Security

Steps to Take During the CrowdStrike Outage

As organizations work to remediate affected systems, it's crucial to stay alert to phishing campaigns and spoofed domains set up by threat actors attempting to exploit the outage.

CrowdStrike's Remediation Measures

CrowdStrike has provided a solution utilizing the Falcon sensor’s built-in quarantine functionality to remove the problematic channel file causing Windows systems to crash. According to CrowdStrike, when a Windows system with Falcon installed contacts the CrowdStrike Cloud, a request is issued to quarantine the faulty file, visible in the Falcon UI. If the file does not exist, no quarantine occurs, and systems operate normally. The solution may require two or three reboots to take effect due to a timing issue between the file's quarantine and activation. For best results, CrowdStrike recommends using a wired network connection to minimize latency.

FTC to Investigate Data Privacy Practices of U.S. Car Dealerships

FTC to Investigate Data Privacy Practices of U.S. Car Dealerships

The Federal Trade Commission (FTC) has announced plans to investigate the data privacy practices of car dealerships across the United States. This initiative represents a significant expansion of the FTC's oversight into an industry that has traditionally operated with less regulatory scrutiny compared to others.

CrowdStrike Update Causes Global IT Outage and Security Concerns

On July 19, 2024, at approximately 1:00 a.m. ET, a widespread IT outage began due to a defect in a single CrowdStrike content update. This outage affected numerous Windows hosts globally, including critical U.S. State, Local, Tribal, and Territorial (SLTT) government systems. CrowdStrike has since isolated the issue and deployed a fix.

Recap of the Microsoft Outage on July 19th, 2024: Essential Insights for Businesses

Recap of the Microsoft Outage on July 19th, 2024: Essential Insights for Businesses

Major Software Outage on July 19th, 2024

On July 19th, 2024, a significant software glitch caused major disruptions for businesses worldwide. This outage affected Microsoft 365 services, including essential applications like Outlook, Teams, and OneDrive, leading to substantial challenges across various industries. As a Managed Service Provider (MSP), we understand the importance of staying informed and prepared for such events. Here’s a detailed look at what happened, who was impacted, and the current status.

Strengthen Your Business's Cybersecurity with a Virtual CISO

In today's digital landscape, cyber threats are a significant concern for businesses across all sectors. From financial institutions and manufacturers to healthcare providers and legal firms, safeguarding sensitive data is paramount. A virtual Chief Information Security Officer (vCISO) can be a crucial component of your cybersecurity strategy, offering expertise on a flexible, part-time, or project-based basis. This cost-effective solution is ideal for businesses that do not require a full-time security leader. Here are five key ways a vCISO can help secure your data:

US Department of Energy Unveils Energy Supply Chain Security Principles

 US Department of Energy Unveils Energy Supply Chain Security Principles

The US Department of Energy (DOE) has released a comprehensive set of Supply Chain Cybersecurity Principles. These guidelines aim to ensure robust cybersecurity measures across the global supply chains involved in constructing energy automation and industrial control systems (ICS).

The Hidden Costs of Skimping on Security: Protect Your Business

The Hidden Costs of Skimping on Security: Protect Your Business

As a business leader, you're always looking for ways to increase revenue, cut expenses, and grow your bottom line. Implementing AI tools, optimizing services, and running a more efficient operation are excellent strategies to achieve this. However, one area where you should never cut corners is using free antivirus or firewall software.

Understanding and Mitigating Business Risks

Understanding and Mitigating Business Risks

Operating a business inevitably involves facing various risks. The impact of an unexpected incident can be substantial, particularly if you're unprepared. The key to navigating these challenges lies in your preparedness. Timely response, minimizing operational disruption, and managing costs effectively are all critical factors. However, the first step is understanding the types of risks you may encounter. Here, we outline the seven types of business risk and strategies to prepare for them.

Protect Your Dental Practice and Patients from Cybercriminal Attacks

Protect Your Dental Practice and Patients from Cybercriminal Attacks

The American Dental Association (ADA) is calling on all dental practices, especially oral and maxillofacial surgeons, to remain vigilant against cyberattacks. On May 6, 2024, the FBI informed the ADA and the American Association of Oral and Maxillofacial Surgeons (AAOMS) of a credible cybersecurity threat targeting these practices.

Enhance Your Compliance Strategy with Cyber Insurance

Enhance Your Compliance Strategy with Cyber Insurance

In today's digital age, a robust cybersecurity posture is no longer optional—it's a business imperative. Compliance with data security regulations has become a critical concern for business owners across various industries. But what happens when a cyberattack breaches your defenses, exposing sensitive data and potentially jeopardizing your compliance status? This is where cyber insurance steps in as a vital component of your overall compliance strategy.

10 Essential Practices of Top IT Providers

 10 Essential Practices of Top IT Providers

What distinguishes high-quality, reliable IT support from mediocre or substandard service? Is it lower prices? Flat-fee service? At Vector Choice, we believe that several key factors set great providers apart from the rest. When our clients switch to us, we often hear the same feedback: they didn't realize their previous support was subpar until they experienced excellent service.

9 Cybersecurity Risks and Preparation Strategies

 9 Cybersecurity Risks and Preparation Strategies


Cybersecurity risks come in many forms, and recognizing the types of threats your organization is likely to face is crucial. This knowledge not only aids in planning effective responses but also helps in proactively defending against these threats. This brief primer outlines the top 9 types of cybersecurity risks and provides guidance on how to respond to common incidents, including the fundamentals of an effective and comprehensive cyber incident response plan.

AT&T Data Breach: 73 Million Customer Records Exposed on Dark Web

AT&T Data Breach: 73 Million Customer Records Exposed on Dark Web


In a recent statement, AT&T, the largest telecommunications company in the United States, disclosed the discovery of a dataset for sale on the dark web containing information on approximately 7.6 million current AT&T account holders and 65.4 million former users, affecting a total of about 73 million accounts.

6 Key Benefits of Providing Cybersecurity Training for Employees

6 Key Benefits of Providing Cybersecurity Training for Employees

How to Choose the Right Cybersecurity Program for Your Business

Regardless of the number of cybersecurity professionals your organization employs, preventing data loss, breaches, and malware events is a shared responsibility across all departments. Regular education is essential to ensure employees understand and take this responsibility seriously. Effective cybersecurity training covers regulatory expectations, data protection, and incident response planning. Here's how to choose the right training and simulations for your business.

Enhancing Your Defense with SIEM, SSO, and MFA

 Enhancing Your Defense with SIEM, SSO, and MFA

In today's dynamic cybersecurity landscape, businesses must adopt a multi-faceted strategy to safeguard their critical data and systems. Let's delve into three indispensable tools that synergize to fortify your organization's security posture: Security Information and Event Management (SIEM), Single Sign-On (SSO), and Multi-Factor Authentication (MFA).

Beware Whaling Attacks: Safeguard Your Business Against High-Level Threats

 Beware Whaling Attacks: Safeguard Your Business Against High-Level Threats

In the vast expanse of cyber threats, whaling attacks stand out as targeted assaults aimed at the highest echelons of your organization. These sophisticated scams employ social engineering tactics to deceive executives and other senior staff into divulging sensitive data or initiating unauthorized actions. As an MSP, we recognize the critical importance of fortifying your business against such threats. Here's why vigilance against whaling attacks is paramount.

Unraveling the Causes Behind 60% of Data Backup Failures During Critical Business Needs

Source: Vector Choice - URS Preferred Partner

The Need for Robust Data Backup: Insights and Best Practices

In today's digital landscape, businesses face various threats to their data integrity, ranging from natural disasters to cyber-attacks and human error. As highlighted by Avast's recent findings on disaster recovery, small and medium-sized businesses (SMBs) are particularly vulnerable, with 60% of data backups failing to fully succeed. Even more concerning is the fact that half of the attempts to recover data from these backups are unsuccessful, resulting in an average downtime of 79 minutes, costing roughly $84,650 for every hour of disruption.

Understanding the Common Causes of Backup Failures:

1. Reliability of Backup Products: The adage "you get what you pay for" holds true in the realm of backups. Free or inexpensive solutions may lack the robust features needed for secure and reliable data backup.

2. Suboptimal Backup Timing: Poorly scheduled backups, especially during peak traffic periods or when data is being heavily modified, pose a risk of incomplete data capture.

3. Compatibility Issues: As businesses evolve, so do their systems and software. However, new systems may not always be fully compatible with existing backup solutions, leading to data saving and restoration challenges.

4. Human Error: Incorrectly configured backup parameters, accidental file deletions, and oversight of backup schedules and alerts can contribute to backup failures.

The Importance of Effective Data Backup and Restoration:

In light of these challenges, implementing best practices for data backup and restoration is crucial for ensuring business continuity and mitigating risks:

1. Choose a Reliable Backup Solution: Avoid blindly opting for well-known backup software brands. Instead, conduct thorough research to identify a solution that aligns with your business needs. Consider factors such as data recovery speed, downtime implications, and compliance requirements, especially in regulated industries like healthcare.

2. Adhere to the 3-2-1 Backup Rule: Embrace the industry-standard 3-2-1 backup rule, which recommends maintaining three copies of data in two different formats, with one copy stored off-site. This approach minimizes the risk of data loss in case of a catastrophic event.

3. Monitor Backup Status Daily: Ensure that someone within your organization, whether yourself or a designated IT team member, checks the backup status daily. Promptly address any incomplete backups to avoid potential data loss.

4. Conduct Regular Restore Tests: Regularly conduct simulated data restoration exercises to verify the integrity and effectiveness of your backup system. This proactive approach ensures that your backups are functional and can be relied upon in times of crisis.

In conclusion, data backups are not a "set and forget" task but a critical aspect of business continuity planning. By implementing robust backup solutions and adhering to best practices, businesses can safeguard their data against unforeseen disruptions and minimize the impact of potential disasters.

To learn more Contact us

Top Strategies and Tools for Effective Cyber Risk Management

Top Strategies and Tools for Effective Cyber Risk Management

To effectively manage cyber risks, businesses must adopt a proactive stance towards cybersecurity, starting with a comprehensive understanding of their cyber risk landscape. Cyber risk assessment plays a critical role in this process, enabling organizations to identify, evaluate, and prioritize potential threats and vulnerabilities. In this Q&A session, we delve into the core principles of cyber risk management and explore the available tools for assessing and mitigating these risks.

Three Cybersecurity Misconceptions That Pose Risks to Your Business in the Current Year

Navigating the dynamic realms of technology and cybersecurity, businesses often grapple with a maze of misconceptions and outdated notions. Yet, failing to discern between myth and reality can expose your business to significant security risks.

Drawing from expert insights, including findings from CompTIA's 2024 global State Of Cybersecurity report, we'll debunk three prevalent misconceptions that could jeopardize your success in 2024.

Decoding the NYDFS Cybersecurity Regulation: Essential Compliance Insights

Decoding the NYDFS Cybersecurity Regulation: Essential Compliance Insights

The NYDFS Cybersecurity Regulation (23 NYCRR 500) represents a comprehensive framework established by the New York Department of Financial Services (NYDFS) to impose cybersecurity standards on all covered financial entities. Introduced on February 16th, 2017, following extensive feedback from industry stakeholders and the public, these regulations encompass 23 sections delineating the obligations for developing and executing an effective cybersecurity program. Covered institutions are mandated to assess their cybersecurity risks and devise proactive strategies to mitigate them. The regulation follows a phased implementation approach, allowing organizations ample time to fortify their policies and controls.