such as desktops, laptops, and mobile devices. As leaders in the endpoint security market, both Microsoft and CrowdStrike showcased their capabilities in ensuring robust cybersecurity measures during the outage.
A Comparative Analysis: Then and Now
While cloud outages still occur, their frequency and severity have decreased dramatically. Modern cloud infrastructure is designed with redundancy and fault tolerance in mind, making it more resilient to disruptions. However, the complexity of cloud environments also introduces new challenges.
Causes, Impacts, and Recovery
Causes: The causes of these outages varied from software bugs and network configuration issues to hardware failures and third-party service disruptions.
Impacts: The impacts were widespread, affecting user access, business operations, and revenue. Companies reliant on these cloud services experienced significant downtime, leading to customer dissatisfaction and potential loss of business.
Recovery: Recovery efforts involved rapid identification of the issue, deployment of fixes, and communication with affected customers. Lessons learned from these incidents often lead to improvements in cloud infrastructure and processes.
Mitigating the Impact
To minimize the impact of cloud outages, businesses should implement robust disaster recovery plans, diversify cloud providers, and invest in business continuity strategies. Additionally, close monitoring of cloud service performance and regular testing of backup systems are essential. By understanding the potential consequences of cloud outages and taking proactive steps to mitigate risks, businesses can build resilience and protect their bottom line.
Future Trends in Cloud Outage Prevention and Management
The future of cloud outage prevention and management looks promising, with several trends emerging:
AI and Machine Learning: AI and machine learning can predict potential failures and automate recovery processes, reducing the impact of outages.
Edge Computing: Distributing data and applications closer to end-users can enhance performance and resilience.
Multi-Cloud Strategies: Using multiple cloud providers can mitigate risks and improve redundancy.
Blockchain Technology: Leveraging blockchain for secure and decentralized cloud infrastructure could offer new ways to enhance cloud resilience.
Cloud outages are inevitable, but their impact can be mitigated with the right strategies. Implementing redundancy, enhancing cloud security, and developing comprehensive disaster recovery plans are critical steps towards resilience. The future of cloud resilience lies in continuous improvement and the adoption of advanced technologies. As AI, machine learning, and edge computing evolve, they will play a crucial role in preventing and managing cloud outages.
0 notes
hustle-gram · 11 months ago
Text
Tumblr media
"CrowdStrike Bug Crashes 8.5 Million Windows Devices, Causing Global Disruptions"
However, that 1% translates to about 8.5 million devices, causing global problems. Microsoft said it sent hundreds of engineers and experts to help customers fix their affected services. They also worked directly with CrowdStrike to find a solution, and CrowdStrike released a statement explaining the technical issues.
Full details in bio
0 notes
govindhtech · 2 months ago
Text
DTD App: Dell PC Telemetry Secures BIOS Integrity Monitoring
Tumblr media
Discover how Dell's DTD App protects BIOS with enhanced telemetry and tamper detection.
Never before has corporate security been more important. Due to the exponential growth of cyber threats, IT decision-makers must safeguard their PC fleets while retaining operational efficiency. Research indicating that 69% of organisations suffered a BIOS- or device-level assault shows that endpoint security goes beyond software measures. Dell corporate AI PCs reinvent device security and management.
Dell Trusted Workspace, Dell's endpoint security suite, provides IT administrators with BIOS-level intelligence and novel telemetry to forecast, recognise, and respond to attacks at the device level. Dell solutions can increase fleet security and save time and effort through automation. Check out why Dell leads the safest business AI PC market.
Complexity of Enterprise Security
IT administrators face an increasingly complex environment. Given the variety of security and device management capabilities, IT and security teams may meet fragmented solutions that lack compatibility, delay coordinated action, and need human coordination to communicate. Their IT environments may grow more insecure, placing their organisations at risk of security breaches. Since attackers are now targeting regions below the operating system (OS) layer, where endpoint detection technologies often fail to provide visibility into BIOS and firmware-level activities, the dangers have increased.
Dell Trusted Device (DTD) software and PC telemetry help here. These technologies may assist organisations improve IT security.
How Dell PC Telemetry Works?
Dell's below-the-OS security relies on telemetry. Adding BIOS capabilities to a secure, centralised monitoring ecosystem increases security and management. Importantly, Dell PC telemetry and the DTD app compare BIOS and firmware to the known good using a variety of tamper detections to verify system integrity:
Real-time tamper detection: Use Indicators of Attack (IoA), a tool that lets managers review events that may indicate hostile actors assaulting corporate endpoint BIOS, to detect BIOS alterations and strange behaviour early.
Use CVE Detection, CVE Remediation, and off-host BIOS Verification to accurately patch vulnerabilities and recover from attacks.
Avoidance: Image Capture helps SOCs understand assaults and identify holes to strengthen defences.
Connect to current tools: Integrate Dell's integrated telemetry into Splunk, Microsoft Intune, CrowdStrike, and Absolute for fleet-wide information.
Hardware-software collaboration makes your fleet smarter, faster, and more efficient.
Enhance processes with below-the-OS telemetry now
Tracking a fleet of devices should be easy. It aims to solve Dell customers' IT and security issues! New methods to fulfil that pledge today:
AMD and Intel-powered commercial systems may now employ Dell's increased security and telemetry. More insight into your diverse fleet and assurance that you're using the safest commercial AI PCs will result from this capability.
Dell Client Device Manager (DCDM) integrates controlled environment monitoring: Managed workplaces will benefit from DTD app's simplified PC security. To Dell's DCDM launch. ITDMs may use the DCDM Security Module to get all of DTD's benefits and the latest features. The latest Dell telemetry features allow Microsoft Intune administrators to create and deploy fleet-wide security rules for seamless, end-to-end coverage without leaving Intune.
DCDM's Security Module now automates firmware-level and BIOS CVE remediation for fast upgrades. DCDM Security is the only module with this innovative, industry-leading capabilities. Dell Command | Update gives unmanaged environments using the DTD app access to all current features, including CVE D CVE Detection for Firmware.
Increase the value of your tech investments
Hackers can enter your fleet using any device. Dell's BIOS-level insight and PC telemetry simplify fleet management and help your firm discover, mitigate, and avoid cyber threats.
Do something proactive today:
Learn More: Download the infographic on Dell PC telemetry and integrated security.
Talk to Us: Email us to organise a meeting with a Dell specialist to discuss how these features can suit your company needs.
Use Dell, the world's most secure business AI PCs, when upgrading your commercial PC fleet to boost cyber resistance.
Update Dell fleet management safely while maintaining device confidence. Because in today's quickly shifting threat world, less is not acceptable.
0 notes
biz-news-local · 11 months ago
Text
CrowdStrike Update Causes Global IT System Disruption
In a surprising turn of events, a seemingly routine software update from cybersecurity firm CrowdStrike led to one of the largest IT blackouts the world has ever seen. This unexpected disruption has left businesses and individuals grappling with widespread outages and issues across various industries. The repercussions of this IT blackout have been felt far and wide, affecting businesses of all sizes and industries. From delayed transactions and communication breakdowns to operational standstills, the chaos caused by this software update has highlighted the critical importance of robust IT infrastructure and contingency plans in today's digital age. CrowdStrike, known for its cutting-edge cybersecurity solutions, is working diligently to rectify the situation and restore normalcy to the impacted IT systems. The company's response efforts, coupled with industry collaborations and swift action plans, aim to minimize the disruption, rebuild trust with customers, and prevent similar incidents in the future. In times of crisis, it's crucial for businesses to stay agile, proactive, and transparent. While unforeseen challenges like the CrowdStrike IT blackout can wreak havoc, they also present opportunities for learning, innovation, and resilience building. Ultimately, how companies navigate such disruptions defines their ability to adapt and thrive in an ever-evolving technological landscape. Read more here: https://biznewslocal.com/crowdstrike-update-global-disruption/
0 notes
fahrni · 11 months ago
Text
Saturday Morning Coffee
Good morning from Charlottesville, Virginia! ☕️
Tumblr media
Another very quiet week at home and work.
I hope you enjoy the links.
Dan Heching and Zoe Sottile • CNN
Estey said Simmons died early on Saturday morning. He had celebrated his 76th birthday the day before. “We lost an Angel today - a true Angel,” Estey added.
I remember Richard Simmons from the 80’s. Always the showman, always enthusiastic, always fighting to teach folks how to lose weight and talking about his own struggles.
R.I.P.
Carmel Dagan • Variety
Bob Newhart, the genteel but sharply satirical comic whose TV series “The Bob Newhart Show” and “Newhart” were huge hits throughout the 1970s and ’80s, died Thursday in Los Angeles. He was 94.
I know he’s well know for his television series but I really liked him as Papa Elf in the movie Elf.
R.I.P.
David Nield • ScienceAlert
The probe was recorded traveling at 635,266 kilometers (394,736 miles) per hour on June 29, the second time it’s reached that speed since it launched in 2018. We’re talking around 500 times faster than the speed of sound here.
It’s impossible for me to wrap my brain around the idea of going 394,736 miles per hour. 😳
But, it’s pretty cool!
Lily Hay Newman, Matt Burgess, and Andy Greenberg • WIRED
Only a handful of times in history has a single piece of code managed to instantly wreck computer systems worldwide. The Slammer worm of 2003. Russia’s Ukraine-targeted NotPetya cyberattack. North Korea’s self-spreading ransomware WannaCry. But the ongoing digital catastrophe that rocked the internet and IT infrastructure around the globe over the past 12 hours appears to have been triggered not by malicious code released by hackers, but by the software designed to stop them.
What a day for our global network, Microsoft, and CrowdStrike.
I feel terrible for any shop using CrowdStrike and their DevOps or IT Administrators and Technicians. The only way to fix this issue is to be in the room, in front of the computer.
I once worked at a pistachio and almond processing plant that ran on Windows PC’s. At times I needed access to certain computers and had to get someone to unlock a door for me. Can you imagine having to fix thousands of computers with this issue? Sure, developers and the techies in the organization can fix it on their own and help others, but what a pain in the butt. ❤️
Hafiz Rashid • The New Republic
“I have stood up in rooms with all of these people and I have said, ‘Game out your actual plan for me.’ What are the risks of this going to the Supreme Court? And no one had an answer for me.… I’m talking about the lawyers. I’m talking about the legislators,” Ocasio-Cortez said.
Tumblr media
What’s the plan? Seems Democrats don’t have one.
This entire kerfuffle couldn’t have come at a worse time. More than ever we need to be united to stop the GOP in their tracks. They are the political enemy and you defeat a political enemy by beating them at the polls.
Turn out, vote for the Democrat, save democracy.
It really is that simple.
Maya Posch • Hackaday
With performance optimizations seemingly having lost their relevance in an era of ever-increasing hardware performance, there are still many good reasons to spend some time optimizing code. In a recent preprint article by [Paul Bilokon] and [Burak Gunduz] of the Imperial College London the focus is specifically on low-latency patterns that are relevant for applications such as high-frequency trading (HFT). In HFT the small margins are compensated for by churning through absolutely massive volumes of trades, all of which relies on extremely low latency to gain every advantage. Although FPGA-based solutions are very common in HFT due their low-latency, high-parallelism, C++ is the main language being used beyond FPGAs.
A friend worked on one of these high speed trading systems. The pressure on him to write bug free, highly performant C++ code was immense. These trading folks are crazy serious about making money and these systems need to be super solid. Their drive to be filthy rich depends on it.
He didn’t stay for long. The stress wasn’t worth it.
Heather Cox Richardson • Letters from an American
This morning, after a day of Republicans insisting that it is political polarization to suggest that Trump is a danger to our democracy, U.S. District Judge Aileen Cannon, who was appointed by Trump in the last days of his presidency, dismissed the classified documents case against the former president. She wrote that “Special Counsel Smith’s appointment violates the Appointments Clause of the United States Constitution.”
It seems Judge Aileen Cannon is in the bag for Trump. She’s been delaying and dragging her feet for months on this matter. Either she’s incompetent or corrupt or maybe a little of both?
Regardless, we can also thank corrupt Supreme Court Justice Clarence Thomas for planting the seed of this plan to dismiss the case. In the Trump Immunity decision he noted Jack Smith’s appointment may be unconstitutional. Of course the documents case has nothing to do with the immunity case. He just slipped it in there to sow doubt. It worked.
There is still a path to prosecution but it won’t happen before the election. If the Orange Clown wins it’ll never happen.
Dan Moren • Six Colors
Ultimately the reaction to 18’s initial public beta may be more about what’s not there than what is. When Apple first announced its latest annual update to the mobile software platform back in June, most of the attention went to a suite of features—the top-billed ones if you look at the company’s iOS 18 Preview Page—collected under the aegis of Apple Intelligence. These marked the company’s much anticipated foray into artificial intelligence and promise everything from image generation to a reinvigorated Siri.
TL;DR - if you’re expecting to see Apple Intelligence as part of the betas, don’t hold your breath. Those features will roll out over the next year and into the future.
Outside of the excitement surrounding Apple Intelligence there are plenty of nice features to explore and enjoy.
Nick Schager • The Daily Beast
Longlegs is the horror event of the summer—a serial killer thriller that plays like a nightmarish swirl of The Silence of the Lambs, Seven, Psycho and Zodiac, albeit with far less rationality and considerably more demonic derangement.
I’m excited to see this! I’d imagine this is one film I’ll be able to get Kim to see in theaters. 😃
Ploum
TL;DR: put your open source code under the AGPL license.
While I don’t agree with a lot of what’s said in this piece, it is worth a read to gain a different perspective on Open Source and the problems around maintaining it.
Jake Edge • lwn.net
At the 2024 Linux Storage, Filesystem, Memory Management, and BPF Summit, Wedson Almeida Filho and Kent Overstreet led a combined storage and filesystem session on using Rust for Linux filesystems.
I like how this was written. It’s basically meeting notes from the session.
The Rust developers will have to be the ones to absorb the pain of keeping up with changes to the filesystem. As a developer using a newer technology I wouldn’t expect anything less.
I’m looking forward to the day we see Swift showing up in filesystem components on the Mac. There is an effort underway to rewrite Foundation in Swift. That’s a great start.
Wes Davis • The Verge
Apple has approved UTM SE, an app for emulating a computer to run classic software and games, weeks after the company rejected it and barred it from being notarized for third-party app stores in the European Union. The app is now available for free for iOS, iPadOS, and visionOS.
I’d imagine European Regulators made this happen. Apple doesn’t need them crawling any further up their butts. They’re already in enough trouble.
Brett Berk • The Drive
This is the golden age of full-size pickup trucks. Because the market demands it, and because the market is enormous and extremely profitable, the latest breed of pickup trucks is comfortable, commodious, potent, and dare I say luxurious. The Ford F-150, Chevrolet Silverado, and Ram 1500 are, respectively, the top-selling vehicles in America. And with their Brobdingnagian scale, appliqué steer horns, remotely erecting towing hitches, and power-opening tailgates that drop like the rear flap on a cowpoke’s union suit, pickup trucks may be the greatest examples of overcompensation ever invented.
This is a piece from 2019 but it still holds up today. Trucks are definitely no longer the multipurpose towing and hauling vehicles they used to be. When I got one with power windows and AC I thought it was pretty luxurious, but modern pickups are like luxury automobiles.
I’d bet real farmers and workmen using trucks as trucks don’t buy the luxury models. 😁 I’ve seen the inside of real work trucks. They smell of dirt and oil and usually have mud all over the floorboards. Not to mention barebones interiors.
My grandfather was a mobile mechanic for his entire life. His trucks had flat beds with large generators, a boom, and tool chests and various tool compartments. When his motor or transmission wore out, no problem, he pulled them and replaced them, himself.
I’m sure those folks still exist today but luxury trucks weren’t made for them. 😃
Tumblr media
0 notes
dailystraitsdotcom · 11 months ago
Text
Latest: Microsoft/CrowdStrike Scams
National Anti-Scam Centre Issues Warning Amid CrowdStrike/Microsoft Outage.
Sydney, July 20: The National Anti-Scam Centre has issued a stern warning to consumers and small businesses regarding unsolicited calls, emails, or messages claiming to offer solutions related to the recent CrowdStrike/Microsoft outage. Scammers are exploiting this incident, urging individuals to download software patches or provide remote access under the guise of protecting their computers.…
0 notes
elisetherogue · 11 months ago
Text
Really funny how the solution to the crowdstrike issue is danger close to deleting system 32.
0 notes
warningsine · 11 months ago
Text
NEW YORK (AP) — A global technology outage caused by a faulty software update grounded flights, knocked media outlets offline, and disrupted hospitals, small businesses and government offices on Friday, highlighting the fragility of a digitized world dependent on just a handful of providers.
The trouble with the update issued by cybersecurity firm CrowdStrike affected customers running Microsoft Windows. It was not the result of hacking or a cyberattack, according to CrowdStrike, which apologized and said a fix was on the way.
Businesses and governments experienced hours-long disruptions and scrambled to deal with the fallout.
Thousands of flights were canceled and tens of thousands were delayed around the world, leading to long lines at airports in the U.S., Europe and Asia. Airlines lost access to check-in and booking services in the heart of the summer travel season.
Several local TV stations in the U.S. were prevented from airing the news early Friday, and some state and local governments reported problems at courts, motor vehicles departments, unemployment agencies and other offices.
Affected hospitals had problems with appointment systems, forcing them to suspend patient visits and cancel some surgeries.
Alison Baulos said her 73-year-old father’s emergency heart surgery in Paducah, Kentucky was canceled Friday morning because of the tech outage, leaving her family scared and worried.
“So if anything happens, it would be as a result of not having the surgery this morning,” Baulos said in an interview. She said her father was waiting at Baptist Hospital to find out what will happen next. A phone message left with the hospital was not immediately returned.
Elsewhere, people experienced minor inconveniences, including trouble ordering ahead at Starbucks, causing long lines to form at some of the coffee chain’s stores.
A disturbing reminder of vulnerability
Cyber expert James Bore said real harm would be caused. “All of these systems are running the same software,” Bore said. “We’ve made all of these tools so widespread that when things inevitably go wrong — and they will, as we’ve seen — they go wrong at a huge scale.”
The head of Germany’s IT security agency, Claudia Plattner, said “we can’t expect a very quick solution.” A forecast for when exactly all systems will be up and running is difficult, but “it won’t be hours,” she added.
CrowdStrike said in a recording on its customer service line that the problem was related to “the Falcon sensor,” referring to one of its products used to block online attacks. The company says it has 29,000 customers.
In an interview on NBC’s “Today Show,” CrowdStrike CEO George Kurtz apologized, saying the company was “deeply sorry for the impact that we’ve caused to customers, to travelers, to anyone affected by this, including our companies.”
“We know what the issue is” and are working to remediate it, Kurtz said.
Shares of the company, which is based in Austin, Texas, fell nearly 10% on Friday. Microsoft’s stock price fell more than 3%.
Though the outage’s impact could be felt far and wide, the forecasting firm Capital Economics said it was likely to have little impact on the world economy.
Cybersecurity experts said those affected by the outage also needed to be wary of bad actors reaching out claiming they can help. “Attackers will definitely prey on organizations as a result of this,” said Gartner analyst Eric Grenier.
Air travel delayed everywhere
Most airlines attributed the problems to their booking systems. Thousands of flights were affected in the U.S. alone, though by late morning on the East Coast airlines said they were beginning to mitigate problems and resume some service.
Airlines and railways in the U.K. experienced long wait times. And airports across Europe suspended landings or halted takeoffs for several hours due to difficulties in checking in passengers.
Saskia Oettinghaus, a member of the German Olympic diving team, was among those stuck at the Berlin Airport.
“We are on our way to Paris for the Olympic Games and now we are at a standstill here for the time being,” Oettinghaus said.
Other athletes and spectators traveling to Paris were delayed, as were their uniforms and accreditations, but Games organizers said disruptions were limited and didn’t affect ticketing or the torch relay.
Broadcasters go dark, surgeries delayed, ‘blue screens of death’
In Australia, national news outlets — including public broadcaster ABC and Sky News Australia — were unable to broadcast on their TV and radio channels for hours. Some news anchors went on air online from dark offices, in front of computers showing blue error screens. Internet and phone providers were also affected.
In the U.S., KSHB-TV in Kansas City, Missouri, aired Scripps News instead of local news until about 5:35 a.m., the stations said on its website. IT teams and engineers worked through the night to resolve the glitch, the station said. Other local stations owned by Scripps reported similar problems, though Scripps spokesman Michael Perry said in an email early Friday that 90% of stations were able to air local news.
Hospitals in different countries also reported problems.
Britain’s National Health Service said the outage caused problems at most doctors’ offices across England. NHS England said in a statement said the glitch was affecting the appointment and patient record system used across the public health system.
At Mass General Brigham, the largest health care system in Massachusetts, all scheduled non-urgent surgeries, procedures, and medical visits were canceled Friday because of the outage, according to a spokesperson. Emergency departments remained open.
Shipping was disrupted too.
A major container hub in the Baltic port of Gdansk, Poland said it was battling problems. And at the twin ports of Los Angeles and Long Beach, marine terminals were affected, although the outage didn’t cause significant disruptions.
“Basically, it’s been minimal impact overnight and we’re going to have to wait and see how these terminals come up over the next several hours,” said Phillip Sanfield, a spokesperson for the Port of Los Angeles.
In Manhattan, a criminal court proceeding for Harvey Weinstein, who is charged with rape, started 90 minutes late because of disruptions to computer systems.
1 note · View note