When the CrowdStrike outage took down millions of computers worldwide, it exposed how vulnerable even top security providers can be. Therefore, the lesson is clear: proactive cybersecurity for small businesses isn’t optional — it’s essential. Taking a preventative approach can help you stay resilient when global disruptions strike.
A Proactive Approach to IT at Shropshire Computers
At Shropshire Computers, we have always taken a proactive approach to IT, which is why we’ve been implementing new processes to reduce risks and provide the best service possible.
Implementing NinjaOne to Strengthen Cyber Defences
We have begun rolling out software from a company called NinjaOne (NinjaRMM), which is widely used by IT providers and has impressed us with its flexibility. We can customise how it is implemented within our clients’ businesses.
Strengthening Local Admin Security and Compliance
For example, we’ve set up a script that secures local administrator accounts on desktops and laptops by disabling manually created accounts that are no longer relevant.
The script creates a Shropshire Computers local admin and a customer-specific local admin account. This means users can’t install software or run anything without entering the local admin credentials — a vital safety precaution and a Cyber Essentials requirement.
We now recommend NinjaOne to all our customers and view it as important as antivirus software.
Smarter Update and Restart Policies for Stability
Modern cybersecurity policies are all about not trusting new software or processes until they’re verified. In contrast, older approaches assumed everything on the network was safe — a risky mindset now that most networks include remote workers and cloud-based systems.
We’ve also introduced a new policy prompting users to restart their computers weekly if Windows, Microsoft Office, or Google Chrome updates are pending.
Following industry recommendations, we now delay non-critical feature updates to give Microsoft time to resolve issues, while critical security patches are still applied immediately.
Lessons Learned from the CrowdStrike Outage
The CrowdStrike outage happened because a security software company pushed out an update without proper testing. Once it occurred, Windows could only be recovered through safe mode and manual file removal — a time-consuming process.
To help prevent similar issues, we’ve enabled the F8 menu to appear for five seconds before Windows loads, allowing fast access to safe mode if anything goes wrong.
Having this option, along with better visibility and automation, means we can detect and fix problems more efficiently.
Building a Comprehensive Cybersecurity Strategy
Our comprehensive cybersecurity plan includes:
- Regular security assessments to identify vulnerabilities
- Implementation of advanced threat detection tools
- Employee awareness and training
- Clear incident response protocols
By being proactive rather than reactive, businesses can significantly reduce the likelihood of a cyberattack.
The Importance of Data Backup and Recovery
Data backup and recovery planning are essential components of risk management. In the event of a cyberattack or data breach, a reliable backup system can mean the difference between a minor inconvenience and a catastrophic loss.
Partnering with Experts for Long-Term Protection
By partnering with a reputable IT service provider, businesses gain access to the expertise, tools, and monitoring needed to keep systems secure and resilient.
The CrowdStrike incident highlights that no business is completely immune to IT risks — but with a proactive approach to cybersecurity, you can dramatically reduce your exposure and protect operations from disruption.
Ready to Take a Proactive Approach? Let’s Talk
If you’d like to find out more about our services, get in touch with the team today.
Call: 01952 453173
Email: info@shropshirecomputers.com


