Apr 10, 2025

Protecting Your Business From an IT Outage

In 2024, a major IT outage affected 8.5 million computers and effectively shut down some businesses for days. Read here to learn how to protect your company should something like this happen again.

 

One of the largest IT outages ever happened on July 19. A now-infamous CrowdStrike update caused chaos across the globe as 8.5 million business computers that had updated their software suddenly saw the so-called blue screen of death. While some businesses recovered quickly and were able to resume operations, others were not so lucky.

You may know the background: CrowdStrike provides cybersecurity services to Windows-based computer systems. The incident occurred when the company issued a flawed update to its CrowdStrike Falcon Sensor platform. How did that happen? There seems to have been a logic error that caused the application to fail. Such consequences of flawed control processes are not unheard of but are usually not so dramatic.

The event provides businesses with a reminder to reassess their cybersecurity protocols. Companies should review the following as they seek to improve their protocols and procedures:

1. Reassess automatic updates. Automatic updates are intended to ensure security updates are installed quickly and easily. End users rely on vendors to test those updates before they are launched automatically to be sure they are safe. But the CrowdStrike failure raises the question of whether it would be better to have the company's IT department test all updates and patches on a test server and then manually install the updates at the company level.

2. Revisit cloud strategy. As we have seen, relying on a single cloud provider — whether CrowdStrike, Microsoft Azure, AWS or Google — can result in far-reaching problems. This may be the time to consider switching to a different approach, such as a hybrid cloud environment in which public clouds, such as those mentioned above, are combined with private clouds, either hosted by the company itself or a third-party provider.

3. Vet vendors. In a world with bad actors and deep fakes, cybersecurity is increasingly important. Consequently, due diligence with a software vendor should be expanded to include questions concerning how updates are tested, verified and rolled out; how data privacy protocols are maintained; and what disaster recovery systems are offered.

4. Create backup communication systems. The CrowdStrike failure disrupted Delta airlines for five days in part because the company could not communicate with its flight crews. This highlights the necessity of having backup communication systems. Companies need to be able to reach employees in the event of a company-wide tech disruption.

5. Ensure applicable disaster recovery and business continuity plans. Companies should assess their cybersecurity-related disaster recovery and business continuity plans. Part of this endeavor should include reviewing whether it is possible to roll back to previous working versions of critical software, which can decrease any downtime.

It is critical to remember that when a cybersecurity breach happens, bad actors are ready to take advantage of businesses harmed by the event. Never respond to phone calls or emails supposedly from the vendor whose software went down. Instead, reach out through official channels to verify the communication's authenticity.

The CrowdStrike event was significant, widespread and disruptive to many businesses. Companies need to look at it as an example of what can happen if a company is not prepared for an IT disruption.

©2025


 

MORE RECENT NEWS…


Jul 03, 2025

What To Know About Fringe Benefits and Taxes

When you provide workers with additional benefits on top of their regular pay, some may be taxable. As the rules can get complicated, it pays to familiarize yourself with the requirements. Read through for an overview of which benefits are taxable.


Jul 02, 2025

Working 'Off the Clock': What Employers Need To Know

Disputes over unpaid work time often arise from tasks performed outside official hours — for example, answering emails, traveling between jobsites or changing into work clothes. Employers must understand when these activities count as compensable work. Read through to learn how exempt and nonexempt statuses affect wage obligations.


Jul 01, 2025

Are You Considering Pay-As-You-Go Workers' Comp Insurance

Workers' comp insurance is essential for most businesses, but as an employer, you may have more options than you realize. Read through for an introduction to the pay-as-you-go model and the advantages of outsourcing it.


Jun 30, 2025

Paid and Unpaid Breaks: What Employers Need To Know

Employers must ensure that break policies comply with wage laws, especially when employees work through lunch, answer emails after hours or remain on call. Similarly, misclassifying paid and unpaid breaks can lead to wage violations and legal risks. Read through for key guidelines on tracking break time and maintaining compliance.


Jun 04, 2025

What Is Key Person Insurance and Do You Need It?

Have you heard of key person insurance? This is a type of life insurance policy that may positively benefit your business’s continuity, though it has both tax and financial implications. Read through to see whether key person insurance is right for your company.


Jun 03, 2025

Is This Your Situation: Managing Tax Rules for Part-Time or Seasonal Help

Do you have questions about the tax treatment of payments for part-time and seasonal help? These employees are subject to the same rules that apply to all employees — with some twists. Read through for some help on tax rules regarding part-time and seasonal help.




More News & Press can be found in our Archive.