Close Menu
    Trending
    • Reinforcement Learning in the Age of Modern AI | by @pramodchandrayan | Jul, 2025
    • How This Man Grew His Beverage Side Hustle From $1k a Month to 7 Figures
    • Finding the right tool for the job: Visual Search for 1 Million+ Products | by Elliot Ford | Kingfisher-Technology | Jul, 2025
    • How Smart Entrepreneurs Turn Mid-Year Tax Reviews Into Long-Term Financial Wins
    • Become a Better Data Scientist with These Prompt Engineering Tips and Tricks
    • Meanwhile in Europe: How We Learned to Stop Worrying and Love the AI Angst | by Andreas Maier | Jul, 2025
    • Transform Complexity into Opportunity with Digital Engineering
    • OpenAI Is Fighting Back Against Meta Poaching AI Talent
    AIBS News
    • Home
    • Artificial Intelligence
    • Machine Learning
    • AI Technology
    • Data Science
    • More
      • Technology
      • Business
    AIBS News
    Home»Technology»How pen and paper comes to the rescue in an IT crisis
    Technology

    How pen and paper comes to the rescue in an IT crisis

    Team_AIBS NewsBy Team_AIBS NewsDecember 24, 2024No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Getty Images A woman in sunglasses sits on a baggage trolley in a check-in line at Hong Kong International Airport on July 19, 2024. Getty Pictures

    In July a botched software program replace triggered chaos for the airline trade worldwide

    When the CrowdStrike software program bug bricked 8.5 million computers world wide on 19 July, a few of the first folks to note the consequences have been air travellers.

    Anthony Bosman, an educational at Andrews College in Michigan was making an attempt to board his flight from Michigan to Florida when he realised he couldn’t obtain a cell boarding move to his smartphone.

    So he went to verify in on the airport, in particular person, and watched in amazement as an airline worker seemed up his identify on a paper record after which wrote out his boarding move – by hand.

    “It felt like a blast from the previous,” he recollects. “The ticket agent, I bear in mind how she commented that her hand was drained from having to write down so a lot of them.” His flight took off as deliberate.

    A number of different passengers, together with many in India, reported having the identical expertise that day.

    The CrowdStrike bug additionally hit banks, telecoms companies, well being providers and on-line retailers.

    This week a senior government on the agency appeared before a US congressional committee and mentioned he was “deeply sorry” for the chaos triggered.

    For a short second in July, some organisations needed to neglect about their computer-based processes and do issues the old style means.

    Should you look by means of articles about previous cyber-attacks and IT failures on the BBC Information web site, you’ll discover numerous examples of organisations which have needed to “return to pen and paper” within the face of disruption.

    British GPs, staff at foreign exchange firm Travelex, medics at Rouen hospital in France and employees of Lincolnshire County Council have all skilled this.

    It sounds an virtually pitiful predicament. And but, whereas it actually isn’t fascinating, some cyber-experts are actually advising firms to plan for switching to paper-based processes within the occasion of IT failure.

    Fairly than an advert hoc workaround, pen and paper techniques may very well be one thing employees practise utilizing sometimes in order that they’ll change away from their computer systems seamlessly if required.

    Norsk Hydro Staff at Norsk Hydro crowd around a small desk. Two are working with pens and paper, another is on a laptop.Norsk Hydro

    When Norsk Hydro was hacked in 2019 hundreds of employees have been locked out of the corporate techniques

    One firm that is aware of the worth of paper is Norsk Hydro, a Norwegian aluminium and renewable vitality agency.

    In 2019, hackers targeted Hydro with ransomware that locked employees out of greater than 20,000 computer systems. Bosses at Hydro determined they might not pay a ransom charge to revive entry, which means that 35,000 employees working throughout 40 international locations needed to discover different methods of doing their jobs, briefly.

    They dug outdated binders out of basements with directions on how one can produce explicit aluminium merchandise, as an example, recollects Halvor Molland, a spokesman for Hydro. At some areas, by sheer probability, employees had printed out order requests simply earlier than the cyber-attack hit.

    “Their creativity… was great,” says Mr Molland. Whereas computer systems with buyer info and firm knowledge have been locked out, manufacturing facility gear was mercifully unaffected by the ransomware. At some amenities, employees purchased computer systems and printers from native retailers so they might print off info for manufacturing facility employees. And classic workplace equipment got here in helpful. “We really needed to mud off some outdated telefaxes,” remembers Mr Molland.

    Though manufacturing fell by as much as 50% at sure crops, these workarounds saved the enterprise going. “You could do what it’s essential do,” as Mr Molland places it. Reflecting, he means that firms may need to maintain printed copies of key info akin to inside phone numbers or checklists in order that some work can proceed even within the occasion of an enormous cyber-attack.

    Norsk Hydro Appearing confused two factory staff look at paperwork at a Norsk Hydro plantNorsk Hydro

    For some duties Norsk Hydro needed to work off paper directions after the hack

    “Folks have realised the significance of getting these handbook strategies due to the severity of a few of the current cyber-attacks and IT outages,” says Chris Butler, resilience director at catastrophe restoration and enterprise continuity agency Databarracks.

    He mentions one buyer his firm works with – an industrial distribution agency – that has put collectively “catastrophe restoration packs” and despatched them to all of its branches. The packs embrace paper varieties and a fax machine – a contingency in case their digital ordering system turns into unavailable. “If that goes down, their solely various, they realised, was to have these varieties.”

    Mr Butler means that firms have a coaching day the place staff practise utilizing flipcharts and whiteboards as an alternative of computer systems, to see if they’ll nonetheless do their jobs successfully that means.

    Some organisations suggest utilizing paper for safety causes. Elements of the US courtroom system require sure paperwork to be filed on both paper, for instance, or a safe system akin to an encrypted USB drive.

    Clearly there are limits to paper-based processes. Mr Butler notes that if bankers, for instance, lose entry to their buying and selling terminals throughout an IT incident, they’ll’t simply change to paper-based alternate options.

    The largest downside with pen and paper techniques is that they don’t scale effectively, says Gareth Mott, from the Royal United Providers Institute. It’s slower than utilizing a pc for a lot of duties ,and it’s laborious or maybe not possible to coordinate hundreds of staff utilizing such strategies throughout a number of workplace areas.

    However practising workarounds actually can assist, provides Dr Mott. He and colleagues have researched how “war-gaming” and IT failure roleplay workout routines can influence staff’ responses to real-life cyber-attacks. “We discovered that the businesses that had completed that, generally a number of weeks earlier than they’d a dwell incident, actually benefitted,” he says.

    It’s not simply pen and paper that would turn out to be useful. Dr Mott is conscious of 1 agency that purchased “crates price of Chromebooks” for workers within the wake of a cyber-incident, in order that they might work with no need entry to the corporate community.

    Some firms might need dormant WhatsApp or Sign messaging teams that they’ll ask staff to make use of for inside communications, if entry to the corporate electronic mail servers goes down, as an example.

    Each Dr Mott and Mr Butler stress the significance of off-site or in any other case segregated knowledge backups in order that, within the occasion of a ransomware assault, all that very important info is just not essentially misplaced.

    Extra Expertise of Enterprise

    Cathy Miron is chief government of eSilo, an information backup agency based mostly in Florida. There are a whole lot of such firms world wide, together with Databarracks, that present safe knowledge backup providers.

    Ms Miron’s firm affords off-site, cloud-based knowledge storage on a separate community to that of their prospects; and on-site, custom-built servers as effectively. “We have now had a 100% ransomware restoration fee up to now,” she says.

    For all of the sophistication of up to date pc techniques, it’s the easy, improvised workarounds that may save firms when a disaster hits. Mrs Miron mentions one buyer who, on the time of writing, was utilizing a Verizon mi-fi, or mobile broadband wireless router, system to entry backup knowledge as a result of their foremost pc community had been fully shut down following a cyber-incident.

    “You must count on it, in some unspecified time in the future in time, to be a sufferer of a cyber-attack,” emphasises Mr Molland. “What do you do within the meantime? How do you retain the wheels turning?”



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhy Startup Founders Need to Look Beyond Traditional Funding
    Next Article How the Age of Generative AI is Changing a CISOs Approach to Security
    Team_AIBS News
    • Website

    Related Posts

    Technology

    Transform Complexity into Opportunity with Digital Engineering

    July 1, 2025
    Technology

    HP’s PCFax: Sustainability Via Re-using Used PCs

    July 1, 2025
    Technology

    Bell Labs DSP Pioneer Jim Boddie Leaves Lasting Legacy

    June 30, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Reinforcement Learning in the Age of Modern AI | by @pramodchandrayan | Jul, 2025

    July 1, 2025

    I Tried Buying a Car Through Amazon: Here Are the Pros, Cons

    December 10, 2024

    Amazon and eBay to pay ‘fair share’ for e-waste recycling

    December 10, 2024

    Artificial Intelligence Concerns & Predictions For 2025

    December 10, 2024

    Barbara Corcoran: Entrepreneurs Must ‘Embrace Change’

    December 10, 2024
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    Most Popular

    Minister Lucy Powell’s X account hacked to promote crypto scam

    April 15, 2025

    5 Money Habits That Set Successful Entrepreneurs Apart

    April 29, 2025

    Linear Regression — Your First ML Model | by Krishna | Feb, 2025

    February 7, 2025
    Our Picks

    Reinforcement Learning in the Age of Modern AI | by @pramodchandrayan | Jul, 2025

    July 1, 2025

    How This Man Grew His Beverage Side Hustle From $1k a Month to 7 Figures

    July 1, 2025

    Finding the right tool for the job: Visual Search for 1 Million+ Products | by Elliot Ford | Kingfisher-Technology | Jul, 2025

    July 1, 2025
    Categories
    • AI Technology
    • Artificial Intelligence
    • Business
    • Data Science
    • Machine Learning
    • Technology
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us
    Copyright © 2024 Aibsnews.comAll Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.