Skip to content

Authored by Neal Smyth

Introduction: Positive Takeaways from the CrowdStrike BSOD

As businesses increasingly embrace digital transformation and integrate automation the benefits are significant: enhanced efficiency, agility, and cost savings. However, the associated risks to the confidentiality, integrity, and availability of operations, data and services are considerable.

The recent incident involving CrowdStrike and Microsoft highlights the significant potential for vulnerabilities in supply chains and the critical need for robust Backup and Disaster Recovery (BDR) strategies. This one event underscored the importance of transparency, swift mitigation, understanding of risk exposure and ensuring organisations have appropriate tooling and response plans in place.

This article aims to provide a summary of good practices and support for IT Leaders, emphasising the value of robust security measures but also the constant honourable mission of cybersecurity defenders.

Benefits of Service and Data Resiliency

Effective BDR strategies are crucial to mitigate risk and ensure service and data resiliency.

  • Operational Continuity: Minimises downtime and maintains business operations during disruptions.
  • Data Integrity and Availability: Ensures critical data is consistently available and intact.
  • Customer Trust and Confidence: Maintains customer trust by safeguarding their data and ensuring reliable service.
  • Regulatory Compliance: Meets legal and regulatory requirements for data protection and recovery.
  • Risk Mitigation: Reduces financial losses and reputational damage from data breaches or system failures.

Key Components of a Comprehensive BDR Strategy

  • Understanding BIA, RTO, and RPO: A Business Impact Analysis (BIA) assesses the effects of disruptions, Recovery Time Objective (RTO) defines the maximum acceptable downtime, and Recovery Point Objective (RPO) specifies the maximum acceptable data loss. Businesses should identify critical business functions, prioritise recovery efforts, and set targets for restoration and data backup frequency.

  • The 3-2-1-1-0 Rule: Maintain multiple copies of data, use different media types, keep an offsite and air-gapped copy, and ensure no errors through regular testing.
  • Supply Chain Exposure and Mitigation: Assess vendor security, establish redundancy, and include security clauses in contracts.
  • Air Gaps and Recovery Locations: Physically isolate a backup copy and plan for multiple recovery sites.
  • Continuous Improvement and Learning: Regularly review incidents, update BDR plans, and test recovery processes.
  • Communication and Coordination: Define roles and responsibilities, develop a crisis communication plan, and conduct regular training and drills.

 

Cyber Security: A Noble Mission

In the wake of a cyber incident, clients and customers look for advice and support to reassess risk, fortify defences, and ensure a swift recovery. Cybersecurity firms such as Ekco and vendors like CrowdStrike play a pivotal role:

  • Security Controls: Ekco and Crowdstrike provide key security controls and continuous protection against evolving threats.
  • Commitment to Security: IT and cybersecurity professionals work to ensure the safety and resilience of digital infrastructure, economies, and citizens.
  • Support: We wish to acknowledge the dedication and herculean effort of IT and Cybersecurity workers, especially those at CrowdStrike, and affected end user organisations in remediating the recent issues and working to continue to safeguard assets, their organisations and society.

Conclusion

Digital transformation and the integration of automated software deployment offer significant benefits but also presents substantial risks. A comprehensive BDR strategy, including robust process controls, regular audits, employee training, and stringent recovery objectives, is essential. By balancing benefits and risks, organisations can leverage these technologies while minimising potential negative impacts. The collective efforts of the cybersecurity community underscore the importance of resilience and protection in the digital age.

If you would like to speak to us about securing your data get in touch with our team.

Question?
Our specialists have the answer