COMMENTARY
The now-infamous July CrowdStrike outage sparked international chaos and numerous conversations about vendor safety. Regardless of the business noise and myriad headlines in regards to the outage — and its potential value of greater than $5 billion to Fortune 500 corporations alone — there’s a greater image we should think about. And that’s how, as an business, we perceive the dangers concerned and reply to main outages and different cybersecurity crises.
Whereas the CrowdStrike outage was a freak accident, it is probably not the final time we’ll witness this type of meltdown from a serious know-how supplier. As our digital ecosystems change into additional interconnected and enterprises more and more put their belief in singular distributors, enterprise leaders must grapple with the inevitability of comparable occasions, whether or not from a easy outage or a malicious hack. In each case alongside that spectrum, nonetheless, these leaders should keep away from knee-jerk reactions that would in the end do extra hurt than good. Blindly switching to a brand new vendor or making drastic modifications to IT and safety processes might introduce safety holes that exacerbate vulnerabilities in a company’s general safety posture, moderately than enhancing it.
As a substitute of instantly leaping ship, listed below are the three issues corporations ought to do within the wake of a CrowdStrike-like occasion to make sure enterprise continuity and excessive operational requirements.
1. Assess Distributors’ Total Reliability and Threat
Switching distributors after an incident is not as easy — or as useful — as it might appear. Earlier than switching, companies should consider each the prevailing and potential vendor, and assess every vendor’s general reliability and danger. For example, Resilience buyer knowledge reveals that regardless of the July incident, CrowdStrike Falcon is very efficient. It has the bottom proportion of fabric claims of endpoint detection and response (EDR) distributors in Resilience’s portfolio, with fewer than 3% of purchasers with Falcon experiencing a cyber-insurance declare with losses. In fact, no firm can — or ought to — declare the flexibility to keep away from 100% of incidents, however in these sorts of deliberations, it is vital to place a vendor’s long-term monitor report into perspective. On the flip facet, nonetheless, if a vendor reveals a constant historical past of outages or vulnerabilities (as has VPN supplier Ivanti, of late), poor efficiency or communication, and lengthy delays in remediation, an incident might be the useful forcing consider contemplating the advantages of making an attempt one thing new.
It is also vital to notice the prices of switching distributors that transcend sticker value, comparable to implementation time, employees coaching prices, and adjusting workflows to include the brand new system and meet enterprise wants. These third-party danger issues should be thought of, with management weighing the enterprise interruption prices of an outage with the prevailing vendor towards the full prices that include making a change.
2. Keep away from Radical Adjustments to the Replace Course of
This explicit outage raised the problem of replace cadence and testing frequency, with many arguing that the affected organizations ought to have taken a extra cautious, thorough method to testing the replace earlier than rolling it out. However delaying updates is a calculated danger, and never essentially one that the majority corporations must be taking. Antivirus and EDR signatures are designed to counter quick-breaking, rising threats towards current programs, so when you can resolve to attend to permit the days or perhaps weeks it might take to totally take a look at the replace, chances are you’ll be leaving your programs susceptible to new exploits within the course of. Menace actors solely develop sooner and extra refined of their approaches, so fast safety updates are extra essential than ever. The danger of taking further precautions in testing might not be price it for each firm, particularly since most updates occur seamlessly. In spite of everything, a part of the explanation CrowdStrike made headlines was as a result of the outage was so out of the abnormal.
In an ideal world, the place unhealthy actors weren’t a constant risk and replace processes took no additional time, following the everyday greatest apply of testing every replace that comes from every vendor may be possible. However in the actual world, modifications to the replace course of are more likely to decelerate your defenses. Finally, there is no such thing as a one-size-fits-all reply, and the perfect method will depend upon the precise group and its danger tolerance.
3. Do not Panic
It is tempting to liken incidents like CrowdStrike to pure disasters (comparable to catastrophic hurricanes), however that oversimplification distracts from the center of the problem. Whereas many insurers use this analogy to explain cyber occasions, it is neither correct nor helpful, because it turns into an apples-to-oranges comparability that frames cyber incidents or outages as one-sided and world-ending. However the actuality is way completely different. There is not any tangible manner for people to forestall or mitigate the depth of class hurricanes or tornadoes, however there are definitely easy, actionable steps we will take to mitigate the monetary impression of an outage or counteract the adverse results of a possible assault. This consists of implementing correct cyber hygiene, transferring monetary danger by cyber insurance coverage, and having an in depth cybersecurity motion plan within the occasion of an assault or outage. It isn’t solely possible however important that corporations take these steps to stay operable and functioning within the midst of an incident.
Briefly, decision-makers throughout the board cannot enable themselves to make reactive or fear-based choices on their safety posture straight following a cyber incident. These knee-jerk reactions might result in higher issues and introduce a bunch of latest vulnerabilities simply ready to be exploited. As a substitute, leaders should concentrate on understanding the foundation explanation for the incident, studying from it, and making risk-driven choices that mitigate the best monetary loss and enhance their group’s general cyber resilience. This consists of taking a proactive method and incorporating third-party danger administration into enterprise continuity planning. That manner, you can keep away from catastrophic interruptions to your day-to-day enterprise and preserve continuity and resilience within the face of a cyber incident.