close
close

In response to the Microsoft CrowdStrike incident: July 2024

On July 19, 2024, CrowdStrike informed its customers that a failed CrowdStrike Falcon content update for Windows hosts resulted in a massive outage of government, healthcare, and business services around the world.

Votiro and its services were not impacted by the Microsoft CrowdStrike outages. We continue to closely monitor the situation and offer support to customers and partners as they recover from this business disruption.

As individuals and organizations recover from this outage, we offer the following guidance to security leaders and officials in businesses and government agencies.

1. Be extra vigilant

CISA warns that threat actors have launched malicious malware phishing attacks and links to target individuals and organizations seeking information and solutions by tricking them into clicking on malicious links claiming to offer updates or fixes for CrowdStrike-related issues. Do not click on links received via email or text message. For the latest updates, please visit the CrowdStrike website.

2. Introduce multi-layered defense measures

A layered defense is the foundation of cybersecurity. While concentrated platforms can be useful for increasing efficiency, over-reliance can have disastrous consequences when things go wrong. There’s no guarantee that errors or failures won’t happen, but this biggest IT disruption in history shows the risks of focusing on too few technologies and platforms.

    A message from Aviv Grafi, CTO of Votiro, to our customers using CrowdStrike and Votiro: “No cases of successful targeted attacks have been reported and none are expected. Protection against phishing and malicious links is not affected during this recovery phase.”

    — Ravi Srinivasan, CEO