<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/cybersecurity/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News , Cybersecurity</title><description>Cloud 9 Advisers - News , Cybersecurity</description><link>https://www.cloud9advisers.com/News/cybersecurity</link><lastBuildDate>Thu, 26 Feb 2026 23:12:08 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[CMMC: 6 Key Takeaways]]></title><link>https://www.cloud9advisers.com/News/post/cmmc-6-key-takeaways</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/Blog images/CMMCNIST.jpg"/>The CMMC final rule is here, and it's full of surprises. Cut through the noise: learn the 6 counter-intuitive takeaways that change how you approach compliance, secure contracts, and manage your IT risk. It's time to stop stressing and start executing.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_CrKfT6_LQPmBSTjx5KOfnQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5B1clkVKTB2wxTYeDqd3Pw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ydTkdgvVQKSiZfYwV9tnNw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Z3iypXRyTHuhr6NgvP-HCA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule</span></h1></div>
<div data-element-id="elm_JQYyNwpXdfEiERmpoq5Fpw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span style="font-weight:bold;">What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule </span></p><p>The Cybersecurity Maturity Model Certification (CMMC) final rule is here, and it challenges everything the Defense Industrial Base (DIB) thought it knew about compliance, cost, and contract eligibility.</p></div><p></p></div>
</div><div data-element-id="elm_9urmD805bUpGGXc185yCDA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_9urmD805bUpGGXc185yCDA"] .zpimage-container figure img { width: 1110px ; height: 312.19px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/DOD%20CMMC%20Smallbiz.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_7fMLqjXkRSWFBIfYzvTuDg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p>Unlocking clarity in the complex world of CMMC compliance.</p></div><p></p></div>
</div><div data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_bFTwYM27zyZPkgYR8hZx9g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Kf7LpkbeHUM3yLOrdNLfYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_t3kIWSemnePpyIeSPvC9eg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h3>The CMMC Final Rule: What You Thought You Knew Just Changed</h3><p>For government contractors, the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) program has been a source of complexity, cost, and considerable anxiety. Since its inception, the regulation has evolved, leaving many in the Defense Industrial Base (DIB) struggling to keep up with its requirements and implications. The goal is clear: to secure the DIB against evolving cybersecurity threats and protect sensitive government information.</p><p><br/></p><p>Beneath the dense regulatory language of the final rule, however, are several surprising, counter-intuitive, and impactful realities that every business in the DIB needs to understand. These aren't minor details; they are fundamental aspects of the program that challenge common assumptions and have significant strategic implications for contract bidding, IT investment, and risk management.</p><p><br/></p><p>This article distills the official CMMC rule documents into a clear, scannable list of the most critical takeaways. It cuts through the noise to reveal what the Pentagon’s new cybersecurity rules really say and what they mean for your business. <strong>Our goal is to give you clarity and confidence to make quick, informed decisions.</strong></p><h3><br/></h3><h3>Takeaway 1: &quot;Self-Attestation&quot; Isn't Dead—It Just Evolved</h3><p>A core motivation behind the original CMMC program was to move the DIB away from the &quot;self-attestation&quot; model of security that the DoD had previously relied on for NIST SP 800-171 compliance. The perception was that self-reporting wasn't effective enough, necessitating a shift toward third-party verification.</p><p><br/></p><p>The surprising twist is that the revised CMMC Program (often called CMMC 2.0) streamlined the model and <strong>reintroduced self-assessments as a valid compliance pathway.</strong> The final rule confirms that companies at <strong>Level 1</strong> and a subset of companies at <strong>Level 2</strong> are allowed to demonstrate compliance through annual self-assessments rather than a mandatory third-party audit.</p><p><br/></p><p>This is a significant and <strong>pragmatic change</strong> that alleviates the immediate, immense cost and logistical burden a universal audit requirement would have placed on the DIB, especially on small businesses. This evolution represents a calculated, risk-based decision by the DoD, which has determined that for contracts involving less sensitive information, the risk of unverified compliance is acceptable when weighed against the practical realities and costs imposed on the defense industrial marketplace.</p><h3><br/></h3><h3>Takeaway 2: Perfection Isn't Required to Win a Contract</h3><p>A common misconception about CMMC is that a contractor must have a perfect cybersecurity assessment score to be eligible for a contract award. This assumption has been a major source of stress for companies working toward compliance, as achieving 100% implementation of all security controls is a formidable task.</p><p><br/></p><p>The final rule clarifies that this is not the case. An organization can be awarded a contract by achieving a <strong>&quot;Conditional Level 2&quot; or &quot;Conditional Level 3&quot;</strong> CMMC status. To qualify, a company must achieve a minimum score equal to 80% of the maximum score on a CMMC Level 2 or Level 3 assessment. All unmet requirements must be documented in a Plan of Action and Milestones (POA&amp;M).</p><p><br/></p><p>Critically, the organization has a <strong>180-day deadline</strong> from the date of the conditional assessment to close out the POA&amp;M and meet all remaining requirements. This is a significant and practical concession from the DoD, allowing companies to <strong>win business while still finalizing their compliance efforts</strong>.</p><h3><br/></h3><h3>Takeaway 3: The Government Won't Tell You Exactly What to Protect</h3><p>One of the most persistent areas of confusion for contractors is determining what information, exactly, constitutes Controlled Unclassified Information (CUI). Many have asked the government for clearer definitions, guidance, and contract-specific lists to help define the scope of their CMMC efforts.</p><p><br/></p><p>The counter-intuitive reality is that the DoD has officially stated this is outside the scope of the CMMC rule, placing the primary responsibility for identifying CUI <strong>squarely on the contractor</strong>. The rule's commentary includes a direct and unambiguous response to industry requests for guidance:</p><blockquote><p><em><br/></em></p><p><em>The CMMC Program will not provide CUI guidance materials to industry as it is outside the scope of this CMMC rule.</em></p></blockquote><p><br/></p><p>The document further clarifies that official DoD policy states, &quot;The authorized holder of a document or material is responsible for determining, at the time of creation, whether information in a document or material falls into a CUI category.&quot; This places a significant burden on contractors, who must become experts in <strong>data classification</strong> to accurately define the scope of their own CMMC assessments.</p><h3><br/></h3><h3>Takeaway 4: The Biggest Costs of CMMC Aren't Considered &quot;CMMC Costs&quot;</h3><p>The high cost of CMMC compliance is a major concern across the DIB. However, the DoD's official position on what constitutes a &quot;CMMC cost&quot; may come as a surprise. The costs to <strong>implement</strong> the required security controls for Level 1 (from FAR 52.204-21) and Level 2 (from NIST SP 800-171) are <strong>not</strong> considered costs attributable to the CMMC rule.</p><p><br/></p><p>The government's rationale is that these implementation requirements were mandated years earlier, with a deadline to implement the NIST SP 800-171 controls set back in December 2017. Therefore, from the DoD's perspective, companies should have already incurred these implementation costs. The only new costs officially attributed to CMMC Levels 1 and 2 are for the <strong>assessment and affirmation</strong> activities required to verify that those pre-existing requirements have been met. The DoD reinforces its perspective on the necessity of these costs with a powerful statement:</p><blockquote><p><em><br/></em></p><p><em>The cost of lost technological advantage over potential adversaries is greater than the costs of such enforcement.</em></p></blockquote><h3><br/></h3><h3>Takeaway 5: Your Cloud Provider Is Part of Your Audit</h3><p>A company’s CMMC compliance boundary does not end with its own on-premises servers and workstations. If an organization uses an external Cloud Service Provider (CSP) to process, store, or transmit CUI, that CSP is <strong>unequivocally part of the CMMC assessment scope</strong>.</p><p><br/></p><p>The final rule specifies a clear and impactful requirement for these providers: the CSP must meet the <strong>FedRAMP Moderate baseline</strong> or an equivalent standard. The rule documents are explicit on this point, stating the following:</p><blockquote><p><em><br/></em></p><p><em>...the DoD is not willing to assume all the risk of non-FedRAMP Moderate Equivalent CSOs when the CSO is used to process, store, or transmit CUI.</em></p></blockquote><p><br/></p><p>This effectively makes <strong>vendor selection a compliance decision</strong>, not just an IT one. The contractor is ultimately responsible for ensuring its entire CUI data chain—including services provided by third parties—meets DoD's stringent security standards.</p><h3><br/></h3><h3>Takeaway 6: The &quot;COTS Exception&quot; Is Narrower Than You Think</h3><p>The CMMC rule provides a well-known exemption for contracts that are <strong>solely</strong> for the acquisition of Commercially Available Off-the-Shelf (COTS) items. This has led some to believe that if they sell COTS products, they are exempt from CMMC entirely.</p><p><br/></p><p>However, there is a critical and surprising nuance in this rule. The source text clarifies: <strong>&quot;The exemption does not apply to a contractor's use of COTS products within its information systems that process, store, or transmit CUI.&quot;</strong></p><p><br/></p><p>A simple example illustrates this crucial distinction:</p><ul><li><p>A company whose contract is <em>solely</em> to sell COTS laptops directly to the DoD might be exempt from CMMC for that specific contract.</p></li><li><p>However, if that same company uses those same COTS laptops <strong>in its own corporate network</strong> to perform work on a different DoD contract that involves CUI, then its network <strong>is</strong> subject to CMMC requirements.</p></li></ul><p><br/></p><p>The exemption applies to <strong>what is being sold</strong>, not to <strong>what is being used to perform contract work involving sensitive data</strong>. This is a crucial detail that could easily lead to a failed assessment if misinterpreted.</p><h3><br/></h3><h3>Conclusion: A New Era of Accountability and Pragmatism</h3><p>The Cybersecurity Maturity Model Certification program represents a fundamental shift in the DoD's approach to securing its supply chain. It moves the DIB from a model based on trust and self-attestation to one centered on verification and accountability. Yet, as these takeaways reveal, the final rule is not a rigid, one-size-fits-all mandate. It includes pragmatic allowances—such as self-assessments and conditional certifications—that acknowledge the business realities faced by the thousands of companies that support the U.S. warfighter.</p><p><br/></p><p>The rules are now set, and the phased implementation is underway. With this new era of accountability beginning, the true test now begins: will this landmark regulation successfully raise the DIB's security baseline to protect against advanced threats, or will it create unforeseen obstacles for the very innovators the DoD relies on? The path forward requires clarity, and recognizing these six realities is the first step toward confident compliance.</p></div><p></p></div>
</div></div><div data-element-id="elm_u4jtLHuu95aVqoSw57_pGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_5YETy6OdEpzOZhUe2TZVIQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_5YETy6OdEpzOZhUe2TZVIQ"].zpelem-divider{ margin-block-start:47px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_a8ThMKJKSJW5zjjmqAgPDA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/assessments" target="_blank"><span class="zpbutton-content">3rd-Party Assessments</span></a></div>
</div><div data-element-id="elm_z63eqdvp1fudtxaZpzjCzA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/security-readiness" target="_blank"><span class="zpbutton-content">Initial Evaluation</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Oct 2025 09:49:47 -0500</pubDate></item><item><title><![CDATA[SMEs can't keep up]]></title><link>https://www.cloud9advisers.com/News/post/smes-can-t-keep-up</link><description><![CDATA[SMEs face a cybersecurity crisis: strained budgets, overstretched IT teams, and rising threats like AI-driven phishing and supply chain attacks push them to a breaking point. With a growing skills gap and compliance burdens, smaller firms struggle to keep up, risking their security and resilience.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xB-iWGpdRryiWG1D_9EfHQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xhFuXVsyTzSlarWyE81pCA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aO0CigWoSOmzDMtJKBHuiQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_aceosw2bTtCyeggg0B1pkg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Smaller organizations reach security breaking point</span></h1></div>
<div data-element-id="elm_raRwSO3IHJgR7lbY5ZMjEw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_raRwSO3IHJgR7lbY5ZMjEw"] .zpimage-container figure img { width: 1110px ; height: 718.03px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/gab42546dfaca4c00f9b357ede5b40f328906492bc57e4e9f47be4c044253a477292a8dd0a792089d5660d2c7970f910c8bb72582dad6c95cad3fa9991c2210fc_1280.jpg" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_GHd5iu3sQYi65Q71LDkzUw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p>From out friends at Computerworld and CSO Magazine</p><p></p><div><div style="margin-bottom:2px;">by&nbsp;<a href="https://www.csoonline.com/profile/john-leyden/">John Leyden</a></div><div><span>Senior Writer</span></div></div><p></p><p></p><div style="margin-bottom:4px;"><br/></div><div style="margin-bottom:4px;"><span style="margin-right:8px;">Jun 12, 2025</span><span>9 mins&nbsp; (a <span style="font-style:italic;">must </span>read)</span></div><p></p></div>
</div><div data-element-id="elm_2uDYupuWCDxwqfJfit-SFg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_cmpLoGnEcsqtcF4y8jZwmA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_YevaoYrT1dof4P6cWRmqag" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Strained budgets, overstretched teams, and a rise in sophisticated threats is leading to plummeting security confidence among SMEs as cybercriminals increasingly target them in supply chain attacks.</div><div><br/></div><div>Limited budgets, overstretched IT teams, and a rapidly evolving threat landscape mean smaller organizations are approaching a “cybersecurity tipping point.”</div></div><div><br/></div><div><div><p style="margin-bottom:40px;">The&nbsp;<a href="https://www.weforum.org/publications/global-cybersecurity-outlook-2025/digest/">World Economic Forum’s (WEF) Global Cybersecurity Outlook 2025 report</a>&nbsp;noted that “71% of cyber leaders say small organizations have already reached a critical tipping point where they can no longer adequately secure themselves against growing complexity of cyber risks.”</p><p style="margin-bottom:40px;">More than a third (35%) of small organizations believe their cyber resilience is inadequate, a proportion that has increased sevenfold since 2022.</p><p style="margin-bottom:40px;"><span><span>By contrast, the share of large organizations reporting insufficient cyber resilience has nearly halved over the same period.</span></span><br/></p></div><div><div><div><div style="margin-bottom:24px;"><div><div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_TGExzp2ZrjN1XDyA6m8CyQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Skills gap leading to deteriorating security outlook<br/></span></h2></div>
<div data-element-id="elm_7FFctb1eX3OZAtSwuSmiMg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><p style="margin-bottom:40px;">Experts quizzed by CSO said that the rapid adoption of emerging technologies — which comes with the downside of fresh vulnerabilities that cybercriminals can exploit — together with a widening skills gap is contributing to a deteriorating security outlook for small and midsize businesses (SMBs).</p><p>“Cyber skills gaps are prevalent in SMBs largely due to a lack of resources and specialized knowledge,” says&nbsp;<a href="https://www.linkedin.com/in/tomexelby/">Tom Exelby</a>, head of cybersecurity at managed security services firm Red Helix. “Many SMBs don’t have dedicated cybersecurity teams, and those in charge of security can lack the confidence to perform even basic cyber tasks.”</p><p><br/></p><p></p><div><p style="margin-bottom:40px;">Small and medium enteprises (SMEs) that do have budget to hire specialists often struggle to attract and retain skilled professionals due to the lack of variation in the role.&nbsp;<a href="https://www.csoonline.com/article/573869/information-overload-burnout-talent-retention-impacting-soc-performance.html">Burnout is also a growing issue</a>&nbsp;for the understaffed, underqualified IT teams common in small business.</p><p style="margin-bottom:40px;">“With limited resource in the business, employees are often wearing multiple hats and the pressure to manage cybersecurity on top of their regular duties can lead to fatigue, missed threats, and higher turnover,” Exelby says.</p><p>WEF’s report estimates that the&nbsp;<a href="https://www.csoonline.com/article/2074581/the-cybersecurity-skills-shortage-a-ciso-perspective.html">cyber skills gap</a>&nbsp;has increased by 8%, with two out of three organizations reporting moderate-to-critical skills gaps, including a lack of essential talent and skills to meet their security requirements. WEF’s findings are based on a survey of 321 qualified participants supplemented by 43 one-to-one interviews.</p><p><span><span><br/></span></span></p><p><span><span>Resource constraints common in smaller businesses make maintaining even basic security posture an uphill struggle.</span></span><br/></p><p><span><span><br/></span></span></p><p><span><span></span></span></p><div><p style="margin-bottom:40px;"><a href="https://www.linkedin.com/in/steven-woody-wood/?originalSubdomain=uk">Steven Wood</a>, director of solution consulting for EMEA at OpenText Cybersecurity, tells CSO: “Implementing and maintaining even basic defenses require strategies at multiple levels — user training, email threat detection, endpoint protection, DNS layer filtering, proper authentication, patch management, event monitoring, backups and drills — which can overwhelm small IT teams with limited budgets and headcount.”</p><p>Wood adds: “Given the scope of this list, it can be difficult for organizations to keep up with even baseline best practices for security.”</p></div><p></p></div><p></p></div></div></div><div><div><div><div style="margin-bottom:24px;"><div><div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_xW-xJ5e1exsnlZBJVI_13A" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>SMEs targeted by supply chain attacks<br/></span></h2></div>
<div data-element-id="elm_PpdRplDcOkP1119Ai_mzTg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><p style="margin-bottom:40px;">SMEs often mistakenly believe that cyber attackers only target larger organizations, but that’s often not the case — particularly because small business partners of larger companies are often deliberately targeted as part of&nbsp;<a href="https://www.csoonline.com/article/561323/supply-chain-attacks-show-why-you-should-be-wary-of-third-party-providers.html">supply chain attacks</a>.</p><p style="margin-bottom:40px;">“Threats are becoming more advanced but their resources aren’t keeping pace,” says&nbsp;<a href="https://www.linkedin.com/in/kristiantorode/?originalSubdomain=uk">Kristian Torode</a>, director and co-founder of Crystaline, a specialist in SME cybersecurity. “Many SMEs are still relying on outdated systems or don’t have dedicated security teams in place, making them an easy target.”</p><p>Torode adds: “They’re also seen by cybercriminals as an exploitable link in the supply chain, since they often work with larger enterprises.”</p><p><br/></p><p><span><span>“SMEs have traditionally been low-hanging fruit — with limited resources for cybersecurity training, advanced tools, or dedicated security teams,”&nbsp;</span><a href="https://www.linkedin.com/in/adam-casey-26899466/">Adam Casey</a><span>, director of cybersecurity and CISO at cloud security firm Qodea, tells CSO. “More often than not, cybersecurity is left to overstretched IT departments already juggling multiple responsibilities.”</span></span><br/></p></div></div></div><div><div><div><div style="margin-bottom:24px;"><div><div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_FlcINm5SeWIFEdpriQuiVw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Training shortcomings and regulatory headaches<br/></span></h2></div>
<div data-element-id="elm_--ZznGRntRGm4rXZtyFTYA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p style="margin-bottom:40px;">Cyber training is another area where smaller firms are falling behind.</p><p>“Annual training modules are no longer fit for purpose given the rate of change,” says&nbsp;<a href="https://www.linkedin.com/in/rickgoud/?locale=nl_NL">Dr. Rick Goud</a>, CIO and cofounder of secure email vendor Zivver. “What is needed is more dynamic, context-aware education that is delivered when and where employees are most likely to make mistakes.”</p><p><br/></p><p></p><div><p style="margin-bottom:40px;">In addition to challenges keeping up with the latest training, the proliferation of regulatory requirements around the world is also adding a significant compliance burden for smaller organizations.</p><p style="margin-bottom:40px;">“As regulations like&nbsp;<a href="https://www.csoonline.com/article/3568787/eus-nis2-directive-for-cybersecurity-resilience-enters-full-enforcement.html">NIS2</a>&nbsp;and&nbsp;<a href="https://www.csoonline.com/article/562107/general-data-protection-regulation-gdpr-requirements-deadlines-and-facts.html">GDPR</a>&nbsp;become stricter, compliance is often left to senior leadership teams who are already juggling multiple roles,” Goud says. “Without a dedicated data protection officer or team, it’s easy for things to fall through the cracks, especially when third-party suppliers are involved.”</p><p>Worse, the need to comply with NIS2 in the EMEA region is&nbsp;<a href="https://www.csoonline.com/article/3596485/nis2-compliance-eats-up-it-budgets-despite-doubts.html">eating into IT budgets</a>, placing further strain on smaller organizations. Moreover, regulations like NIS2 and&nbsp;<a href="https://www.csoonline.com/article/570091/eus-dora-regulation-explained-new-risk-management-requirements-for-financial-firms.html">DORA</a>&nbsp;are placing&nbsp;<a href="https://www.csoonline.com/article/3804548/eus-dora-could-further-strain-cybersecurity-skills-gap.html">even greater pressure on talent markets and skills gaps</a>.</p></div><br/><p></p></div><div><p></p></div></div>
</div><div data-element-id="elm_otrVL1R_VcB9kSwhlVNhLA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Growing threats<br/></span></h2></div>
<div data-element-id="elm_3d0yrCR7OMa8OzA7ZmJ0TQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>Smaller teams, already struggling with limited cyber skills, are often ill-equipped to manage a growing array of threats. This is contributing to a widening gap in security maturity between larger and smaller organizations.</span></span></p><p><span><span><br/></span></span></p><p><span><span></span></span></p><div><div><div><div><p style="margin-bottom:40px;">“Unlike large enterprises, SMEs often lack the budget and specialized personnel to secure a sprawling IT stack, especially as hybrid work and cloud adoption expand their attack surface,” says&nbsp;<a href="https://www.linkedin.com/in/robert-phan-a9b54015/">Robert Phan</a>, CISO at cloud-based directory services firm JumpCloud.</p><p><a href="https://www.linkedin.com/in/martin-greenfield-77346812/?originalSubdomain=uk">Martin Greenfield</a>, chief executive at Quod Orbis, also sees the shift to cloud and hybrid work environments challenging SMEs at a time when “threat actors have become faster, smarter, and better resourced,” he says.</p></div></div></div><div><div><div><div style="margin-bottom:24px;"><div><div></div></div></div></div></div></div></div><div><p style="margin-bottom:40px;">Moreover, a small business monoculture of similar (cheap) security tools and much the same IT equipment — often set up in default (insecure) configurations — makes it possible for cybercriminals to automate attacks against SMEs at scale, notes&nbsp;<a href="https://www.linkedin.com/in/riwerner/?originalSubdomain=de">Richard Werner</a>, cybersecurity platform lead for Europe at Trend Micro.</p><p style="margin-bottom:40px;">As a result, security threats are evolving and growing faster than most SMEs can track let alone remediate. For example:</p><ul><li>Generative AI is supercharging phishing and BEC social engineering: Attackers are using AI to craft highly personalized, fluent phishing lures — making messages harder to spot and massively increasing overall volume.<br/></li><li>Ransomware-as-a-service has professionalized: Today’s RaaS platforms offer affiliate dashboards, playbooks, negotiation support, and multi-extortion (combining encryption, data theft, and public shaming), raising both the technical sophistication and reputational pressure on victims.</li></ul><ul><li>New attack surfaces are rising around cloud and identity: “Poor IAM and exposed remote-access services have driven a surge in cloud-focused ransomware and account-takeover attacks,” according to OpenText Cybersecurity. “In 2024 alone, cloud ransomware incidents spiked as attackers moved beyond endpoints to steal API keys or abuse services like Okta and Azure AD.”</li></ul><p>“Security threats are evolving faster than most SMEs can track,” Zivver’s Goud says. “AI-driven phishing, deepfake scams, and automated exploitation are all on the rise, but most organizations do not have the internal capability to monitor or respond to them. That gap is growing and so are the risks.”</p></div><br/><p></p></div>
</div><div data-element-id="elm_dhvrd3zd4MVlhH2HVW3ciA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Vulnerability surge<br/></span></h2></div>
<div data-element-id="elm_NG6oEH_22Yi_w7YF7X2Jog" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><p style="margin-bottom:40px;">Small business IT teams have always struggled to prioritize and triage security problems — a problem that has only grown more acute in recent years as the volume of vulnerabilities has increased.</p><p style="margin-bottom:40px;">According to the&nbsp;<a href="https://www.csoonline.com/article/3970094/cybercriminals-switch-up-their-top-initial-access-vectors-of-choice.html">Verizon Data Breach Investigation Report for 2025</a>, vulnerabilities grew as an attack vector by 180% over the year prior. Looking at the number of software vulnerabilities reported, that number has gone up as well — from 25,059 in 2022 and 28,961 in 2023 to 40,077 in 2024.</p><p>“When you are a small team, that number of issues is just impossible to track,”&nbsp;<a href="https://www.linkedin.com/in/matt-middleton-leal-a56557/?originalSubdomain=uk">Matt Middleton-Leal</a>, managing director for EMEA at Qualys, tells CSO. “The right approach here is to grade potential issues for severity and then spend time on what matters. This can help every small team have a big business impact.”</p><p><br/></p><p></p><div><p style="margin-bottom:40px;">Business dynamics also have a part to play in the increasing security problems faced by SMEs.</p><p style="margin-bottom:40px;">“SMEs have accelerated digital transformation to remain competitive or simply to stay operational during the pandemic,” Qodea’s Casey points out. “Yet many still lack the internal expertise to properly assess or address the security implications of this shift.&quot;</p></div><p></p></div></div></div><div><div><div><div style="margin-bottom:24px;"><div><div></div></div></div></div></div></div></div><p></p></div>
</div><div data-element-id="elm_6Brd-OV06F2sqIwv4RWFEg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Mitigation</span></h2></div>
<div data-element-id="elm_0LFb1gXslFidfMcz0SPJhw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div><div><div><p>While a wealth of information is available, such as the&nbsp;<a href="https://www.ncsc.gov.uk/collection/small-business-guide">UK NCSC’s small business security guide</a>, small businesses often find it difficult to find actionable guidance.</p><p><br/></p><p></p><div><div><div><div><p style="margin-bottom:40px;">During a&nbsp;<a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4355.240487.enabling-cyber-security-communities-of-support-for-smes.html">session at the Infosecurity Europe conference</a>&nbsp;earlier this month, representatives of the CyCOS project explained how they were offering a community-based approach to support small business in becoming more secure.</p><p style="margin-bottom:40px;"><a href="https://www.cycos.org/">CyCOS</a>&nbsp;is a collaboration between three UK universities (Nottingham, Queen Mary, and Kent), and is supported by a variety of partners, including the Home Office, National Cyber Security Centre (NCSC), ISC2, the Chartered Institute of Information Security (CIISEC), and three regional Cyber Resilience Centres.</p><p>During the panel,&nbsp;<a href="https://www.nottingham.ac.uk/computerscience/people/steven.furnell">Professor Steven Furnell</a>, a CIISEC board member, pointed out that “SMEs have the security guidance but they don’t know how to take it forward by building communities, so that small businesses have someone to talk to apart from consultants.”</p></div></div></div><div><div><div><div style="margin-bottom:24px;"><div><div></div></div></div></div></div></div></div><div><div><div><div><p style="margin-bottom:40px;">Industry experts argue that use of managed security services can help small businesses to become more resilient.</p><p style="margin-bottom:40px;">“In the short term, SMBs can solve the problem by partnering with a managed security services provider who can not only better protect them and respond to threats but also advise them away from overinvesting in security tech that they really don’t need,” says Red Helix’s Exelby. “To fix the long-term skills gap issue impacting the entire sector, education is a key alongside greater diversity.”</p><p style="margin-bottom:40px;">Automation is another vital security strategy for helping SMBs mind the gaps.</p><p>“Most small IT teams can’t manage the constant churn of alerts, patches, and manual controls — that’s why automation is essential,” says&nbsp;<a href="https://www.linkedin.com/in/albertestevezpolo/?originalSubdomain=es">Albert Estevez</a>, field CTO at Zero Networks. “By automating segmentation and access control, organizations can reduce risk and contain threats — without needing enterprise-sized security teams.”</p><p><br/></p><p>Link to original CSO article:&nbsp;<a href="https://www.csoonline.com/article/4003892/smaller-organizations-nearing-cybersecurity-breaking-point.html">https://www.csoonline.com/article/4003892/smaller-organizations-nearing-cybersecurity-breaking-point.html</a>&nbsp;</p></div></div></div></div><p></p></div></div></div><div><div><div><div style="margin-bottom:24px;"><div><div></div></div></div></div></div></div></div><p></p></div>
</div></div><div data-element-id="elm_1fGPghK4kRU0cG5-SmccxQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ISUX8YZ9lcJl-OhvIBOUZA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true">Let Cloud 9 introduce you to:&nbsp;</h2></div>
<div data-element-id="elm_yMeQPGne1vNPM7g8Vi3pHQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yMeQPGne1vNPM7g8Vi3pHQ"] div.zpspacer { height:80px; } @media (max-width: 768px) { div[data-element-id="elm_yMeQPGne1vNPM7g8Vi3pHQ"] div.zpspacer { height:calc(80px / 3); } } </style><div class="zpspacer " data-height="80"></div>
</div><div data-element-id="elm_uLPwuo5uKwXdOmG_WgWhWg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_uLPwuo5uKwXdOmG_WgWhWg"] .zpimage-container figure img { width: 320px !important ; height: 160px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/xcitiumlogo.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_fB2j4_Hby1KvjHPx2oRuzg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_fB2j4_Hby1KvjHPx2oRuzg"] div.zpspacer { height:80px; } @media (max-width: 768px) { div[data-element-id="elm_fB2j4_Hby1KvjHPx2oRuzg"] div.zpspacer { height:calc(80px / 3); } } </style><div class="zpspacer " data-height="80"></div>
</div><div data-element-id="elm_W1Jet4a-KnMdKz2hHwsaRg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_W1Jet4a-KnMdKz2hHwsaRg"] .zpimage-container figure img { width: 320px !important ; height: 160px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20TruU%20logo.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_PStwlD32YwPLbIqTSoG-SA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_PStwlD32YwPLbIqTSoG-SA"] div.zpspacer { height:80px; } @media (max-width: 768px) { div[data-element-id="elm_PStwlD32YwPLbIqTSoG-SA"] div.zpspacer { height:calc(80px / 3); } } </style><div class="zpspacer " data-height="80"></div>
</div><div data-element-id="elm_3DfY7_EKEeSIAsLvZR7iQA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_3DfY7_EKEeSIAsLvZR7iQA"] .zpimage-container figure img { width: 320px !important ; height: 160px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Coro%20logo.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_B6dTqpJvrFes4hEHMaR5Zw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_B6dTqpJvrFes4hEHMaR5Zw"] div.zpspacer { height:102px; } @media (max-width: 768px) { div[data-element-id="elm_B6dTqpJvrFes4hEHMaR5Zw"] div.zpspacer { height:calc(102px / 3); } } </style><div class="zpspacer " data-height="102"></div>
</div><div data-element-id="elm_7wWrRLKXVTMXQOv0msyp_Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_7wWrRLKXVTMXQOv0msyp_Q"] .zpimage-container figure img { width: 350px ; height: 66.99px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Trustwave-1.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_yV75g_XpOYsWagyua00GzA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yV75g_XpOYsWagyua00GzA"] div.zpspacer { height:92px; } @media (max-width: 768px) { div[data-element-id="elm_yV75g_XpOYsWagyua00GzA"] div.zpspacer { height:calc(92px / 3); } } </style><div class="zpspacer " data-height="92"></div>
</div><div data-element-id="elm_7ZfGlql31Ype4aXhIE2umQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_7ZfGlql31Ype4aXhIE2umQ"] .zpimage-container figure img { width: 350px ; height: 63.98px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20PaloAlto.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_t765FhJeDD2UrQHdzpGueg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_t765FhJeDD2UrQHdzpGueg"] div.zpspacer { height:110px; } @media (max-width: 768px) { div[data-element-id="elm_t765FhJeDD2UrQHdzpGueg"] div.zpspacer { height:calc(110px / 3); } } </style><div class="zpspacer " data-height="110"></div>
</div><div data-element-id="elm_So2mmhxbETQuBfWlSFCTqA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_So2mmhxbETQuBfWlSFCTqA"] .zpimage-container figure img { width: 350px ; height: 110.54px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20NordSecurity.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_NtIxKIKkN17hwGcspAovCA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_NtIxKIKkN17hwGcspAovCA"] div.zpspacer { height:80px; } @media (max-width: 768px) { div[data-element-id="elm_NtIxKIKkN17hwGcspAovCA"] div.zpspacer { height:calc(80px / 3); } } </style><div class="zpspacer " data-height="80"></div>
</div><div data-element-id="elm_2uX7I1ZAfaT8CgReSqy9gw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_2uX7I1ZAfaT8CgReSqy9gw"] .zpimage-container figure img { width: 320px !important ; height: 160px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Level%20Blue%20-AT-T-%20logo.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_yfp5w6ZleWfqiPCzlLp-cA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yfp5w6ZleWfqiPCzlLp-cA"] div.zpspacer { height:80px; } @media (max-width: 768px) { div[data-element-id="elm_yfp5w6ZleWfqiPCzlLp-cA"] div.zpspacer { height:calc(80px / 3); } } </style><div class="zpspacer " data-height="80"></div>
</div><div data-element-id="elm_caPrzxCM1sWS_pdPVqVtTw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_caPrzxCM1sWS_pdPVqVtTw"] .zpimage-container figure img { width: 320px !important ; height: 160px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20ECI%20logo.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_B-BIh2O6KeRYs8ctQulA4A" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_B-BIh2O6KeRYs8ctQulA4A"] div.zpspacer { height:80px; } @media (max-width: 768px) { div[data-element-id="elm_B-BIh2O6KeRYs8ctQulA4A"] div.zpspacer { height:calc(80px / 3); } } </style><div class="zpspacer " data-height="80"></div>
</div><div data-element-id="elm_-IGARX6BTtwHTDR6IKkg_g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_-IGARX6BTtwHTDR6IKkg_g"] .zpimage-container figure img { width: 241px !important ; height: 170px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Vigilant1.jfif" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div></div><div data-element-id="elm_cM1j0nAcJ3mh4x-IkxblLA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style></div>
<div data-element-id="elm_we_l_SSxTMGu79FIelmnQw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 20 Jun 2025 20:19:37 -0500</pubDate></item><item><title><![CDATA[CrowdStrike and Microsoft]]></title><link>https://www.cloud9advisers.com/News/post/crowdstrike-and-microsoft</link><description><![CDATA[The time is nigh! Work with Cloud 9 to help you understand the implications of the Microsoft/CrowdStrike outage, and the importance of prioritizing your resiliency plans.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_BW-RdzRUStqn2tRLQvnrKw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MfwtWHzqS4i06DgSeIZlJg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PiF5NKGWRGeW44UAlIQGTA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_cUtSUoCHTFOKeh66rQkEjw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">CrowdStrike and Microsoft Outage: Next Steps</span></h1></div>
<div data-element-id="elm_dbLpWrgG9btKNkhqk2nLKQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dbLpWrgG9btKNkhqk2nLKQ"] .zpimage-container figure img { width: 1110px ; height: 719.65px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/premium_photo-1661891469578-7fd063fe8b65" size="fit" alt="Gone Phishing" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_IdzSgC0MTNC5XShoJCB8Jg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div><span style="font-style:italic;">The CrowdStrike and Microsoft Outage Aftermath: Next Steps b<span style="color:inherit;">y Jeff Hathcote, Solution Architect – Security</span></span></div></div></div>
</div><div data-element-id="elm_MdL4iZ4qne1puUXWMdajig" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eRIypUhC9s_awHRfxYQN8g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
<div data-element-id="elm_xKZasdZni9_lsW8XyXOObA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_9hQYD5CF1cF_TMQMWrpOqw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">CrowdStrike and Microsoft: Hard at work</span></h2></div>
<div data-element-id="elm_47d_fKZjIEvJJO2ScyCcEw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>While unintentional in nature, the recent CrowdStrike outage caused disruptions that reverberated throughout the globe. While CrowdStrike and Microsoft are hard at work to rectify an estimated 8.5 million computers affected worldwide, guess who’s hard at play taking advantage of the situation? The bad guys and their phishing schemes.&nbsp;</div><br><div>Now is the time to work with Cloud 9 to help you understand the implications of the outage, and the importance of prioritizing your resiliency plans.&nbsp;</div></div></div>
</div><div data-element-id="elm_zcOcY4hv52Ci7fnEu35jeg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>The vital role of Cloud 9 Advisers and Essential Discussion Points:&nbsp;</div></div></h3></div>
<div data-element-id="elm_IuIQOFNClESqgHUVAciBeg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">In the aftermath of the CrowdStrike outage, Cloud 9 has a critical role to play as your trusted adviser. We can help with guidance on navigating this crisis in two ways: 1) Helping you comprehend the situation, and 2) Advising you on how to strengthen your defenses to avoid a similar disaster from impacting your organization (any sized company is vulnerable to modern cyber threats.)</span><br></div></div></div>
</div><div data-element-id="elm_x9HNJnuJpRm6d1cv2hvRYQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">1. Understanding the Outage</h3></div>
<div data-element-id="elm_n7qc4uPbI4NAln0tIN4aVQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It is important to note that the CrowdStrike/Microsoft outage was NOT a cyberattack. The incident began with a software update. As part of its ongoing threat protection, CrowdStrike regularly updates its sensor with the latest threat data. In this instance, the update violated a protected memory address within the Microsoft Windows environment, causing the operating system to encounter a critical error, resulting in the ubiquitous “blue screen of death” where an affected device is unable to recover on its own.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">The workaround to the issue involved a very manual process, requiring users/admins to log in to each machine under “safe mode” and remove the registry key that contains the faulty code. This event shows just how connected technology products are within our ecosystem, and one failure can cause a cascade of devastating impact on an entire infrastructure.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">While both CrowdStrike and Microsoft are working diligently to assist in recovery efforts, we all need to be aware of the potential for secondary attacks from cybercriminals based on information collected via a phishing attack.</span><br></p></div>
</div><div data-element-id="elm_NcoAZHm8B-oI2l1yW9c2DQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Learning from the Incident: How to Outsmart the Bad Guys&nbsp;</span></h3></div>
<div data-element-id="elm_C6GfVnZQRaUrMM9LWCcJ-A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Within hours of the incident on July 19, 2024 CrowdStrike warned of malicious activity trying to exploit the outage. One primary method that cybercriminals are using is to send phishing emails purportedly from CrowdStrike (or Microsoft) using “spoofed” addresses (i.e., somebody@crowdstrikeoutage.com) with malicious attachments or simply to gather information for a later compromise.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">CrowdStrike and Microsoft are working around the clock to provide guidance as well as potential tools to assist with recovery. Some good, free advice: DO NOT OPEN any emails from unofficial addresses posing as CrowdStrike or Microsoft support and thoroughly questioning any potential phone calls you may get from CrowdStrike staff; they are likely impersonators.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Additionally, this unfortunate incident opens up the conversation for developing (or revisiting) a robust cybersecurity prevention and recovery plan. With access to a breadth of cybersecurity providers, solution architects, and managed services, Cloud 9 has the opportunity to help you with your entire strategy – from organization-wide cyber training, to IT outage response plans, to infrastructure automation for disaster recovery, to third-party risk management and consulting programs.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Or, if you’re a maverick and really want to stir the pot, we can even help you switch it all over to Google and Chromebooks!</span><br></p></div>
</div><div data-element-id="elm_PvWE-YmOmiQ74IecKqfNJA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_EetI2UTqO1dxKV4cI0ZcHA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Final Thoughts&nbsp;</span></h2></div>
<div data-element-id="elm_v8SsmFVdGuladHKvWgLe9g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>“This high-impact event emphasizes the urgency to keep resiliency plans current, communicated, and understood within the organization to avoid the types of customer disruptions experienced since July 19. Like other industry disruptions this year, this event creates conversational opportunities about how to best prepare organizations for these inevitabilities.” – Koby Phillips, VP of Advanced Solutions</div><div><br></div><div>While the CrowdStrike outage presents significant challenges, Cloud 9 is ready, willing, and able to offer expert guidance. We can assist you in navigating this crisis and help you emerge stronger and more resilient. To that end I ask: Which components or upstream service providers in your environment are you dependent on? Are you considering additional resiliency around your mission critical vendors?&nbsp;</div></div></div>
</div></div><div data-element-id="elm_P9DpTgzYPFu6ERx7hBJIeg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_fzuNUrktQPefn_tpyo1leQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 09 Aug 2024 14:22:27 -0500</pubDate></item><item><title><![CDATA[Microsoft Down!]]></title><link>https://www.cloud9advisers.com/News/post/microsoft-down</link><description><![CDATA[Microsoft and CrowdStrike work diligently to fully resolve the fallout from a major global outage.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XafpBElLSpitO7YGzmgpYQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_l99SyjRyTmuFUDuG4G9cJQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_niqhMDmxTTWCCN_Tb_HOKA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ"].zpelem-heading { border-radius:1px; } } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">CrowdStrike Issues Cause Global Microsoft Outages</span></h1></div>
<div data-element-id="elm_60lHHB66gTWq2L_TQuDiEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_60lHHB66gTWq2L_TQuDiEA"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_60lHHB66gTWq2L_TQuDiEA"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_60lHHB66gTWq2L_TQuDiEA"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-center " data-editor="true"><p>Elon Musk suggests this could be the biggest IT failure ever. Is he right?</p></div>
</div><div data-element-id="elm_qcSQPv09bUxAA7kvLehPDg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"] .zpimage-container figure img { width: 770px !important ; height: 431px !important ; } } [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"] .zpimage-container figure figcaption .zpimage-caption-content { font-size:8px; } [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"].zpelem-image { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"].zpelem-image { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"].zpelem-image { border-radius:1px; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/CSoutage.png" size="original" alt="image credit https://www.moneycontrol.com/" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content">image credit https://www.moneycontrol.com/</span></figcaption></figure></div>
</div><div data-element-id="elm_LBudQumpwYSjKyfliYLWqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_LBudQumpwYSjKyfliYLWqA"].zprow{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_LBudQumpwYSjKyfliYLWqA"].zprow{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_LBudQumpwYSjKyfliYLWqA"].zprow{ border-radius:1px; } } </style><div data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-style:italic;font-size:10px;">Note:&nbsp;</span><span style="font-size:10px;font-style:italic;">We are not reporters, regardless we thought this story important enough to share. We've pieced together this article from a few other (hopefully) reputable stories, sources, and reports. We'll try to keep things updated appropriately</span></p></div>
</div></div><div data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA"].zpelem-heading { border-radius:1px; } } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Microsoft's Global Outage Linked to CrowdStrike:</span></h2></div>
<div data-element-id="elm_Hu57XV6UssS5POeNr6miGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Hu57XV6UssS5POeNr6miGw"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_Hu57XV6UssS5POeNr6miGw"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_Hu57XV6UssS5POeNr6miGw"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In an unexpected turn of events, Microsoft's global outage has been traced back to a disruption caused by CrowdStrike. This incident has rippled across the globe hitting numerous industries, affecting countless users, and raising significant concerns about security and operational resilience. Here's a comprehensive look at the situation, drawing insights from multiple sources to provide a detailed understanding.</div></div></div>
</div><div data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>The Outage and Its Immediate Impact</div></div></h3></div>
<div data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Starting Thursday evening July 18, 2024 and coming to a head on Friday, Microsoft experienced a significant global outage, affecting services such as Office 365, Azure, and Teams - but seemingly and mostly attributed to Microsoft Windows. This disruption impacted businesses worldwide, halting operations and causing widespread frustration among users and consumers alike. According to Wired, the root cause of the outage was identified as an issue linked to CrowdStrike's security software, which is integrated into Microsoft's infrastructure for enhanced cybersecurity measures</span><br></p></div>
</div><div data-element-id="elm_Bm2zocJTMbLKE2npELQWJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Bm2zocJTMbLKE2npELQWJg"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_Bm2zocJTMbLKE2npELQWJg"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_Bm2zocJTMbLKE2npELQWJg"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><a href="https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/">https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/</a><br></p></div>
</div><div data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>What Happened?</div></div></h3></div>
<div data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Initial investigations revealed that a recent update to CrowdStrike's Falcon platform inadvertently triggered a cascade of failures within Microsoft's systems. This apparently routine update, meant to enhance security features, instead led to serious&nbsp;</span><span style="color:inherit;">unexpected&nbsp;</span><span style="color:inherit;">system incompatibilities and undesired behavior. The BBC reports that the issue was severe enough to cause cascading failures across Microsoft's global network, demonstrating the interconnected nature of modern IT ecosystems</span></p></div>
</div><div data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><a href="https://www.bbc.com/news/live/cnk4jdwp49et">https://www.bbc.com/news/live/cnk4jdwp49et</a><br></div>
</div><div data-element-id="elm_IJQRcbDil9QEoaDZX33KZg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJQRcbDil9QEoaDZX33KZg"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_IJQRcbDil9QEoaDZX33KZg"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_IJQRcbDil9QEoaDZX33KZg"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Response and Mitigation</div></div></h3></div>
<div data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Microsoft's response to the outage was swift but challenging. The company's IT teams worked around the clock to isolate the issue and restore services. As detailed by Reuters, Frontier and many other smaller and major airline were significantly affected by the outage. Airline operations around the world were disrupted, highlighting the broad impact of Microsoft's downtime on various sectors.</div><div><br></div><div>To address the problem, Microsoft collaborated closely with CrowdStrike to roll back the problematic update and implement fixes. This process involved complex troubleshooting and coordination to ensure that services could be safely restored without further disruptions&nbsp;</div><div><br></div><div>According to&nbsp;<a href="https://admin.microsoft.com/servicestatus">https://admin.microsoft.com/servicestatus</a>&nbsp;as of now Microsoft reports &quot;We're all good&quot;.&nbsp;</div></div></div>
</div><div data-element-id="elm_NsBGBABLup8ypuhonD2Sxg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"] .zpimage-container figure img { width: 540px ; height: 140.06px ; } } [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"].zpelem-image { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"].zpelem-image { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"].zpelem-image { border-radius:1px; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/MSallgood.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Implications for Businesses</div></div></h3></div>
<div data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>This incident underscores the critical importance of robust operational and cybersecurity measures and the need for careful management of third-party integrations. It's so often the little things being overlooked that get us in the end.&nbsp;</div><div><br></div><div>Businesses that rely heavily on cloud services and interconnected IT solutions must consider the potential risks associated with such dependencies. The Microsoft-CrowdStrike outage serves as a stark reminder that even the biggest and best trusted providers can pose risks if not managed correctly.</div></div></div>
</div></div><div data-element-id="elm_sLXzkLwatAgV2xQp6agnLw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_sLXzkLwatAgV2xQp6agnLw"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_sLXzkLwatAgV2xQp6agnLw"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_sLXzkLwatAgV2xQp6agnLw"].zpelem-col{ border-radius:1px; } } </style></div>
</div><div data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q"].zpelem-heading { border-radius:1px; } } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Moving Forward</div></div></h2></div>
<div data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>As Microsoft and CrowdStrike work to fully resolve the fallout from this outage, businesses should take this opportunity to reassess their own IT strategies and preparedness. Ensuring that your organization is resilient against similar disruptions is crucial in today's interconnected digital landscape.</p><p><br></p><p>For more information on the current status of Microsoft's services, please visit the <a rel="noreferrer" href="https://admin.microsoft.com/servicestatus">Microsoft Service Status page</a></p></div></div>
</div><div data-element-id="elm_pX_15XsjtltqS4d18clU_g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_pX_15XsjtltqS4d18clU_g"].zpelem-divider{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_pX_15XsjtltqS4d18clU_g"].zpelem-divider{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_pX_15XsjtltqS4d18clU_g"].zpelem-divider{ border-radius:1px; } } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>At Cloud 9 Advisers, we specialize in helping businesses navigate the complex landscape of IT solutions. Our extensive portfolio of top-tier technology providers ensures that you find the right partners to build a resilient and secure IT infrastructure. Whether you're looking to enhance your cybersecurity posture, streamline your operations, or ensure business continuity, our expert advisers are here to guide you every step of the way.</div><div><br></div><div>Don't let unexpected disruptions catch you off guard. Contact Cloud 9 Advisers today and discover how we can help your business stay ahead in the ever-evolving digital world.</div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 19 Jul 2024 09:31:16 -0500</pubDate></item><item><title><![CDATA[Google: an alternative]]></title><link>https://www.cloud9advisers.com/News/post/Google-an-alternative</link><description><![CDATA[Microsoft faces scrutiny after scathing report from DHS. Google says they have the answer.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_u-QY0OelTWGp4Es5KyYmFw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ovuYVeo1TOuWDC5fcZ48Ng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_c2y0JAAyTLerfOTvl5YgPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Google Raises Concern's about Microsoft Security: New Whitepaper shows</h1></div>
<div data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>The Department of Homeland Security’s Cyber Safety Review Board (CSRB) found that repeated security breaches against the federal government were due to a cascade of security failures at Microsoft, as well as a corporate culture that deprioritized cybersecurity.&nbsp;<br>Google proposes a safer alternative.</div></div></div>
</div><div data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width: 500px ; height: 644.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } @media (max-width: 767px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/Google-alternative.png" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Google-alternative.png" width="500" height="644.19" loading="lazy" size="medium"/></picture></a></figure></div>
</div><div data-element-id="elm_h357TC0quc1SuRJpz_me8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h357TC0quc1SuRJpz_me8w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-style:italic;"><a href="/Google-alternative.png" target="_blank" rel="" download="">View and download Google's whitepaper</a></span></p></div>
</div><div data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;">Following several high-profile cybersecurity incidents, Microsoft faces scrutiny. Google's new white paper, &quot;A More Secure Alternative,&quot; highlights its own security practices while referencing a Department of Homeland Security's Cyber Safety Review Board (CSRB) report that identified security failures and poor cybersecurity culture and focus within Microsoft. This report may influence customer decisions: Google or Microsoft?</span><br></div></div>
</div><div data-element-id="elm_56cGU861fzF3e56LbX-Khw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_56cGU861fzF3e56LbX-Khw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Scathing report from DHS</span></h2></div>
<div data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Microsoft's security vulnerabilities reached a critical point recently, exposing U.S. and U.K. government customers in a series of high-profile attacks. Notably, a 2023 incident by Storm-0558 compromised sensitive government accounts across 22 organizations, impacting over 500 individuals and tens of thousands of emails. This breach triggered a scathing report from the Department of Homeland Security's Cyber Safety Review Board (CSRB). The report exposed a chain reaction of security failures and a corporate culture that downplayed both enterprise security investments and rigorous risk management.</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Further amplifying concerns, a separate high-profile incident involved state-backed cyber actors known as Midnight Blizzard. This group successfully compromised Microsoft corporate email accounts, enabling them to steal email exchanges between Federal Civilian Executive Branch (FCEB) agencies and Microsoft. This critical breach prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue Emergency Directive ED 24-02.</span><span style="color:inherit;"><br></span></p></div>
</div><div data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What is the real target?</h2></div>
<div data-element-id="elm_cMJALKBXRETg9ykTfXr-fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cMJALKBXRETg9ykTfXr-fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It's pretty obvious now that government agencies are a prime target for cyberattacks due to their sensitive data and many other factors. Most agencies heavily rely on Microsoft products.&nbsp;</span><span style="color:inherit;">In a 2022 Google survey, 84% of all Washington, D.C. metro area employees use Microsoft products. Furthermore a broader survey from Omdia found 85% of all federal government employees use Microsoft.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Google Workspace has sizable market share in the business, education, and healthcare sectors -&nbsp;</span><span style="color:inherit;">largely due to its ease of use, simple and intuitive interface, comprehensive billing, and most importantly advanced cybersecurity protections built-in.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Does that mean bad actors are targeting customers of Microsoft or going after specific targets of interest? That remains to be seen but likely a little of both. If the target is interesting enough it doesn't matter what platform or systems are used.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Another important question might be: if the tables were turned, Google happened to have higher market share in government, would the &quot;scathing report&quot; be about them? Of course Google doesn't think so.&nbsp;</span></p></div>
</div><div data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Things to consider</h2></div>
<div data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>No one is suggesting you haul off and switch you entire business or government agency from Microsoft to Google (oh, wait... no, that is exactly what Google is hoping for!) but, it might be a good opportunity for a deeper inspection and even a thorough evaluation/comparison of the two. At the least to see what the other has to offer. At least the whitepaper is compelling enough for customers to probe for more.&nbsp;</p><p><br></p><p>Considering such a decision is so big and impactful for everyone involved, consider outside help. A technology adviser or IT consultant can guide you through the process and introduce you to the right experts and partners.&nbsp;</p></div>
</div><div data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Not all is lost</h2></div>
<div data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Google is certainly an option, and a pretty good one at that. Microsoft has made announcements addressing some of the concerns outlined in the report. They are making efforts to change the behavior and culture within Microsoft ranks. A recent Dark Reading article reports that a</span><span style="color:inherit;">t least a portion of executive compensation will be tied to meeting security goals.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Our advice always has been and remains: get the right partner in place. Having the right Microsoft&nbsp;<span style="font-style:italic;font-weight:bold;">or</span>&nbsp;Google partner will have profound impact on your experience with either platform. Consider Cloud 9 your partner finder! That's all we do - connect our clients with the right partners, vendors, suppliers and service providers for Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 Jun 2024 16:13:10 -0500</pubDate></item><item><title><![CDATA[Key security Concepts, 1]]></title><link>https://www.cloud9advisers.com/News/post/key-security-concepts-1</link><description><![CDATA[A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; Key ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jbJe4SA1Q_qeeBdh4gJftQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kn84HiEaSvuEvI3Jf0Lq_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LTQQzcB5R-izLAEoD7QYew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Confidentiality. Integrity. Availability.</span><br></h1></div>
<div data-element-id="elm_SFTsRTD1gvcObz1xf2likA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width: 596.35px !important ; height: 519px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } @media (max-width: 767px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Security%20-%20Three%20of%20Three%20-1-.svg" width="596.35" height="519" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; </span><span style="color:inherit;">Key&nbsp;</span><span style="color:inherit;">concepts for Cybersecurity is starting with a framework. There are plenty of pre-built frameworks available to guide you based on your industry, like NIST, PCI, HIPAA, ISO and more. But before you go there, and maybe before you even pick one, you should start with the Three Rules or Three. The first set starts with Confidentiality, Availability, and Integrity. This is the fine balancing act for Cybersecurity, also known as the “bedrock principle for Cybersecurity.” There’s no such thing as perfect security, you can’t spend all resources on all three areas - so focusing on your specific business needs, and identifying which of these are most important to your business and the separate business units helps properly align Cybersecurity solutions with business outcomes.</span></div></div></div>
</div><div data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If your an accounting firm integrity of data might be most important to you. If your an e-commerce company, then availability is critical. If you're in healthcare, confidentiality may be paramount. Start with the overall needs of the business as a whole, then drill down to the specific needs of each department or business unit. Striking the balance is also important from department to department.&nbsp;</p></div>
</div><div data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cybersecurity"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 May 2024 05:42:00 -0500</pubDate></item><item><title><![CDATA[How to truly go Passwordless]]></title><link>https://www.cloud9advisers.com/News/post/how-to-go-passwrodless</link><description><![CDATA[Patented AI technology provides the strongest end-to-end identity verification authentication and continuous risk management for human and machine identities]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_1vVp8-DgQeWOMNaA3e6Gzg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8FBft7QyROeNdLd6eb5TTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cE8HA9WfTAOLcGM0bMrTFg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_jjqr4wvERnquS4wEfNtDgA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jjqr4wvERnquS4wEfNtDgA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Go beyond the Passwordless hype</h1></div>
<div data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width: 509px !important ; height: 339px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width:509px ; height:339px ; } } @media (max-width: 767px) { [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"] .zpimage-container figure img { width:509px ; height:339px ; } } [data-element-id="elm_A9qHWdJkoCdnjN9-K8bigQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/time-to-change-strong-password-from-weak-notepad-with-passwords.webp" width="509" height="339" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_YOWvBLpgR1yJZxofWJwJRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YOWvBLpgR1yJZxofWJwJRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>Replace dreaded passwords with an intelligent authentication system that learns how people work and keeps them more secure.</div></div></div>
</div><div data-element-id="elm_hya_yFgP14G8U6pDyg21OQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_hya_yFgP14G8U6pDyg21OQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_iQEf6p3WoOGrSTi732FwGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_iQEf6p3WoOGrSTi732FwGg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_YCl7YNHLCR6O53l9oFxSYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YCl7YNHLCR6O53l9oFxSYg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Enterprises need better security.</div></div></h2></div>
<div data-element-id="elm_332vUH6gFM0bwCGFlPCgPQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_332vUH6gFM0bwCGFlPCgPQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">We all know human error is still the largest security &quot;threat&quot;. Fortunately, awareness and training are starting to chip away at the problem. However, at the root of some 81% of data <span style="font-style:italic;">breaches</span>, compromised identity and credentials are the biggest attack vector in the modern enterprise. $16B was spent on Identity and Access Management (IAM) solutions in 2020 yet the problem is only getting worse. Existing solutions are simply not sufficient. Enterprises need better security.</span><br></div></div></div>
</div><div data-element-id="elm_p-6oOnBtVa8sCeXbBrmFXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_p-6oOnBtVa8sCeXbBrmFXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Are you and your users tired of being bombed with MFA requests?&nbsp;</div></div></h2></div>
<div data-element-id="elm_roJiE9FgXnktIjb09qmcfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_roJiE9FgXnktIjb09qmcfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Reach out to your Cloud 9 solutions specialist for an introduction to one of our newest, exclusive cybersecurity providers. They combine the strongest identity proofing, presence, biometrics, and behavioral markers in one continuous engine to deliver the most comprehensive passwordless solution on the planet (a little poetic license, but we’re pretty sure that is Tru).</span><br></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Patented AI technology provides the strongest end-to-end identity verification authentication and continuous risk management for human and machine identities. In combination with your current or a new Security Awareness Training program it will help companies eliminate the most significant causes of data breaches - social engineering attacks, human errors, and misuse.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Passwordless </span><span style="font-size:12pt;">- eliminate passwords as a means of authentication and enable clever and usable biometrics for authentication instead–without new hardware and systems</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Continuous Adaptive Trust / Continuous Authentication (</span><span style="font-size:12pt;font-weight:700;">CAT</span><span style="font-size:12pt;">) - Extend passwordless access beyond just point-in-time authentication, provide identity device and environmental risk assessment at multiple points in time during user sessions. Using patented ML and AI based learning systems that fuse biometrics, behavioral, device, and environmental signals to determine true identity </span><span style="font-size:12pt;font-style:italic;">continuously</span><span style="font-size:12pt;">, in a globally compliant manner.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Converged </span><span style="font-size:12pt;">- merge the digital and physical world by enabling trusted physical access to buildings, server rooms, restricted physical areas, and all integrated with Passwordless and CAT solutions.&nbsp;</span></p></div>
</div><div data-element-id="elm_f6mVQE2akrizEl3caEj6ew" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_f6mVQE2akrizEl3caEj6ew"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">COMPLETE</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Cover all work scenarios with support for Windows, Mac, Linux, and servers; web and native mobile apps; and passwordless VDI and network access (VPN, wireless)</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONTINUOUS</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Go beyond point-in-time initial authentication and extend security within the working session, continuously learning and assessing behavioral risk</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONNECTED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Easy to deploy into any environment with rich, standards-based, pre-built integrations</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">COORDINATED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Enjoy workflow and policy-driven self-service identity proofing, onboarding, and account recovery</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">CONVERGED</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Unify physical and digital security into the same solution, allowing for greater flexibility in workplace design and management</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div></div><div data-element-id="elm_vfwcVpEXiljVBG8nlTtxgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vfwcVpEXiljVBG8nlTtxgw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_etFWwvUfSBe7Gp7SWB42lw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_etFWwvUfSBe7Gp7SWB42lw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_qXBMZ2llVHUL6vml-zNM8A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qXBMZ2llVHUL6vml-zNM8A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9</h2></div>
<div data-element-id="elm_G9bSP9GAd49YZ5yVjoYMPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G9bSP9GAd49YZ5yVjoYMPA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Cloud 9 Advisers exists to help organizations make smart IT decisions quickly and confidently. We work with leadership and understaffed IT teams who are embarking on projects outside their wheelhouse and help to rationalize IT spend. We are objective, impartial, and unbiased technology sourcing experts with vendor-neutral engineering teams that focus on four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. We do not sell solutions, we work with you to identify and research solutions. We are not another vendor, we are your partner helping you evaluate and compare vendors; so you can solve problems and achieve business outcomes, fast.</div><br><div><br></div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 26 Apr 2024 17:08:43 -0500</pubDate></item><item><title><![CDATA[Gone Phishin']]></title><link>https://www.cloud9advisers.com/News/post/gone-phishin</link><description><![CDATA[How do you make sure they get it? Any Security Awareness Training (SAT) program worth it's salt should have phishing simulation built it. This article breaks down the benefits, from measuring your employees' security awareness to creating a robust culture of security within your organization]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yh9E0qS8QRCLVOhOZBtECQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_cmTvcBk5R6qCrTN0a_-mMA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_FYfILkFASHilE4nIBFxXLQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pGAEwMj4Qw-X2BsHWSsGbw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">SATs plus Phishing Simulation,&nbsp; A No-Brainer</h2></div>
<div data-element-id="elm_ZC_GRSvORHOj8Q0u6ZAvUQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZC_GRSvORHOj8Q0u6ZAvUQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Arm yourself with knowledge and enhance your organization's cyber resilience.&nbsp;</span>Any Security Awareness Training (SAT) program worth it's salt should have phishing simulation built in.&nbsp;<span style="color:inherit;">Uncover the power of testing your team's resilience against the ever-evolving threat of phishing attacks.</span></p></div>
</div><div data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width: 1110px ; height: 740.23px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width:723px ; height:482.15px ; } } @media (max-width: 767px) { [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"] .zpimage-container figure img { width:415px ; height:276.75px ; } } [data-element-id="elm_UQ9x91VDD1o8DYtyROzxbw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Fichinggear.jpg" width="415" height="276.75" loading="lazy" size="fit" alt="phishing: get the right gear " data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Ut-IXSwHsErvU-q96vfiJA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Ut-IXSwHsErvU-q96vfiJA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ErohqKevIZpCbCpNfYy8yg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ErohqKevIZpCbCpNfYy8yg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_rdkX4Y-1dSyg7QqF7NvHjg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rdkX4Y-1dSyg7QqF7NvHjg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strengthening Cyber Defenses</span></h2></div>
<div data-element-id="elm_nK3v7DYVyKxyhK40QmXdnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nK3v7DYVyKxyhK40QmXdnA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In the ever-evolving landscape of cybersecurity, where human error remains the leading cause of incidents, the significance of robust Security Awareness Training (SAT) cannot be overstated. A recent study by IBM revealed that a staggering 95% of cybersecurity breaches stem from human error, emphasizing the critical need for proactive measures. In our previous exploration of SAT, we delved into the pivotal role it plays in mitigating these errors. Now, let's journey further into the realm of cyber resilience and focus on a key augmentation to SAT – the indispensable Phishing Simulation.</div></div>
</div></div><div data-element-id="elm_1bLPKzhlrFEGJNIHmFAMiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1bLPKzhlrFEGJNIHmFAMiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">The Power of Security Awareness Training:</span></div><div>Security Awareness Training (SAT) acts as a shield against the inadvertent actions and decisions that can lead to security breaches. It equips your staff with the knowledge to navigate the intricate web of scams, tactics, and evolving security threats. This empowerment, in turn, aids in fostering a security-conscious culture within the organization, reducing the exposure to potential risks.</div></div></div>
</div><div data-element-id="elm_Q1Egef7ApYLavdkL8b6LVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q1Egef7ApYLavdkL8b6LVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Enter Phishing Simulation:</span></div><div>While SAT lays the groundwork for understanding security principles, the integration of phishing simulation takes your cybersecurity strategy to the next level. It serves as the litmus test for your employees' comprehension of security threats, specifically their ability to identify and thwart phishing attempts.</div></div></div>
</div><div data-element-id="elm_6vqCB8i9oG56Alja-1nHig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6vqCB8i9oG56Alja-1nHig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Putting Knowledge to the Test:</span></div><div>Phishing simulation operates on the premise of realism. By deploying lifelike phishing scenarios, organizations can gauge the reactions of their employees in real-time. Do they recognize the subtle signs of a phishing email, or do they inadvertently open the door to potential threats? The simulation provides invaluable insights into the efficacy of your SAT program and identifies areas that may require additional attention.</div><div><br></div><div><span style="font-weight:bold;">Creating a Cyber-Resilient Workforce:</span></div><div>The true value of phishing simulation lies in its ability to fortify your workforce against the ever-persistent threat of phishing attacks. It goes beyond theoretical knowledge, allowing employees to apply their learning in a practical setting. As they face simulated phishing attempts, the training becomes a dynamic experience, honing their instincts and enhancing their ability to make informed decisions.</div></div></div>
</div><div data-element-id="elm_s-tZ3ZYGSTPbe5DG7EwIIQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s-tZ3ZYGSTPbe5DG7EwIIQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-weight:bold;">Strategic Benefits of Phishing Simulation:</span></div><div><ol><li><span style="font-weight:bold;">Measuring Security Awareness:</span>&nbsp;Phishing simulation becomes a litmus test for your employees' security awareness. Identify those who may be more susceptible to falling victim to a phishing attack, enabling a targeted and effective SAT program.</li><li><span style="font-weight:bold;">Enhancing Phishing Identification Skills:</span> Practical exposure to realistic phishing emails sharpens your team's ability to discern the telltale signs of a scam. This, in turn, empowers them to avoid clicking on malicious links or opening potentially harmful attachments.</li><li><span style="color:inherit;"><span style="font-weight:bold;">Fostering a Culture of Security:</span> Beyond individual training, phishing simulation contributes to creating a broader culture of security within your organization. When employees witness the organization's commitment to rigorous testing, they are more likely to embrace and adhere to security precautions.</span><br></li><li><span style="font-weight:bold;">Reducing the Risk of Data Breaches&nbsp;</span>By reducing the number of employees susceptible to phishing attacks, organizations can significantly lower the risk of data breaches. This proactive approach safeguards against financial losses, reputational damage, and potential regulatory fines.</li></ol></div></div></div>
</div><div data-element-id="elm_Czr4XaK8rSVoZWTVt1LPeA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Czr4XaK8rSVoZWTVt1LPeA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">In the intricate dance between cybersecurity and human behavior, the synergy between SAT and phishing simulation emerges as a formidable defense. Together, they empower your workforce to navigate the digital landscape with confidence and resilience. As we continue to unravel the layers of cyber resilience, the integration of these two components stands as a testament to the proactive measures organizations can take to secure their digital future.</span><br></p></div>
</div><div data-element-id="elm_D3JY2olThnNIJPyTecDpMg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_D3JY2olThnNIJPyTecDpMg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div></div><div data-element-id="elm_asEEiIWQCazHW3X3kMnKxw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_asEEiIWQCazHW3X3kMnKxw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_wIxa3v2SMdOUWFlYbpa1jQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wIxa3v2SMdOUWFlYbpa1jQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers</h2></div>
<div data-element-id="elm_X8m4xCwJtbkfaBfFpez5Qg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_X8m4xCwJtbkfaBfFpez5Qg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Let us help you find the right SAT and Phishing simulation solutions and providers. Our only job in this world is to help organizations buy &quot;cool&quot; and important stuff: i.e. cybersecurity.&nbsp;</p></div>
</div><div data-element-id="elm_G4p6T1TmsxQw_TRfzwakAQ" data-element-type="buttonicon" class="zpelement zpelem-buttonicon "><style> [data-element-id="elm_G4p6T1TmsxQw_TRfzwakAQ"].zpelem-buttonicon{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none zpbutton-icon-align-left " href="/contact-us"><span class="zpbutton-icon "><svg viewBox="0 0 512 512" height="512" width="512" xmlns="http://www.w3.org/2000/svg"><path d="M500 224h-30.364C455.724 130.325 381.675 56.276 288 42.364V12c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v30.364C130.325 56.276 56.276 130.325 42.364 224H12c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h30.364C56.276 381.675 130.325 455.724 224 469.636V500c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-30.364C381.675 455.724 455.724 381.675 469.636 288H500c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12zM288 404.634V364c0-6.627-5.373-12-12-12h-40c-6.627 0-12 5.373-12 12v40.634C165.826 392.232 119.783 346.243 107.366 288H148c6.627 0 12-5.373 12-12v-40c0-6.627-5.373-12-12-12h-40.634C119.768 165.826 165.757 119.783 224 107.366V148c0 6.627 5.373 12 12 12h40c6.627 0 12-5.373 12-12v-40.634C346.174 119.768 392.217 165.757 404.634 224H364c-6.627 0-12 5.373-12 12v40c0 6.627 5.373 12 12 12h40.634C392.232 346.174 346.243 392.217 288 404.634zM288 256c0 17.673-14.327 32-32 32s-32-14.327-32-32c0-17.673 14.327-32 32-32s32 14.327 32 32z"></path></svg></span><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 04 Dec 2023 11:53:38 -0500</pubDate></item><item><title><![CDATA[Always-On Endpoint Management]]></title><link>https://www.cloud9advisers.com/News/post/always-on-endpoint-management</link><description><![CDATA[In a world where employees are increasingly working from anywhere and on any device, it's more important than ever to have a solution in place that can manage and protect all endpoints at all times.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ySVH76efQ62VB_veNkwGVg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dX0DToqGSlGiEMcXZkj3UA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_l_YWXfYJTp-sZL1YyjsiGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Dr6nyHGHQuW-MT-OFu01Pg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Dr6nyHGHQuW-MT-OFu01Pg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div>Always-on endpoint management is a must-have</div></div></h2></div>
<div data-element-id="elm_Rz8W-V3rGYLpyLYll5lOAA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Rz8W-V3rGYLpyLYll5lOAA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_LdAUsiXlVWQjCA1wfGIbfA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_LdAUsiXlVWQjCA1wfGIbfA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_wzK-_ZLqwDaqF0KJDqxN6Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wzK-_ZLqwDaqF0KJDqxN6Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="font-size:16px;color:inherit;">Always-on endpoint management is a must-have for enterprises today.</span><br></div><div><br></div><div><p style="margin-bottom:24px;font-size:16px;">In a world where employees are increasingly working from anywhere and on any device, it's more important than ever to have a solution in place that can manage and protect all endpoints at all times.</p><p style="margin-bottom:24px;font-size:16px;">Here are just a few of the benefits of always-on endpoint management:</p><ul><li style="margin-bottom:10px;"><span style="font-weight:bold;">Improved security</span>:&nbsp;Always-on endpoint management can help to protect your organization from cyber threats by providing real-time visibility and control over all endpoints.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Reduced downtime</span>:&nbsp;By proactively monitoring and managing endpoints, always-on endpoint management can help to reduce downtime and keep your employees productive.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Increased compliance</span>:&nbsp;Always-on endpoint management can help you to comply with industry regulations by ensuring that all endpoints are configured and patched correctly.</li></ul><p style="margin-bottom:24px;font-size:16px;"><span style="color:inherit;">If you're not already using an always-on endpoint management solution, here are a few things to consider when choosing one:</span><br></p><ul><li style="margin-bottom:10px;"><span style="font-weight:bold;">Comprehensive endpoint visibility</span>:&nbsp;Make sure that the solution you choose provides comprehensive visibility into all endpoints, including laptops, desktops, mobile devices, and IoT devices.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Real-time monitoring and control</span>:&nbsp;The solution should also be able to monitor and control endpoints in real time, so that you can quickly respond to threats and incidents.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Security automation</span>:&nbsp;The solution should be able to automate many common security tasks, such as patch management and vulnerability scanning.</li><li style="margin-bottom:10px;"><span style="font-weight:bold;">Compliance reporting</span>:&nbsp;The solution should also be able to generate reports that can help you to comply with industry regulations.</li></ul></div><div><div style="color:inherit;"><br><div><div><span style="font-size:16px;">Read more from our friends at Spiceworks:&nbsp;<a href="https://www.spiceworks.com/it-security/endpoint-security/guest-article/why-enterprise-needs-always-on-endpoint-management/">https://www.spiceworks.com/it-security/endpoint-security/guest-article/why-enterprise-needs-always-on-endpoint-management/</a></span></div><br><div><br></div><br></div></div></div></div></div>
</div></div><div data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw"].zpelem-col{ border-radius:1px; } @media (min-width:992px) { [data-element-id="elm_JWf4ErFCYxwBGPzOhVpnTw"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_F1PH6uHK7-vh0RToDenqjg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width: 333px !important ; height: 151px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width:333px ; height:151px ; } } @media (max-width: 767px) { [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"] .zpimage-container figure img { width:333px ; height:151px ; } } [data-element-id="elm_F1PH6uHK7-vh0RToDenqjg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/EPSec.jpg" width="333" height="151" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_bCZ-B98r91F6sf7v4mnIiA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_bCZ-B98r91F6sf7v4mnIiA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cyber Readiness</h2></div>
<div data-element-id="elm_IGwDPez9rt7JL7nAnHk5tg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IGwDPez9rt7JL7nAnHk5tg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Click the button below to schedule your appointment and learn more about our Cybersecurity Readiness Report - custom tailored recommendations and roadmap for your business and your needs</p></div>
</div><div data-element-id="elm_pOCBkhdUWC-I6CusHlFDkA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_pOCBkhdUWC-I6CusHlFDkA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="https://appts.cloud9advisers.com/#/customer/cybersurvey" target="_blank"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_FFcgyMHOpEcdMrLTmUQ3Tw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FFcgyMHOpEcdMrLTmUQ3Tw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Technology Sourcing</h2></div>
<div data-element-id="elm_NbNpljBLQ6CwgJVj0sb0ZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_NbNpljBLQ6CwgJVj0sb0ZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:11pt;">Cybersecurity can be complex, but getting the right strategy and solutions in place doesn’t have to be.&nbsp; Cloud 9 Advisers&nbsp;</span><span style="font-size:11pt;">will provide you clarity so you can make quick and confident IT buying decisions.&nbsp;</span><span style="font-size:11pt;">We help decision-makers make smart IT investments.&nbsp;</span></p></div>
</div><div data-element-id="elm_igc090WjSkS6FsDE8rs8Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_igc090WjSkS6FsDE8rs8Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cyber-threats"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 14 Nov 2023 13:06:11 -0500</pubDate></item><item><title><![CDATA[The new SATs]]></title><link>https://www.cloud9advisers.com/News/post/the-new-sats</link><description><![CDATA[A well orchestrated Security Awareness Training (SAT) program for every single person in your company is perhaps the single most important cybersecurity tool, feature, element, solution, or service one could implement.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_7ZlzfaIZQNW8_m_aRiItSw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ZSR83gPWT4aAw7RxeglywA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mKlp0C1bTmWOePWIjJnb2g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_KUdxw2b6SlaFZSFSx4k53Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KUdxw2b6SlaFZSFSx4k53Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Have you taken your SATs?</h2></div>
<div data-element-id="elm_i_3Pa0_oRaK-_0vQJ_Rlkw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_i_3Pa0_oRaK-_0vQJ_Rlkw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>A well orchestrated Security Awareness Training (SAT) program for every single person in your company is perhaps the single most important cybersecurity tool, feature, element, solution, or service one could implement.&nbsp;&nbsp;</p></div>
</div><div data-element-id="elm_0DmXovpNlKwJQwieDk-t0A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"] .zpimage-container figure img { width: 1000px !important ; height: 571px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"] .zpimage-container figure img { width:1000px ; height:571px ; } } @media (max-width: 767px) { [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"] .zpimage-container figure img { width:1000px ; height:571px ; } } [data-element-id="elm_0DmXovpNlKwJQwieDk-t0A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/SAT.jpg" width="1000" height="571" loading="lazy" size="original" alt="Image By vecstock" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vm0MRDgsEEYz4IC5s6TXrg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_vm0MRDgsEEYz4IC5s6TXrg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_tJm6KCpFPA7M8RhNAbSyxQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_tJm6KCpFPA7M8RhNAbSyxQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_oZ-jMDILfa2R0DDMa3yWgg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_oZ-jMDILfa2R0DDMa3yWgg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Knowledge is power</span></h2></div>
<div data-element-id="elm_LVpVYmllPlZORmhd_hNWWQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LVpVYmllPlZORmhd_hNWWQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(11, 35, 45);"><span style="font-size:12pt;">Human error is the number one reason for cybersecurity incidents. Security Awareness Training (SAT) is critically important for your staff and the integrity of your business - a</span><span style="font-size:16px;">rguably</span><span style="font-size:12pt;">&nbsp;more so than perhaps any other single cybersecurity solution or service. It helps to protect your organization from cyberattacks, breaches, data loss, and &quot;silly&quot; mistakes.&nbsp;</span></span></p><p><span style="color:rgb(11, 35, 45);"><span style="font-size:12pt;"><br></span></span></p><p><span style="color:rgb(11, 35, 45);"><span style="font-size:12pt;">By training your staff on the latest security threats and best practices, you can help them to make more informed decisions about their behavior both online and while using company IT resources, reducing risk and exposure.</span></span><br></p></div>
</div><div data-element-id="elm_s1xnyGQQ6UNpGy5MqrIbXg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s1xnyGQQ6UNpGy5MqrIbXg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><div><div><span style="color:rgb(11, 37, 45);">6 Reasons why</span></div><ol><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Human error is a major security risk</span>: Studies have shown that a significant number of security breaches and data incidents occur due to human error. Employees may unknowingly fall victim to phishing attacks, click on malicious links, use weak passwords, or mishandle sensitive data. SAT helps educate and train staff members to recognize and avoid these common pitfalls, reducing the risk of security incidents caused by human error.<br></span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Protection against social engineering attacks</span>: Social engineering attacks, such as phishing or impersonation, rely on manipulating individuals to gain unauthorized access or sensitive information. SAT teaches employees to identify and respond appropriately to these tactics, enhancing their ability to detect and report suspicious activities. By raising awareness of social engineering techniques, SAT helps create a more vigilant and security-conscious workforce.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Compliance with regulations and standards</span>: Many industries are subject to specific regulations and standards regarding data protection and privacy, such as the General Data Protection Regulation (GDPR) or the Health Insurance Portability and Accountability Act (HIPAA). Security awareness training ensures that employees understand these requirements and their role in maintaining compliance. Failure to comply with these regulations can result in severe penalties and reputational damage.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Reinforcing security policies and procedures</span>: SAT serves as a platform to communicate and reinforce security policies, procedures, and best practices within an organization. It helps employees understand the importance of adhering to security guidelines and provides them with practical knowledge on how to handle sensitive data, use secure communication channels, and protect their devices. Regular training sessions help keep security at the forefront of employees' minds and foster a culture of security within the organization.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Mitigating insider threats</span>: While most employees are trustworthy, insider threats can still occur. Security awareness training educates staff about the potential risks associated with insider threats, such as unauthorized data access or data theft. By raising awareness, organizations can encourage employees to report suspicious activities and create a sense of accountability within the workforce.</span></li><li><span style="color:rgb(11, 37, 45);"><span style="font-weight:bold;">Reducing the impact of cyberattacks</span>: In the event of a cyberattack, well-trained employees can significantly reduce the impact and help mitigate the damage. SAT equips staff with the knowledge and skills to respond effectively, report incidents promptly, and follow incident response protocols. Their ability to recognize and respond to security incidents promptly can help contain threats and minimize the potential harm to the organization.</span></li></ol></div></div></div>
</div><div data-element-id="elm_ZsIohYPIAn0QqlgBluN9XQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZsIohYPIAn0QqlgBluN9XQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-right:18pt;margin-bottom:18pt;"><span style="font-size:12pt;">Overall, Security Awareness Training is an important investment for any organization that wants to protect its data, resources, and IT assets from cyberattacks. By training your staff on the latest security threats and best practices, you can help to reduce the risk of security incidents and protect your organization's reputation and bottom line.</span></p></div>
</div></div><div data-element-id="elm_vDNwfv5PePEvxDlKT6hr2A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vDNwfv5PePEvxDlKT6hr2A"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_jQN_MKUW5fvMW9Sjrz3xAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jQN_MKUW5fvMW9Sjrz3xAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers can help</h2></div>
<div data-element-id="elm_SzvNms9I9F3dqrE26tQqVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SzvNms9I9F3dqrE26tQqVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">There are many problems faced when buying IT services and solutions. Two big ones are the pace of change and too many choices. Cloud 9 solves decision paralysis with our IT decision-making platform. You get an expert, one-on-one, that will guide you through the entire process. We'll help you identify and research proper solutions then evaluate and compare the multitude of security awareness training solutions available today.</span></span><br></p></div>
</div><div data-element-id="elm_SqFrYOFPS-emVu-bcWHJvQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_SqFrYOFPS-emVu-bcWHJvQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book now"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 03 Nov 2023 15:20:08 -0500</pubDate></item></channel></rss>