Skip to content
Icon of an orange flame next to a brick wall on a white background, symbolizing firewall protection and robust IT support.

CrowdStrike Incident Statement July 19 2024

CrowdStrike Incident Statement July 19 2024

Dear DAG Tech,

Today has been a roller coaster for many in the IT world due to a critical incident affecting organizations using the CrowdStrike Falcon agent. This CrowdStrike incident statement, which caused crashes and blue screen errors (BSOD) on Windows Virtual Machines (VMs), laptops, and desktops, started at approximately 19:00 UTC on July 18, 2024. However, we are pleased to inform you that DAG Tech clients were completely unaffected.

What's happening with the CrowdStrike incident: When a software update turns into a cyber crisis

Why Our Clients Were Unaffected:

  • SentinelOne Security: At DAG Tech, we’ve chosen to leverage SentinelOne for our cybersecurity solutions, recognizing its industry-leading capabilities in threat detection, prevention, and response. SentinelOne offers cutting-edge AI-driven protection, allowing for real-time monitoring and autonomous response to threats as they arise. This ensures that your Windows systems are not only protected from current vulnerabilities but also from evolving and emerging threats. Whether it’s ransomware, malware, or zero-day exploits, SentinelOne’s adaptive technology identifies and neutralizes these risks before they can compromise your systems. By using SentinelOne, we provide robust, all-encompassing security to maintain the reliability, performance, and integrity of your critical operations.
  • Proactive Monitoring: Cybersecurity is not just about deploying a solution—it’s about maintaining vigilance. Our dedicated team of security experts goes beyond traditional monitoring, implementing a proactive approach to managing and securing your IT infrastructure. We continuously monitor all security solutions, including SentinelOne, ensuring your systems are up-to-date with the latest security patches, threat intelligence, and system optimizations. Our experts perform regular testing, vulnerability assessments, and proactive issue resolution to identify and mitigate potential risks before they impact your business. With 24/7 oversight, we anticipate security threats and handle them before they become critical issues, so your systems remain secure and your team can focus on what they do best.
  • Incident Response Strategy: In the event of a cybersecurity incident, having a swift and effective response is crucial to minimizing damage and downtime. At DAG Tech, we have developed a comprehensive incident response strategy that not only detects threats in real-time but also provides immediate countermeasures. Our strategy includes predefined protocols for containment, eradication, and recovery, ensuring that threats are neutralized as quickly as possible. In addition to this, we implement robust backup processes that guarantee the integrity of your data. Regular backups are securely stored and readily accessible, allowing for rapid recovery in the case of an attack or system failure. With these measures in place, we minimize business disruption, enabling your operations to continue smoothly while we restore systems to full functionality.

We remain committed to providing top-tier security and service. If you have any questions or need further assurance, please reach out to our support team.

Thank you for your continued trust in DAG Tech.

Best Regards,

DAG Tech

Back To Top
Search