One of the world’s biggest ever IT failures has caused chaos for major IT infrastructures all over the world. And it was all thanks to a CrowdStrike update.

The damage was caused by a content update for Windows issued by CrowdStrike, a major player when it comes to cybersecurity firms. However, rather than providing an enhanced experience for Windows users, it resulted in many users finding that their PCs crashed. The ‘blue screen of death’ was a common sighting and numerous applications were rendered unusable. The CrowdStrike glitch wasn’t restricted to a small number of individuals either, it went all away the round and affected major organizations.

Understanding the CrowdStrike Flaw

CrowdStrike has been providing security solutions since 2011, and it now offers a wide range of security services. These are provided through cloud-based platforms and have seen CrowdStrike’s profile rise significantly. However, their recent update for their application Falcon Sensor – which analyzes active processes to identify suspicious activity – is responsible for the worldwide outage of IT systems.

Falcon Sensor runs within Windows and, as such, interacts directly with the Windows operating system. Falcon Sensor’s main objective is to protect IT systems from security attacks and system failures, but their latest update achieved the complete opposite. As a result of faulty code within the update, Falcon Sensor malfunctioned and compromised the systems it had been installed on. This led to IT systems crashing and unable to be rebooted.

CrowdStrike were quick to identify the fault as a result of their update, and reassured the global community this was not a global cyberattack. With the fault identified and isolated, CrowdStrike rapidly developed a fix. But the damage had already been done, and many systems remained offline due to the disruption.

Who Was Affected by the CrowdStrike Glitch?

The impact of the faulty CrowdStrike update was of a magnitude rarely seen in the IT world. With many IT infrastructures relying on Windows, countless systems crashed all over the world. Airport services were badly hit, and lots of airlines had to ground their planes due to IT issues. Banks and credit card providers were also affected, and numerous organizations were unable to take card payments as a result. Healthcare services, too, felt the full impact of the glitch and struggled to book appointments and allocate staff shifts.

The Aftermath of the CrowdStrike Disaster

Disruption to IT systems was still evident days after the CrowdStrike incident, and it’s expected this disruption will continue. Matters weren’t helped by the simultaneous failure of Microsoft Azure, a cloud computing platform, which also created a major outage.

While the outages were caused by a technical glitch, CrowdStrike issued an announcement the day after that cybercriminals may be targeting affected systems. Evidence in Latin America indicated CrowdStrike customers were being targeted by a malicious ZIP archive which contains HijackLoader, a module used to install various strains of malware.

Final Thoughts

Ultimately, this digital catastrophe was caused by a faulty piece of code, and Microsoft currently estimate it affected 8.5 million Windows devices. It could easily happen again and reinforces the need for good backup protocols, such as the 3-2-1 backup method. The CrowdStrike glitch may have been unforeseen, but with the correct preparation, you can minimize the impact of future incidents on your IT systems.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Boxcryptor, which adds local encryption to files, is the perfect solution for ramping up file security. But now it’s being retired, where should you turn?

Starting its journey in 2011, Boxcryptor has spent over a decade providing enhanced security to cloud-based storage systems. And, for many organizations, it has proved to be a godsend in terms of file security. If, for example, you store files on a Google Drive account, they are secure to a certain degree. However, the problem is that Google still has access to the files. But this is where Boxcryptor has proved so useful, users are able to encrypt files stored in the cloud and prevent unauthorized access.

Unfortunately, since Boxcryptor was acquired by Dropbox, it has been announced that the Boxcryptor service will be discontinued. Accordingly, this has left its users scrambling for an alternative solution.

The Alternatives to Boxcryptor

It’s crucial that you retain control over the security of your files, especially those that are stored in the cloud with a third-party provider. Therefore, if you are currently using Boxcryptor, we would recommend looking into these alternatives: · Sync: Providing storage plans ranging from 1TB to unlimited storage, Sync represents a fantastic solution when it comes to storing files online. Users are able to store and share files securely thanks to the strong privacy put in place by Sync’s encryption methods. Not only can access be controlled on a granular level and expiry dates applied to specific files, but users of Sync are able to access these files from any location and on any internet compatible device.

  • IBM Security Guardium Data Encryption: IBM’s Security Guardium represents a useful alternative to Boxcryptor and comes packed full of security features. Capable of being used in databases including Microsoft SharePoint, SQL Server, Unix and NAS, Security Guardium offers high level encryption alongside multi-specific access privileges to meet the needs of your organization’s infrastructure. Security Guardium also prides itself on its real-time activity monitoring, a function which ensures that any unusual activity is instantly identified.
  • ESET Endpoint Encryption: a data security suite which promises to “protect your data, both at rest and in transit” Endpoint Encryption is an amazing option for replacing Boxcryptor. Endpoint Encryption has the capacity to encrypt not only individual files, but also entire drives to help maximize your file security. As well as encrypting files, Endpoint Encryption can also create virtual drives which are encrypted and the application’s server takes care of controlling access privileges.
  • Dell Encryption Enterprise: already known for having a reputable background in IT solutions, Dell bring their Encryption Enterprise application to the table as a viable alternative to Boxcryptor. Boasting military grade protection, Encryption Enterprise delivers a premier level of encryption through its Full Volume Encryption technology. This solution can be applied to both system drives as well as external drive, a situation which ensures your data is protected no matter where it’s located.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Working on a home PC is very different to working on a workplace PC. But there’s one thing they both have in common: they get cluttered.

Over time, PCs tend to accumulate a lot of junk. This can be rather obvious such as a desktop packed full of shortcuts and files. Or it can less noticeable to the user as, for example, in the case of a registry riddled with redundant information. The end result, either way, is the same: it makes working on a PC difficult. Navigating your way around folders can become a nightmare and it’s likely that the speed of your PC will also be affected.

As the majority of us are working from home at the moment, it’s important that we declutter our PCs. It’s a move which will make working from home easier and help you remain productive.

The Best Ways to Declutter Your PC

It’s easy to declutter your PC and, best of all, you can start making changes in an instant. Make sure you carry out the following:

  • Cleanup Your Desktop: A desktop which is cluttered can make life very difficult. Quickly finding the file or shortcut that you need can soon become a tiresome exercise. And it’s likely that the majority of items on your desktop are not required e.g. shortcuts to deleted or barely used apps. However, you don’t need to put up with this. And you have two choices: delete unnecessary or relocate items into grouped folders e.g. “Q1 Projects” 
  • Use a Registry Cleaner: The Windows registry is a section of your PC which holds all the settings and values related to hardware and software on the machine. It’s an important database, but it can soon build up with junk e.g. invalid entries which are no longer relevant. And this can slow down your PC and cause numerous errors. Accordingly, you need to keep it clean and this can be achieved with a registry cleaner such as CCleaner. These apps clean up invalid registry entries and minimize the risk of system errors. 
  • Empty Your Recycle Bin: Your recycle bin can soon build up significant junk and this can put a strain on your hard drive. A hard drive that is packed full of data is going to struggle to perform to its maximum. This is why it’s crucial you regularly empty the recycle bin as it can hold huge amounts of data. Even better, make sure you set a limit to the maximum amount of junk it can hold. To do this just right click the recycle bin and go into the properties section where you can customize the maximum size that can be held. 
  • Archive Your Files: Your home PC is likely to be full of various documents, but if you haven’t accessed them in six months then it’s unlikely you regularly need them. However, this isn’t to say you will never need them, so deleting them would be an extreme move. Instead, you can identify older documents and archive them into appropriate folders and sub-folders e.g. “2019 > Utility Bills”

By putting just these four methods into practice you will find that using your home PC suddenly becomes much easier. And, as a result, you will become more productive and complete your work more effectively.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


One of the most useful aspects of cloud computing lies within the domain of Software as a Service (SaaS). But what is SaaS and what can it do for you?

Competition within business is fierce and it’s important that your organization maximizes its productivity. Even a small percentage increase in productivity can make a big difference. And that’s why many businesses are working with SaaS models. It’s a software strategy which allows you to make applications available over the internet through a third party host. The concept may sound straightforward, but it’s also a powerful one which is packed full of benefits.

To help you understand SaaS in more depth, we’re going to take a look at what it is and the benefits it can deliver.


What is SaaS?

SaaS is a distribution model which allows companies to make their applications available over the internet. The application is hosted by a third party host (such as Microsoft, Oracle and SAP) which provides customers with access to a single copy of the app. All customers have access to the exact same application and, therefore, the same features and upgrades. And, given that this is a branch of cloud computing, customers also have the option of storing their data in the cloud as well as on local storage.

The Benefits of SaaS

SaaS models have been adopted by all manner of organizations be they small or large. And this rapid take up rate is one that has been fuelled by the following benefits:

  • Accessibility: The remote access aspect of SaaS makes it highly accessible. All that a customer needs to connect to the application is an internet connection and a PC, laptop or smart device. This opens up your service to a much larger audience and eliminates the need to go through the rigors of a lengthy software installation process. 
  • Easy Updates: Traditional routes of firmware upgrades and patches have involved individual install processes by IT professionals. This has reduced productivity due to the time taken to complete the install. But SaaS puts an end to this. As all customers are accessing the same software, only one update needs to be completed by the application owner. This ensures that all customers receive the same upgrades at the same time with the minimum of fuss. 
  • Quick Startup: SaaS applications are already installed in the cloud and guarantee a swift start up process. There’s no need to watch an install progress bar, the software is available straight out of the box. It will also come fully configured and allow your customers to start getting productive almost instantly. 
  • Low Investment: The initial costs associated with software applications are noticeably reduced in SaaS. Instead of a one-off licensing fee, SaaS applications tend to work on a subscription model. There’s also the added bonus of the third-party host managing the infrastructure which houses the software. Again, this minimizes any initial costs and makes for an attractive software package.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More


Cloud services are one of the hottest trends when it comes to IT and business. But it’s a new form of technology. And this means it comes loaded with risk.

The headlines regarding the boom in cloud computing have been plentiful and the future remains bright. Therefore, it’s an area of IT that your organization has to get on board with. After all, the benefits associated with the cloud are numerous. And they have the capacity to transform your organization into a stronger, more functional and more competitive business. So, it sounds pretty enticing, right?

But migrating your services to the cloud is a big step. There are many risks and factors to take into consideration. And that’s why we’ve put together this guide on how to avoid cloud migration risks.

What are the Risks?

There are a number of risks to consider when migrating to the cloud and these include:

  • Unauthorized Use of Services: One of the major risks of cloud computing is that cloud service providers allow additional services to be installed by default. And this is down to the self-service nature of the cloud. Therefore, employees with access with the cloud have the option to install unauthorized software. And this could soon led to malware being installed. 
  • Increase in Complexity: The complexity of the cloud can have a major impact on your IT resources. IT staff will be required to learn an entire new model of IT, so this will add extra strain to their workload. Perhaps most concerning is the lack of knowledge regarding cloud security. This weakness in security could pose a massive threat to your network. 
  • Data is Always at Risk: No cloud service provider is perfect. And your data will always be at some form of risk on their platform. The backup servers, for example, of a cloud based platform are just as vulnerable to acts of God and hackers. Data loss, therefore, cannot be eliminated and requires additional solutions.

How Do You Avoid these Risks?

Thankfully, all of these risks can be minimized. The key to success is planning in every aspect of the migration. So, make sure that your organization does the following:

  • Configure Slowly and Carefully: Migrating to the cloud is not something that can be rushed. You need to proceed slowly and ensure that everything is set up correctly. And this is most important when it comes to privileges. These need to be managed correctly to minimize the risk of unauthorized access causing major problems for your security.
  • Establish Prior Training: Cloud technology is relatively new and this has resulted in a lack of available skills being available. But this does not have to be a definitive situation for your business. So, the first step of your cloud migration should be to establish a training program. By proceeding in this manner you will ensure a hassle free migration.
  • Work with Multiple Backup Methods: You should never rely on just one form of data storage. And the cloud is no different. To minimize the risk of any data disasters it’s crucial that you work with multiple backup methods. It could be the difference between your data being available and your organization remaining functional.

For more ways to secure and optimize your business technology, contact your local IT professionals.

Read More