One of the world’s biggest ever IT failures has caused chaos for major IT infrastructures all over the world. And it was all thanks to a CrowdStrike update.

The damage was caused by a content update for Windows issued by CrowdStrike, a major player when it comes to cybersecurity firms. However, rather than providing an enhanced experience for Windows users, it resulted in many users finding that their PCs crashed. The ‘blue screen of death’ was a common sighting and numerous applications were rendered unusable. The CrowdStrike glitch wasn’t restricted to a small number of individuals either, it went all away the round and affected major organizations.

Understanding the CrowdStrike Flaw

CrowdStrike has been providing security solutions since 2011, and it now offers a wide range of security services. These are provided through cloud-based platforms and have seen CrowdStrike’s profile rise significantly. However, their recent update for their application Falcon Sensor – which analyzes active processes to identify suspicious activity – is responsible for the worldwide outage of IT systems.

Falcon Sensor runs within Windows and, as such, interacts directly with the Windows operating system. Falcon Sensor’s main objective is to protect IT systems from security attacks and system failures, but their latest update achieved the complete opposite. As a result of faulty code within the update, Falcon Sensor malfunctioned and compromised the systems it had been installed on. This led to IT systems crashing and unable to be rebooted.

CrowdStrike were quick to identify the fault as a result of their update, and reassured the global community this was not a global cyberattack. With the fault identified and isolated, CrowdStrike rapidly developed a fix. But the damage had already been done, and many systems remained offline due to the disruption.

Who Was Affected by the CrowdStrike Glitch?

The impact of the faulty CrowdStrike update was of a magnitude rarely seen in the IT world. With many IT infrastructures relying on Windows, countless systems crashed all over the world. Airport services were badly hit, and lots of airlines had to ground their planes due to IT issues. Banks and credit card providers were also affected, and numerous organizations were unable to take card payments as a result. Healthcare services, too, felt the full impact of the glitch and struggled to book appointments and allocate staff shifts.

The Aftermath of the CrowdStrike Disaster

Disruption to IT systems was still evident days after the CrowdStrike incident, and it’s expected this disruption will continue. Matters weren’t helped by the simultaneous failure of Microsoft Azure, a cloud computing platform, which also created a major outage.

While the outages were caused by a technical glitch, CrowdStrike issued an announcement the day after that cybercriminals may be targeting affected systems. Evidence in Latin America indicated CrowdStrike customers were being targeted by a malicious ZIP archive which contains HijackLoader, a module used to install various strains of malware.

Final Thoughts

Ultimately, this digital catastrophe was caused by a faulty piece of code, and Microsoft currently estimate it affected 8.5 million Windows devices. It could easily happen again and reinforces the need for good backup protocols, such as the 3-2-1 backup method. The CrowdStrike glitch may have been unforeseen, but with the correct preparation, you can minimize the impact of future incidents on your IT systems.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


In the digital age, it’s crucial for your business to have a robust IT infrastructure if you want to achieve long-term success and sustainability.

An IT infrastructure, however, is a complex combination of services and components. Accordingly, building and maintaining one is far from straightforward. But if you want to support your day-to-day operations and build for future growth, it’s essential you prioritize your IT infrastructure. To help you get started, or evaluate your existing system, we’re going to take a closer look and how you can build and maintain it.

What are the Key Components?

A well-designed IT infrastructure will ensure your daily operations run smoothly, but what are the components supporting this success? The core elements comprising an IT infrastructure include:

  • Hardware: central to any IT system is the hardware, without which you wouldn’t have any IT capabilities. This hardware typically includes major resources such as servers for managing network activity, storage solutions for data management and backup, as well as networking equipment to support connectivity and security e.g. routers and firewalls.
  • Software: the backbone of your hardware will be software, which your team can use to process, store, and analyze data. This software can include operating systems such as Windows and Linux, or business applications which support core functions e.g. using Microsoft Excel to store data.
  • Network Infrastructure: depending on the size of your business, you may rely on Local Area Network (LAN) or a Wide Area Network (WAN). Generally, a smaller business will only need to work with a LAN, but larger businesses may work with several LANs connected to a main WAN. Both of these networks ensure there is a seamless data flow across your network.

Building and Maintaining an IT Infrastructure

Before you start operating across an IT infrastructure, you need to first build one and then establish a maintenance schedule. It’s an important process and one which requires great planning. So, to do this successfully, make sure you cover the following:

  • Carry Out a Needs Assessment: before investing in an IT infrastructure, perform a thorough assessment of your business needs. This involves understanding current and future requirements, identifying gaps, and setting clear objectives. It’s important to involve multiple stakeholders from your business in this activity, as well as working with IT experts to determine what’s viable.
  • Scalability: It’s difficult to predict future growth, but designing your IT infrastructure to be scalable is vital. This means selecting hardware and software that can grow with your business, allowing for easy upgrades and expansions when your business activity demands it.
  • Regular Maintenance: you should regularly update software and hardware to ensure optimal performance and security. Implement a maintenance schedule and keep up with the latest patches and upgrades. Remember, failing to implement security patches promptly can have catastrophic results for your IT security.
  • Monitor Performance: once your IT infrastructure is up and running, it’s important to monitor its performance. It’s very easy for small issues to escalate into major IT issues, so being proactive can help identify issues before they become critical.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Snowflake, a cloud data analysis company, has found itself under attack from malware, with the result that its customers passwords have been leaked online.

A leading cloud data platform, Snowflake was founded in 2012 and has experienced a rapid rise in the industry, with its current revenue estimated at $2.8 billion. This success has been founded upon innovative data analytics solutions and a number of leading clients such as Santander, Dropbox, and Comcast. For threat actors, Snowflake represents a tempting target, both in terms of the sheer amount of data they hold and financial value. And this is clearly why Snowflake has been attacked.

With threat actors claiming to have stolen hundreds of millions of customer records from Snowflake environments, the attack is clearly a significant one. Perhaps the most interesting aspect of the attack is that it appears to result from a lack of multi-factor authentication.

Cracking the Snowflake Infrastructure

Live Nation, a popular ticket sales service, was the first company to announce that their stolen data had been hosted on the Snowflake platform. Other Snowflake customers have come forwards to acknowledge a breach but are yet to name Snowflake as the hosts for this data. The attack appears to have been fueled by info-stealing malware, with the attack targeting PCs which had access to their organization’s Snowflake network.

How the initial attack was instigated remains unclear, but Snowflake has revealed that a demo account, protected with nothing more than a username/password combination, had been recently compromised. Whether this gave the threat actors direct access to Snowflake customer accounts is unknown, although it does point towards the threat actors establishing an early foothold. Snowflake has also disclosed that each customer is put in charge of their own security, and multi-factor authentication isn’t automatically enabled. This, Snowflake states, is how threat actors succeeded in hacking the compromised accounts.

Snowflake has advised all of its customers to switch on multi-factor authentication, but it appears to be too late for many. Whole lists of Snowflake customer credentials can be found available on illegal websites, with this data including email addresses alongside username/password combinations. Ticketmaster, another ticket sales platform, has been reported of having close to 560 million customer records compromised. This is a huge data breach, and one which has deservedly earned headlines.

The Importance of Multi-Factor Authentication

For Snowflake to have selected multi-factor authentication as an optional function, rather than a default security measure, is negligent. Regardless of this negligence, it’s also the responsibility of the compromised accounts to double check the available security measures. Therefore, to stay safe in the future, always carry out the following when working with external hosting providers for your data:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Threat actors have been discovered to be using cracked versions of Microsoft Office to distribute a dangerous malware cocktail through illegal torrents.

Detected by the AhnLab Security Intelligence Center (ASEC), this malware campaign bundles together a collection of powerful malware strains – such as malware downloaders, cryptocurrency miners, and remote access trojans – to unleash a devastating attack. The malware is disguised as a cracked Microsoft Office installer, which would usually allow users to illegally download paid applications for free. However, those downloading this ‘cracked’ software are getting much more than they bargained for.

The Dangers of Malicious Torrents

Torrent sites, the use of which is generally illegal, have a long history of containing malware due to the unregulated nature of these sites. However, the promise of expensive software for nothing more than a few clicks is highly tempting to many internet users. Therefore, risks are taken and, occasionally, the consequences can be severe.

In this most recent example, torrents for Microsoft Office – as well as torrents for Windows and the Hangul word processor – are using professionally crafted interfaces to pass themselves off as legitimate software cracks. But despite the numerous options available, to apparently assist the user, these cracks have a nasty sting in their tail. Once the installer has been executed, a background process launches a hidden piece of malware which communicates with either a Mastodon or Telegram channel to download further malware.

This malware is downloaded from a URL linked to either GitHub and Google Drive, two platforms which are both legitimate and unlikely to ring any alarm bells. Unfortunately, there’s plenty to be alarmed about. A series of dangerous malware types are downloaded to the user’s computer, and these include Orcus Rat, 3Proxy, XMRig, and PureCrypter. These all combine to harvest data, convert PCs into proxy servers, download further malware, and use PC resources to mine cryptocurrency.

All of these malware strains run in the background, but even if they’re detected, removing them has little impact. This is because an ‘updater’ component of the malware is registered in the Windows Task Scheduler and, if the malware strains have been removed, they are re-downloaded on the next system reboot. This makes it a persistent threat, and one which is difficult to fully remove from your system.

Shield Yourself: Avoiding Harmful Torrents

Clearly, it’s crucial you need to protect your business from malicious torrents, but how do you do this? Well, it’s relatively simple if you implement the following strategies:

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


In today’s digital age, data is everywhere, and businesses are generating more of it than ever before. Therefore, it’s crucial you know how to handle it.

Businesses collect large volumes of data every day, and it’s this data which can be used to develop insights and analyze business operations. For a small business, however, the sheer magnitude of the data involved can be overwhelming. But it doesn’t have to be like this. Instead, you can manage big data simply and effectively, an approach which will help boost your efficiency and competitiveness. And Ophtek is here to show you how.

Demystifying Big Data

Big data encompasses all the data your business logs, processes and handles through the course of its daily operations. So, for example, sales records, customer details, social media interactions, and quotations can all be considered part of big data. The three main aspects of big data include the amount of data generated, the speed at which this is produced and processed, and all the different types of data which comprise your unique collection of big data.

How Can Big Data Help Small Businesses?

The main impact of harvesting big data is that it allows you to uncover patterns and trends within your business activities. In the past, this data would likely have been kept of paper records, and analyzing this would have been a painstaking process. Luckily, advances in technology mean this data can now be stored and automatically analyzed with much more ease. By analyzing big data, you can reap the following benefits:

How Should You Use Big Data to Succeed?

If you want to leverage big data to make a noticeable impact on your business, make sure you practice the following:

  • Start with Clear Goals: it’s crucial you identify what you want to achieve with your data. You may, for example, want to improve customer satisfaction, or you could be looking to maximize your sales. Either way, by setting specific goals, you’ll be able to identify what you need from your data.
  • Use Accessible Tools: analyzing big data can be complex, but it doesn’t have to be difficult. By utilizing tools such as Google Analytics, for website data, or HubSpot, for customer experience data, you can easily gain access to almost endless insights relating to your data.
  • Act on Insights: the most important process in analyzing big data is making sure you follow through on the results. These changes won’t implement themselves, it’s down to you and your team to take these insights and put them into action. And always monitor the impact of these changes, this will reveal whether they’re successful or require further tinkering.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More