Our Response to the Global CrowdStrike Outage
A significant IT outage caused by an error in security monitoring service and software CrowdStrike has disrupted computer systems around the world, including and perhaps most severely, systems using Microsoft technology, infrastructure and applications.
Like many other organisations and businesses, Melbourne Recital Centre’s CRM, ticketing and web-integrated platform Tessitura (a global technology and application), was affected by this outage.
The Centre became aware of this issue at approximately 4pm on Friday 19 July, and following regular updates directly from Tessitura, and more broadly from CrowdStrike in the media, our CRM and ticketing services were restored at approximately 11am on Saturday 20 July.
We can confirm that Melbourne Recital Centre ticketing, CRM and web services have been restored and the Centre is able to operate as a business once again. Please note, eTickets are currently experiencing deliverability issues as a result of this outage. Order confirmations are being processed and delivered as expected.
Whilst services have been restored at the Centre, other platforms and businesses, including banks and payment providers, may still experience intermittent issues as a result of this outage. We encourage you to monitor or check with these businesses and platforms directly.
If you purchase tickets for events at Melbourne Recital Centre today, between now and when eTicket deliverability is restored, please allow enough time to visit the Box Office prior to the concert, and the team will print your tickets.
If you have any questions about ticket delivery for events at Melbourne Recital Centre this weekend please email: boxoffice@melbournerecital.com.au
Additionally:
Melbourne Recital Centre advises that the public be wary of cyber security and privacy implications following this global outage.
As informed by the Victorian Cyber Security Unit, malicious actors are attempting to take advantage of the CrowdStrike technical incident by targeting people online with misinformation and disinformation campaigns. This includes the registering of new, false website domain names related to the incident, pretending to provide support in response to the incident. These threat actors are using tactics to trick users into accessing their malicious websites, causing new disruptions, and accessing critical networks, systems and data to exploit.
We encourage everyone to be vigilant online and only seek information from valid, verified sources.
Thank you for your patience and understanding.