{"id":1460,"date":"2024-09-02T07:54:39","date_gmt":"2024-09-02T12:54:39","guid":{"rendered":"https:\/\/www.glasswire.com\/blog\/?p=1460"},"modified":"2024-09-02T07:54:41","modified_gmt":"2024-09-02T12:54:41","slug":"crowdstrike-incident-what-can-we-learn","status":"publish","type":"post","link":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/","title":{"rendered":"What We Can Learn From the CrowdStrike Incident In Terms of Personal Security"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1200\" height=\"540\" src=\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg\" alt=\"\" class=\"wp-image-1461\"\/><\/figure>\n\n\n\n<p>The <a href=\"https:\/\/community.isc2.org\/t5\/Industry-News\/ALL-THINGS-CrowdStrike-July-2024-Incident\/td-p\/72327\" rel=\"nofollow\">CrowdStrike incident of 2024<\/a> sent shockwaves through the cybersecurity world, exposing weaknesses that resonate far beyond corporate walls.\u00a0<\/p>\n\n\n\n<p>The event serves as a strong reminder that digital vulnerabilities aren\u2019t just a concern for large organizations. They can <a href=\"https:\/\/www.georgetown.edu\/news\/ask-a-professor-crowdstrike-outage\/#:~:text=Because%20so%20many%20core%20systems,other%20routine%20societal%20systems%20affected.\" rel=\"nofollow\">impact individual users<\/a> as well. Examining the lessons learned from this high-profile breach can yield valuable insights into how to strengthen personal security.\u00a0<\/p>\n\n\n\n<p>To better illustrate the lessons that can be gleaned, this article will break down key strategies for threat detection, rapid response, and proactive defense. We want to offer practical steps anyone can take to safeguard their digital life in an increasingly connected world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding the CrowdStrike Incident<\/h2>\n\n\n\n<p>The CrowdStrike incident was a significant event in the cybersecurity world. It left many organizations scrambling as a critical update sent Windows servers into a crash loop, triggering the dreaded <a href=\"https:\/\/www.crowdstrike.com\/falcon-content-update-remediation-and-guidance-hub\/\" rel=\"nofollow\">Blue Screen of Death<\/a>, or BSOD for short.\u00a0<\/p>\n\n\n\n<p>The resulting disruption didn\u2019t just cause headaches for IT teams\u2014it highlighted vulnerabilities that extend beyond the corporate world and into the area of personal digital security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How The Incident Impacted Personal Security<\/h2>\n\n\n\n<p>What made this incident particularly alarming was its widespread impact. Industries ranging from <a href=\"https:\/\/www.npr.org\/2024\/07\/21\/nx-s1-5046700\/the-crowdstrike-outage-disrupted-many-industries-hospitals-were-especially-vulnerable\">healthcare to finance<\/a> experienced outages, demonstrating that even a single flawed update can have far-reaching consequences. But while it\u2019s easy to think of this as a problem only big companies face, the reality is that similar risks exist for individual users.<\/p>\n\n\n\n<p>Just like organizations, <a href=\"https:\/\/www.glasswire.com\/blog\/2024\/03\/28\/cyber-hygiene\/\">individuals rely heavily on the security<\/a> of their devices and networks. A poorly timed or faulty update on a personal device could easily lead to significant issues, from data loss to compromised security.\u00a0<\/p>\n\n\n\n<p>The CrowdStrike event serves as a reminder that the digital tools we all depend on are only as secure as their latest update\u2014and that staying vigilant is just as crucial for individuals as it is for large enterprises.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Importance of Threat Detection in Personal Security<\/h2>\n\n\n\n<p>When something goes wrong, the faster you identify the issue, the quicker you can act to contain it. In the case of CrowdStrike, organizations worldwide had to <a href=\"https:\/\/www.computerweekly.com\/feature\/CrowdStrike-update-chaos-explained-What-you-need-to-know\" rel=\"nofollow\">rapidly pinpoint the cause of widespread system failures<\/a>, a task that was complicated by the sheer scale of the incident.\u00a0<\/p>\n\n\n\n<p>For individuals, while the stakes may not seem as high, the principle remains the same\u2014early detection is key to minimizing damage.<\/p>\n\n\n\n<p>Threat detection isn\u2019t just for big corporations; it\u2019s something that every individual should consider as part of their personal security strategy. Cyber threats are evolving, <a href=\"https:\/\/www.glasswire.com\/blog\/2024\/01\/08\/cybersecurity-resolutions-2024\/\">becoming increasingly more complex and sophisticated<\/a>, and attackers are always on the lookout for vulnerable systems to exploit.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Improving Your Threat Detection Capabilities<\/h2>\n\n\n\n<p>Whether it\u2019s malware, phishing attempts, or unauthorized access to personal accounts, being able to quickly detect and respond to these threats can make a significant difference.<\/p>\n\n\n\n<p>One way individuals can enhance their threat detection is by using reliable security tools. Antivirus software, <a href=\"https:\/\/www.glasswire.com\/blog\/2023\/12\/13\/behind-the-firewall-unveiling-the-power-of-glasswires-endpoint-protection\/\" rel=\"nofollow\">advanced firewalls<\/a>, and real-time monitoring solutions are essential for identifying suspicious activity as soon as it happens.\u00a0<\/p>\n\n\n\n<p>These tools work continuously in the background, scanning for anything out of the ordinary, such as unauthorized attempts to access your device or unexpected changes in your system\u2019s behavior.<\/p>\n\n\n\n<p>Having <a href=\"https:\/\/support.uidaho.edu\/TDClient\/40\/Portal\/KB\/ArticleDet?ID=2770\" rel=\"nofollow\">regular checks and reviews of your systems<\/a> is another important aspect of threat detection. Staying alert to unusual activity\u2014like unexplained slowdowns, unexpected pop-ups, or emails from unfamiliar sources\u2014 can help you catch potential issues before they escalate.\u00a0<\/p>\n\n\n\n<p>Just as businesses need to monitor their networks constantly, individuals should make it a habit to review their digital environment regularly, ensuring that everything is running as it should.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Role of Rapid Response in Mitigating Security Breaches<\/h2>\n\n\n\n<p>When the CrowdStrike incident struck, <a href=\"https:\/\/www.cio.com\/article\/3480907\/inside-cios-response-to-the-crowdstrike-outage-and-the-lessons-they-learned.html\" rel=\"nofollow\">organizations had to act fast<\/a> to mitigate the fallout\u2014systems were crashing worldwide, and critical operations were quickly grinding to a halt.\u00a0<\/p>\n\n\n\n<p>In situations like this, the <a href=\"https:\/\/fastercapital.com\/topics\/understanding-the-importance-of-rapid-incident-response.html#:~:text=Minimizing%20Impact%3A%20Rapid%20response%20allows,%2C%20reputation%2C%20and%20financial%20stability.\" rel=\"nofollow\">speed and effectiveness of the response<\/a> are important\u2014not just for large enterprises, but for individuals too. Just as businesses need a plan to recover from security breaches, so do personal users, who might face their own set of challenges when something goes wrong.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Steps To Mitigate Potential Problems<\/h2>\n\n\n\n<p>The CrowdStrike event showed how important it is to have a well-thought-out response plan in place, ready to be executed the moment a problem is detected. But will this incident finally show the value of smaller, <a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/application-security-testing-tools\/\">more specialized application testing tools<\/a> instead of wanting to repeat it and watch multiple industries crumble in a matter of hours?&nbsp;<\/p>\n\n\n\n<p>For individuals, creating a personal <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/feature\/5-critical-steps-to-creating-an-effective-incident-response-plan\" rel=\"nofollow\">incident response plan<\/a> doesn\u2019t have to be complicated. It starts with understanding what actions to take if a threat is detected. If you suspect that your system has been compromised, disconnecting from the internet is often a good first step.\u00a0<\/p>\n\n\n\n<p>Taking this step can prevent any further spread of malware or unauthorized access to your data. From there, it\u2019s important to <a href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/data-breach-five-things-to-do-after-your-information-has-been-stolen\/\" rel=\"nofollow\">secure your accounts<\/a>\u2014change passwords, enable two-factor authentication, and ensure that any compromised information is contained.<\/p>\n\n\n\n<p>Recovery is another essential aspect of the response, and the CrowdStrike incident highlighted how organizations struggled with asset inventories and prioritizing recovery efforts.&nbsp;<\/p>\n\n\n\n<p>Individuals may also want to consider keeping an <a href=\"https:\/\/njaes.rutgers.edu\/money\/pdfs\/digital-assets-worksheet.pdf\" rel=\"nofollow\">up-to-date inventory of their digital assets<\/a>\u2014like important files, personal data, and critical software\u2014is just as important. Knowing what needs to be restored first can help you get back on track more quickly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Learning from the Need to Balance Speed with Security<\/h2>\n\n\n\n<p>The CrowdStrike incident brought attention to a common dilemma in cybersecurity: balancing speed with security. In today\u2019s digital environment, there\u2019s significant pressure to stay ahead of potential threats by quickly deploying updates.&nbsp;<\/p>\n\n\n\n<p>However, the event demonstrated the risks associated with rushing updates without thorough testing, leading to serious consequences as a result. This lesson holds true not just for organizations, but also for individual users as well.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Automatic updates <a href=\"https:\/\/fightcybercrime.org\/blog\/automatic-updates-the-benefits-and-how-to-turn-them-on\/\" rel=\"nofollow\">offer convenience<\/a>, keeping devices running the latest software with updated security features. However, as seen in the CrowdStrike incident, these updates can sometimes introduce new problems, including vulnerabilities that compromise system stability.\u00a0<\/li>\n\n\n\n<li>Automatic updates are beneficial but <a href=\"https:\/\/www.wsj.com\/podcasts\/tech-news-briefing\/crowdstrike-outage-shows-risks-of-automatic-updates\/157d9f46-2371-48a2-9bd1-d5f6246773d4\" rel=\"nofollow\">should be approached with caution<\/a>, particularly for important systems or applications. Managing updates manually allows users to observe potential issues faced by others before applying updates.\u00a0<\/li>\n\n\n\n<li>Decentralization plays a key role in creating a <a href=\"https:\/\/www.glasswire.com\/blog\/2023\/01\/03\/how-to-protect-your-network\/\" rel=\"nofollow\">more resilient security strategy<\/a> to implement. Thus, a <a href=\"https:\/\/www.atlantic.net\/gpu-server-hosting\/\" rel=\"nofollow\">shift towards GPU server hosting<\/a> for companies running AI models would be a safer solution than depending on Open AI, Meta, or Google. Just think if everyone used the same provider and all AI services just went dark all of a sudden\u2014that\u2019s exactly why decentralization is the answer.\u00a0<\/li>\n\n\n\n<li>Security settings also deserve attention. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/01\/15\/how-to-implement-multi-factor-authentication\/\">Multi-factor authentication<\/a> (MFA) provides some extra protection, making it harder for cybercriminals to gain access even if they obtain your password. Implementing MFA wherever possible strengthens account security.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The CrowdStrike incident offers valuable lessons for anyone concerned with digital security, whether <a href=\"https:\/\/www.glasswire.com\/blog\/2023\/08\/10\/network-security\/\">managing a corporate network<\/a> or just trying to <a href=\"https:\/\/www.glasswire.com\/blog\/2023\/08\/10\/network-security\/\">protect the privacy<\/a> of their devices. It\u2019s a reminder that staying secure isn\u2019t just about being fast\u2014it\u2019s about being smart.&nbsp;<\/p>\n\n\n\n<p>Through careful threat detection, a solid response plan, and a balanced approach to updates, individuals can significantly strengthen their defenses against the persistent risks in our connected world.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CrowdStrike incident of 2024 sent shockwaves through the cybersecurity world, exposing weaknesses that resonate far beyond corporate walls.\u00a0 The [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1461,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CrowdStrike Incident, what can we learn - GlassWire Blog<\/title>\n<meta name=\"description\" content=\"The recent CrowdStrike incident paralized half of the world, including airports, banks and shopping centers. What can we learn from that?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CrowdStrike Incident, what can we learn - GlassWire Blog\" \/>\n<meta property=\"og:description\" content=\"The recent CrowdStrike incident paralized half of the world, including airports, banks and shopping centers. What can we learn from that?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/\" \/>\n<meta property=\"og:site_name\" content=\"GlassWire Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/glasswirelabs\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-02T12:54:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-02T12:54:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"GlassWire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GlassWire\" \/>\n<meta name=\"twitter:site\" content=\"@GlassWire\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GlassWire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/\"},\"author\":{\"name\":\"GlassWire\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e\"},\"headline\":\"What We Can Learn From the CrowdStrike Incident In Terms of Personal Security\",\"datePublished\":\"2024-09-02T12:54:39+00:00\",\"dateModified\":\"2024-09-02T12:54:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/\"},\"wordCount\":1225,\"publisher\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/\",\"url\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/\",\"name\":\"CrowdStrike Incident, what can we learn - GlassWire Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg\",\"datePublished\":\"2024-09-02T12:54:39+00:00\",\"dateModified\":\"2024-09-02T12:54:41+00:00\",\"description\":\"The recent CrowdStrike incident paralized half of the world, including airports, banks and shopping centers. What can we learn from that?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage\",\"url\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg\",\"contentUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg\",\"width\":1200,\"height\":540,\"caption\":\"CrowdStrike Incident\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.glasswire.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What We Can Learn From the CrowdStrike Incident In Terms of Personal Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#website\",\"url\":\"https:\/\/www.glasswire.com\/blog\/\",\"name\":\"GlassWire Blog\",\"description\":\"Free Firewall Software &amp; Network Monitor.\",\"publisher\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.glasswire.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#organization\",\"name\":\"Glasswire\",\"url\":\"https:\/\/www.glasswire.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png\",\"contentUrl\":\"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png\",\"width\":216,\"height\":60,\"caption\":\"Glasswire\"},\"image\":{\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/glasswirelabs\",\"https:\/\/twitter.com\/GlassWire\",\"https:\/\/www.instagram.com\/glasswireofficial\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e\",\"name\":\"GlassWire\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g\",\"caption\":\"GlassWire\"},\"url\":\"https:\/\/www.glasswire.com\/blog\/author\/glasswire\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CrowdStrike Incident, what can we learn - GlassWire Blog","description":"The recent CrowdStrike incident paralized half of the world, including airports, banks and shopping centers. What can we learn from that?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/","og_locale":"en_US","og_type":"article","og_title":"CrowdStrike Incident, what can we learn - GlassWire Blog","og_description":"The recent CrowdStrike incident paralized half of the world, including airports, banks and shopping centers. What can we learn from that?","og_url":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/","og_site_name":"GlassWire Blog","article_publisher":"https:\/\/www.facebook.com\/glasswirelabs","article_published_time":"2024-09-02T12:54:39+00:00","article_modified_time":"2024-09-02T12:54:41+00:00","og_image":[{"width":1200,"height":540,"url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg","type":"image\/jpeg"}],"author":"GlassWire","twitter_card":"summary_large_image","twitter_creator":"@GlassWire","twitter_site":"@GlassWire","twitter_misc":{"Written by":"GlassWire","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#article","isPartOf":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/"},"author":{"name":"GlassWire","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e"},"headline":"What We Can Learn From the CrowdStrike Incident In Terms of Personal Security","datePublished":"2024-09-02T12:54:39+00:00","dateModified":"2024-09-02T12:54:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/"},"wordCount":1225,"publisher":{"@id":"https:\/\/www.glasswire.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/","url":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/","name":"CrowdStrike Incident, what can we learn - GlassWire Blog","isPartOf":{"@id":"https:\/\/www.glasswire.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg","datePublished":"2024-09-02T12:54:39+00:00","dateModified":"2024-09-02T12:54:41+00:00","description":"The recent CrowdStrike incident paralized half of the world, including airports, banks and shopping centers. What can we learn from that?","breadcrumb":{"@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#primaryimage","url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg","contentUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2024\/09\/cs-80.jpg","width":1200,"height":540,"caption":"CrowdStrike Incident"},{"@type":"BreadcrumbList","@id":"https:\/\/www.glasswire.com\/blog\/2024\/09\/02\/crowdstrike-incident-what-can-we-learn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.glasswire.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What We Can Learn From the CrowdStrike Incident In Terms of Personal Security"}]},{"@type":"WebSite","@id":"https:\/\/www.glasswire.com\/blog\/#website","url":"https:\/\/www.glasswire.com\/blog\/","name":"GlassWire Blog","description":"Free Firewall Software &amp; Network Monitor.","publisher":{"@id":"https:\/\/www.glasswire.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.glasswire.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.glasswire.com\/blog\/#organization","name":"Glasswire","url":"https:\/\/www.glasswire.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png","contentUrl":"https:\/\/www.glasswire.com\/blog\/wp-content\/uploads\/2014\/08\/blog_logo2.png","width":216,"height":60,"caption":"Glasswire"},"image":{"@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/glasswirelabs","https:\/\/twitter.com\/GlassWire","https:\/\/www.instagram.com\/glasswireofficial\/"]},{"@type":"Person","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/56f7057bd6545d2f1ba3cd0ec227e62e","name":"GlassWire","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.glasswire.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/732e6d829a769e4368881a0fb03c869a436177240d4bcf9844decc6df73bde2c?s=96&d=blank&r=g","caption":"GlassWire"},"url":"https:\/\/www.glasswire.com\/blog\/author\/glasswire\/"}]}},"_links":{"self":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/1460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/comments?post=1460"}],"version-history":[{"count":1,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/1460\/revisions"}],"predecessor-version":[{"id":1462,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/posts\/1460\/revisions\/1462"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/media\/1461"}],"wp:attachment":[{"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/media?parent=1460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/categories?post=1460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.glasswire.com\/blog\/wp-json\/wp\/v2\/tags?post=1460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}