Secfix’s Post

Secfix reposted this

View profile for Branko Džakula, graphic

Co-founder @ Secfix & UN1QUELY | Cybersecurity Entrepreneur & Educator | Simplifying Cybersecurity Compliance | Scaling Startups at Digital Den | Bokelj

The dust should not settle down after the impact that Crowdstrike had on the global cloud infrastructure and Windows devices. Even though this was not a security data breach, it was a security incident of epic proportions that should be a wakeup call for all impacted organisations. On one hand, this incident highlights the vulnerability of the global internet infrastructure and high dependency on third-party cloud infrastructure, this will and should not change and this dependency has accelerated innovation and the economy to enormous scales. This dependency needs to be managed better through business continuity plans and patch management with internal testing and quality control before applying patches and updates to rest of the users in the company. Large corporations and software providers will make mistakes again, it's our job to be prepared when they do. On the other hand, this incident also brings to light the troubling reality that software companies are rarely held accountable for significant outages and cybersecurity breaches. The financial and legal repercussions for such extensive disruptions are often so minor that companies lack the incentive to implement more substantial improvements. Unless software companies are held financially accountable for defective products and held more accountable for security incidents, I doubt we will keep up with good security practices in the future. Good news for cybercriminals, bad news for us. Thanks to TV N1 / CNN exclusive news channel affiliate and TV E Montenegro for reaching out for comment on this dire incident that was unfolding on Thursday through Friday. I had the opportunity to address the details of the incident and recommend quick solutions to mitigating this type of risk and it's repercussions on organisations around the globe.

Nemanja R.

CISSP | CC | ISO 27001 | CCNA

1mo

Svaka čast, right on point! Ono što većina često zanemaruje kod ovog slučaja je da krivica leži 50/50, i u Crowdstrike zbog buga u update-u, ali i u klijentima koji očigledno ne praktikuju razdvajanje okruženja, i testiranje pre puštanja na produkciju... poražavajuće je da je toliko kompanija pogođeno, što samo govori o tome da je svest o informacionoj bezbednosti i bezbednosnim praksama ,globalno na jako niskom nivou.... Takođe za ovaj drugi deo o BCP-u , Risk Managementu, i ostalim stvarima da ne govorimo....

Vladimir Jocic ITBizMng

Company Owner @ VJ2Tech Expertiser Technology | IT Outsourcing, Software Development & Design

1mo

Attack on MS update servers, was a hacker asttack/ It was not a mistake of one software devceloper! Every admin, should know this! NEVER LEAVE AUTO UPDATES ON! NEVER! Auto Update at Windows> NEVER! Please, DEFFER your updates and only you should decide, after the tests, when your organization should update, any OS. Is that easy to understant? AM I clear. Ho much times, I said this! For al ADMINS> NEVER LEAVE AUTO UPDATES ON! NEVER! Probably, some virus, also, went in, to your system! After 2 years, they will announce, that the major password, steal, happened at todays, date. Remember the date July, 17th 2024. All your data from Microsoft servers, was gone. Please all change your Microsoft, and all your banks password. Believe me now, better. Do not say that I did not warn you! Change your passwords! DO, restore points! If you can, do not use Microsoft. Use other operation systems. Friends, I told you. I have spoken! Jocic Vladimir.

Aleksandar Obradovic

Developer/Network Engineer

1mo

Ja odavno pricam da svaka firma koja iole drzi do sebe mora imati implementirana menadzment resenja za krizne situacije i da treba da bude proaktivna, tj. da testira sve pre nego sto pusti software/patch/update u sopstveno produkciono okruzenje. Ne mora svaka kompanija da ima implementirane zvanicne standarde poput ISO, SOC2, itd. i da bude sertifikovana za iste ali mora istima da se vodi. Sta bi falilo da svaka firma ima ISMS impelementiran? Sa druge strane, ovo nije moglo biti spreceno jer je u pitanju config/def update koji nije moguce difrencirati ili odloziti za neki period jer sam Falcon Sensor to ne podrzava. Jedina opcija je da Crowdstrike i slicne firme rade ispravno testiranje pre svakog update-a za svako okruzenje i/ili da se njihovi update serveri blokiraju na firewall-u sto nije bas pozeljno. Sve u svemu ovo nam je mozda poslednji wake-up call da uradimo nesto konkretno kad je upravljanje rizicima u pitanju.

Ilya Smirnov

Co-Founder & CEO of ACSG | CyberSecurity | Penetration Testing | Information Security | Your digital security is my top priority

1mo

Agree textbook example of a security incident.

See more comments

To view or add a comment, sign in

Explore topics