CrowdStrike Failure Reveals Thin Line Between Cyberattack and ‘Incident’
- Date:July 22, 2024
- Author(s):
- Tracy (Kitten) Goldberg
- Report Details: 8 pages, 8 graphics
- Research Topic(s):
- Cybersecurity
- Fraud & Security
- PAID CONTENT
Overview
Called the largest IT outage in history, the defective content update pushed out by cybersecurity firm CrowdStrike on July 19 affected 8.5 million Windows-based devices worldwide, the ripple effects of which are being felt three days later. The so-called Blue Screen of Death outage is attributed to CrowdStrike’s Falcon endpoint detection and response (EDR) software, which is widely used to protect systems from cyberattacks and malware infections.
In this note, Javelin Strategy & Research highlights why financial services companies dependent on third parties must ensure they have adequate and necessary real-time responses from vendors upon which they rely for key services, ensuring that well-structured service-level agreements that highlight strategies for recovery from a cyber incident or failed update are in place when the agreements are signed. This note also explores risks financial institutions continue to face because of outdated business continuity and disaster recovery planning and strategy. It again makes an argument for consolidation at the C-suite level that eliminates redundancies and gaps between IT and risk teams.
Book a Meeting with the Author
Related content
2025 Dark Web Threat Intelligence Vendor Scorecard
Javelin’s newest cybersecurity scorecard, the 2025 Dark Web Threat Intelligence Vendor Scorecard, evaluates leading dark web threat intelligence vendors on the market today. This i...
2026 Cybersecurity Trends
In the year ahead, financial services will face several trending challenges as they try to keep organizations and customers safe. Zero trust will come to the forefront of supply ch...
Social Signals, Malicious Motives: Emojis as a Cyber Weapon
Cybercriminals leverage emojis to evade defenses and use them in phishing and spoofing attacks to deceive victims and steal sensitive information. Emojis are also used to control c...
Make informed decisions in a digital financial world