- Forget AirTag: This Bluetooth tracker is my top pick for both iPhone and Android users
- This midrange robot vacuum cleans as well as some flagship models - and it's 50% off
- You may qualify for Apple's $95 million Siri settlement - how to file a claim today
- This 3-in-1 robot vacuum kept my floors clean all season, and it's priced to compete
- I changed 6 settings on my Roku TV to give it an instant performance boost
Early IT takeaways from the CrowdStrike outage

For those who have machines back up and recovered post-CrowdStrike, there are certain items you should review. First is consider reissuing Bitlocker recovery keys. If you handed out the recovery key manually, consider reissuing and rotating keys.
If you are considering changes to your infrastructure, rather than ripping out your technology and replacing it with a different operating system, consider the alternative of changing how you deploy software and restrict what software is allowed to run on these special-purpose machines. We use antivirus because we don’t have a limit on what we allow to run on our systems. If we spent the time and resources limiting what is allowed to run, machines would be more secure.
Of course, you do need to reconsider what operating system is used for what purpose. We’ve seen too many social media posts of bluescreens on what are merely overgrown notification screens. Do you truly need a full operating system to merely provide information? Or are there alternative ways that you can provide that same information?