On Monday, global technology advisory firm Gartner released a research note outlining essential recovery measures that CrowdStrike users can implement to mitigate the impact of this crisis. In this comprehensive guide, we'll explore the steps recommended by Gartner, share insights from industry experts, and provide actionable strategies to help your organization recover and build resilience against future incidents.
Understanding the CrowdStrike Outage
Since Friday, organizations have been battling the fallout from CrowdStrike's software update that triggered a global wave of blue screens of death. This issue has significantly impacted business continuity, with many companies scrambling to restore their systems and mitigate security risks.
The Scope of the Impact
The CrowdStrike outage has affected organizations across various sectors, leading to significant downtime and operational disruptions. From financial institutions to healthcare providers, no industry has been spared from the chaos. Understanding the scope of the impact is crucial for devising effective recovery strategies.
Immediate Consequences
The immediate consequences of the CrowdStrike outage include system crashes, data loss, and potential security breaches. Organizations are facing challenges in maintaining productivity, ensuring data integrity, and safeguarding sensitive information. Gartner's recovery steps aim to address these immediate concerns and provide a roadmap for effective remediation.
Gartner's Recommendations for Immediate Action
In response to the CrowdStrike outage, Gartner has outlined several short-term measures that organizations can take to regain control and address immediate threats. These actions are designed to stabilize operations, enhance security, and prevent further damage.
Vigilance Against Opportunistic Attacks
One of Gartner's primary recommendations is to ensure security teams remain vigilant for new threat intelligence related to opportunistic attacks. During times of crisis, cybercriminals often exploit vulnerabilities and prey on organizations' desperation.
Sumed Barde, head of product at AI security company Simbian, emphasizes the need for caution. "In panic mode, people begin clutching at straws," Barde explains. "Scammers are quick to take advantage of the situation by creating fake websites and demanding upfront payments or distributing malware through seemingly helpful advice."
Awareness of Phishing Campaigns
Chris Morales, CISO at Netenrich, highlights the prevalence of phishing campaigns during such incidents. "Attackers love to take advantage of the confusion by sending emails that appear to be from CrowdStrike or related companies," Morales warns. To safeguard against these threats, organizations must educate employees about phishing risks and implement robust email security measures.
Protecting Against Credential Stuffing and Brute-Force Attacks
Credential stuffing and brute-force attacks are common tactics employed by cybercriminals during security crises. Morales advises organizations to strengthen their defenses against these attacks and monitor for any signs of unauthorized access attempts. Implementing multi-factor authentication and regular password updates can significantly enhance security.
Intermediate Measures for Sustained Recovery
While immediate actions are crucial, Gartner also recommends intermediate measures to ensure sustained recovery and minimize the risk of further disruptions. These actions focus on assessing secondary impacts, identifying vulnerabilities, and maintaining visibility into systemwide updates.
Assessing Secondary Impacts
Gartner advises organizations to assess the impact of the CrowdStrike outage on secondary systems. This involves reviewing interconnected systems, evaluating potential vulnerabilities, and ensuring that all critical components are functioning optimally. By conducting thorough assessments, organizations can identify and address any lingering issues.
Monitoring for Unusual Trends
Katie Teitler-Santullo, a cybersecurity strategist for OX Security, emphasizes the importance of monitoring for unusual trends. "SOC teams should be on the lookout for anomalies such as unusual data transfers, higher-than-usual access requests, and changes in permissions or configurations," Teitler-Santullo explains. Proactive monitoring helps detect potential threats and enables timely intervention.
Blocking Known Fake Domains
To prevent users from inadvertently visiting malicious websites, Gartner suggests adding known fake domains to blocklists. This proactive measure ensures that employees do not fall victim to phishing attempts or malware distribution through counterfeit websites. Regularly updating blocklists is essential to maintaining a secure digital environment.
Managing Employee Burnout
The CrowdStrike outage has placed immense pressure on IT and security teams, leading to burnout and fatigue. Gartner recommends actively managing employee well-being to ensure sustained performance during the recovery process.
Jon Amato, Senior Director Analyst at Gartner, underscores the significance of addressing burnout. "This outage goes beyond security teams because it touches every single machine in a company," Amato explains. "Help desk staffs are strained to the breaking point, and companies are hiring contractors to handle the workload. Prolonged stress can lead to decision fatigue and increased risk of errors."
Chris Morales echoes this sentiment, highlighting the human element in cybersecurity. "Tired employees might miss critical alerts or make mistakes due to exhaustion," Morales notes. Organizations must prioritize employee well-being to maintain operational efficiency and security.
Long-Term Strategies for Resilience
Gartner's long-term recommendations focus on building resilience to mitigate the impact of future incidents. By implementing strategic measures, organizations can enhance their ability to survive and recover from crises.
Fostering Resilience
Maurice Uenuma, vice president at Blancco Technology Group, emphasizes the importance of resilience. "Resilience is achieved by having redundant ways to perform critical tasks, ensuring continuous data backup, and building alternate communication channels," Uenuma explains. Organizations must rehearse for operating under adverse conditions to be better prepared for future crises.
Supply Chain Oversight
Jenna Wells, chief customer and product officer at Supply Wisdom, highlights the role of supply chain oversight in building resilience. "Having full oversight and awareness of your supply chain allows you to proactively identify points of failure and implement business continuity plans," Wells states. This proactive approach ensures organizations can react swiftly to incidents and minimize disruptions.
Preparing for Future Incidents
Tim Freestone, chief strategy officer at Kiteworks, emphasizes the inevitability of future incidents. "It's not if but when an event happens," Freestone asserts. Organizations must adopt a top-down approach to connect resilience efforts with overall strategic objectives. By anticipating and preparing for future crises, businesses can minimize their impact and ensure continuity.
Conclusion
The CrowdStrike outage serves as a stark reminder of the challenges organizations face in maintaining cybersecurity and operational resilience. By following Gartner's recovery steps, IT professionals, cybersecurity experts, and tech enthusiasts can navigate the immediate aftermath, implement sustained recovery measures, and build resilience for the future.
From vigilant threat monitoring to fostering employee well-being and ensuring supply chain oversight, each step plays a crucial role in mitigating the impact of cybersecurity disasters. By taking proactive measures and learning from this incident, organizations can strengthen their defenses and thrive in an increasingly interconnected and interdependent world.
For those looking to stay ahead of future crises, consider signing up for our free trial of Jasper. Our AI-powered platform offers advanced cybersecurity solutions to help you safeguard your organization and build resilience against emerging threats. Start your journey towards enhanced cybersecurity and operational continuity today!