General

A Deep Dive Into Microsoft’s CrowdStrike Global IT Outage

24 July 2024

On July 18th 2024, the digital world descended into chaos as Microsoft experienced a global IT outage. 

As one of the largest IT outages in history, thousands of businesses and institutions around the world were knocked offline. From airports to healthcare institutes to offices and railways, the Microsoft outage has led to widespread disruptions and delays across the world. 

Cyber-security firm CrowdStrike has admitted that the issue was caused by an update to its software. However, the impact of this seemingly small error has resulted in much frustration and massive headaches for IT departments on a global scale. 

In this article, we will be covering the Microsoft outage, what caused it and how it has affected the daily lives of thousands of people. 

Let’s begin!

Breaking Down the Microsoft Global IT Outage

On Thursday, Microsoft experienced a global outage due to an issue with CrowdStrike’s Falcon Sensor software, triggering the ‘Blue Screen of Death’ on many Windows PCs. 

The Microsoft Global IT outage is a major IT issue that caused massive disruption to transport, businesses, healthcare and various other sectors around the world. This dilemma has resulted in several flights being grounded or cancelled, with endless queues and delays at many airports. 

Many cybersecurity experts have taken to calling the CrowdStrike outage the ‘largest IT outage in history’ and compared it to the Y2K bug but with a much heavier and more damaging impact. 

The Blue Screen of Death

Many PC users are aware of the various error messages that can result in panic and frustration. However, those of us who have come face-to-face with the Windows Blue Screen of Death (BSoD), understand the concern of users seeing it appear worldwide. 

The Blue Screen of Death (BSoD) is an error message screen on Windows PCs that halts all operations to display an error message. This error occurs when your system encounters a major issue, leading to unexpected restarts and even potential data loss. 

More often than not, a BSoD is prompted by hardware or software issues, however, it is not the easiest thing to resolve. While CrowdStrike claims to have identified and fixed the disastrous update, many devices remain non-operational. 

What Caused the IT Outage?

The question on everyone’s mind is, what caused this disastrous tech catastrophe?

According to the president of CrowdStrike, George Kurtz, the global IT outage was caused by a “defect found in a single content update for Windows hosts”. He goes on to confirm that this is neither a security incident nor a cyberattack and reassures the public that the issue has been identified, isolated and a fix has been deployed. 

While it may appear extreme that a piece of cybersecurity software was able to cause such widespread damage, it is important to remember that these products are deeply integrated into the inner workings of computer networks. This allows them complete access to all the inner workings of an IT system so they can operate it effectively and keep guard against any malicious attacks. 

What Is CrowdStrike?

CrowdStrike is a US cybersecurity firm based in Austin, Texas and its Falcon Sensor software is designed to protect IT systems from cyber-attacks

Similarly to many modern technology companies, CrowdStrike has not been around for very long. Founded a mere 13 years ago, it has grown to employ almost 8,500 people. 

However, in an almost ironic series of events, this time a firm that is normally part of the solution to IT problems, is instead the point of origin. 

The CrowdStrike outage serves as a reminder of the fragility of our modern digital infrastructure, demonstrating how a company that is not exactly a household name can be at the heart of a global tech crisis. This reinforces the importance of having data backups and several lines of defence to mitigate the impact for your business. 

Who Has Been Affected?

The Microsoft global IT outage had a widespread impact and affected various platforms such as Microsoft 365, Amazon Web Services, Azure and even social media platforms like Instagram and eBay. 

On a worldwide scale, airports and air travel were particularly badly hit with at least 1,400 flights being cancelled and several other flights being delayed. Similarly, many railway companies across the UK have reported delays and widespread IT issues.

Payment systems were also impacted forcing many shops to conduct cash-only transactions. London cabbies were left struggling to take card payments while supermarkets including Waitrose and Morrisons were unable to accept contactless payments. 

Healthcare was another sector that was badly affected with many GP practices facing trouble booking appointments, accessing patient records and viewing test results. Even broadcasters, including Sky News, were caught up in the technical chaos and spent several hours off air. 

As a result of the global IT outage, CrowdStrike’s shares are reportedly down by more than 20% in pre-marketing trading, equalling a loss of over £12.3bn in value. 

Many cybersecurity experts believe that although a software fix is now available, it will take a huge amount of work to get all computer devices up and running again. 

Despite the serious nature of this international predicament, users took to social media to joke about the early weekend arrival. With the hashtag #MicrosoftOutage trending, many shared memes and humorous takes on the situation. One user joked, “Looks like the weekend started early thanks to Microsoft!”

Contact Redpalm For Comprehensive IT Security Services! 

While the Microsoft global IT outage may have occurred due to an error on the part of a cybersecurity firm, cybersecurity services are still a necessity if you wish to protect your networks from cyber-attacks and data breaches. 

Redpalm is an MSP that provides professional IT support paired with the latest cybersecurity solutions to safeguard your IT systems. With years of knowledge and expertise, our team of IT experts are well-equipped to identify and mitigate any risks on an immediate basis. 

We also offer services like vulnerability assessments, technology procurement, incident response, IT audits and health checks and so much more!

To learn more about our services, click here or contact us to schedule an appointment today!

Latest From The Blogs

supply chain cyber security, Redpalm's expert evaluating security threat analysis
Cyber Security

How to Vet Your Supply Chain – A Cyber Security Checklist for SMEs

Supply chain cyber security is about managing the risks posed by third-party suppliers who have access to your systems or data. Businesses should prioritise high-risk suppliers, assess access and data handling, verify security standards with evidence, and apply proportionate controls with regular reviews to reduce the likelihood and impact of supplier-led cyber incidents. Call Redpalm to protect your business from supply chain risks today.

Read More
Cyber Security

Our Top 4 Cyber Security Trends to Watch Out for in 2026

With several businesses adopting online strategies and moving the bulk of their operations online in the past few years, implementing robust cyber security measures has become essential to reducing operational and data risks.

Read More
cloud migration mistakes, Redpalm's experts working from their headquarters
Cyber Security

4 Cloud Migration Mistakes Managed IT Services Help You Avoid

Cloud migrations commonly fail due to weak planning, unmanaged security and compliance risks, unoptimised lift and shift approaches, and a lack of post-migration oversight. Addressing these issues through structured strategy, workload optimisation, and ongoing cost and security management reduces disruption, controls spend, and ensures cloud environments support long-term business operations. Call us to learn more about our cloud services today.

Read More
choosing it supplier, engineering team in the server room viewing a security breach alert
Uncategorized

The Real Cost of Choosing the Wrong IT Supplier

Selecting the wrong IT supplier can lead to significant financial, operational, and strategic challenges. Poor decisions can lead to system failures, overspecified or misaligned solutions, productivity loss due to inadequate support, and limited scalability. Strategic supplier selection ensures reliable systems, efficient workflows, and flexible technology that support long-term business growth and continuity.

Read More
cyber risk ownership board UK, 3 professionals gathering around a laptop in a sleek office setting
Cyber Security

Who Owns Cyber Risk in Your Business? A Guide for UK Boards

Read More
it outsourcing regulated sectors, close-up image of a businessman holding a tablet with an abstract sketch of digital regulation
Hybrid IT

What Regulated UK Industries Should Know About IT Outsourcing

Regulated sectors rely on IT outsourcing to maintain compliance, secure sensitive data, and keep essential systems running reliably. Financial services, healthcare, legal, and manufacturing organisations use external expertise to reduce risk, strengthen continuity, and manage complex infrastructure. Effective outsourcing supports operational demands while meeting strict regulatory obligations across specialised industries.

Read More
hybrid IT workload placement, two system managers in a server room
Hybrid IT

How to Create the Right Hybrid IT Workload Placement Strategy

Hybrid IT workload placement involves assigning applications and data to the most appropriate environment, such as cloud, on-premises or edge, based on factors like performance, latency, compliance and cost. A structured framework helps avoid common pitfalls, including vendor lock-in and poor scalability, enabling IT teams to make informed, secure and flexible infrastructure decisions.

Read More
ai threats cyber security, close up shot of a notebook used by IT professionals to run AI software
Cyber Security

Why AI-Generated Threats Are Outsmarting Old-School Security Controls

AI-driven cyber threats now use deepfakes, adaptive malware, and autonomous tools to bypass legacy defences. UK businesses are increasingly targeted, with reported breaches involving AI impersonation and data extraction. Traditional controls can’t keep up with these evolving threats. Effective protection requires AI-assisted detection, multi-layered strategies, and external support from cyber-focused managed service providers.

Read More
IT outage disaster recovery plan, a person working on a laptop in a data centre
Cyber Security

Can You Recover from a Major IT Outage in Under 2 hours?

If you don’t have a disaster recovery plan for your business yet, you might still have key questions about disaster recovery plans. Is it possible to recover from a major IT outage in 2 hours in the UK? Can any plan be strong enough to allow for a 2-hour IT recovery? These are the questions that we’ll be addressing in this blog. We’ll explain what fast disaster recovery in the UK looks like and how you can plan to quickly resolve your issues.

Read More
Cyber Security

Is Your Business Ready for the End of Windows 10 Support?

In this blog, we’ll explain what the end of Windows 10 support means for businesses, covering the risks, technology challenges, and how your business can stay secure with the right support.

Read More