<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/compliance/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #compliance</title><description>Cloud 9 Advisers - News #compliance</description><link>https://www.cloud9advisers.com/News/tag/compliance</link><lastBuildDate>Tue, 24 Feb 2026 08:38:29 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[CMMC: 6 Key Takeaways]]></title><link>https://www.cloud9advisers.com/News/post/cmmc-6-key-takeaways</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/Blog images/CMMCNIST.jpg"/>The CMMC final rule is here, and it's full of surprises. Cut through the noise: learn the 6 counter-intuitive takeaways that change how you approach compliance, secure contracts, and manage your IT risk. It's time to stop stressing and start executing.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_CrKfT6_LQPmBSTjx5KOfnQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_5B1clkVKTB2wxTYeDqd3Pw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ydTkdgvVQKSiZfYwV9tnNw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Z3iypXRyTHuhr6NgvP-HCA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule</span></h1></div>
<div data-element-id="elm_JQYyNwpXdfEiERmpoq5Fpw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span style="font-weight:bold;">What Everyone Gets Wrong About CMMC: 6 Key Takeaways from the Final Rule </span></p><p>The Cybersecurity Maturity Model Certification (CMMC) final rule is here, and it challenges everything the Defense Industrial Base (DIB) thought it knew about compliance, cost, and contract eligibility.</p></div><p></p></div>
</div><div data-element-id="elm_9urmD805bUpGGXc185yCDA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_9urmD805bUpGGXc185yCDA"] .zpimage-container figure img { width: 1110px ; height: 312.19px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/DOD%20CMMC%20Smallbiz.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_7fMLqjXkRSWFBIfYzvTuDg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p></p><div><p>Unlocking clarity in the complex world of CMMC compliance.</p></div><p></p></div>
</div><div data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_WdKX5GDyarMTEEHvk6SJrg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_bFTwYM27zyZPkgYR8hZx9g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_Kf7LpkbeHUM3yLOrdNLfYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_t3kIWSemnePpyIeSPvC9eg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h3>The CMMC Final Rule: What You Thought You Knew Just Changed</h3><p>For government contractors, the Department of Defense's Cybersecurity Maturity Model Certification (CMMC) program has been a source of complexity, cost, and considerable anxiety. Since its inception, the regulation has evolved, leaving many in the Defense Industrial Base (DIB) struggling to keep up with its requirements and implications. The goal is clear: to secure the DIB against evolving cybersecurity threats and protect sensitive government information.</p><p><br/></p><p>Beneath the dense regulatory language of the final rule, however, are several surprising, counter-intuitive, and impactful realities that every business in the DIB needs to understand. These aren't minor details; they are fundamental aspects of the program that challenge common assumptions and have significant strategic implications for contract bidding, IT investment, and risk management.</p><p><br/></p><p>This article distills the official CMMC rule documents into a clear, scannable list of the most critical takeaways. It cuts through the noise to reveal what the Pentagon’s new cybersecurity rules really say and what they mean for your business. <strong>Our goal is to give you clarity and confidence to make quick, informed decisions.</strong></p><h3><br/></h3><h3>Takeaway 1: &quot;Self-Attestation&quot; Isn't Dead—It Just Evolved</h3><p>A core motivation behind the original CMMC program was to move the DIB away from the &quot;self-attestation&quot; model of security that the DoD had previously relied on for NIST SP 800-171 compliance. The perception was that self-reporting wasn't effective enough, necessitating a shift toward third-party verification.</p><p><br/></p><p>The surprising twist is that the revised CMMC Program (often called CMMC 2.0) streamlined the model and <strong>reintroduced self-assessments as a valid compliance pathway.</strong> The final rule confirms that companies at <strong>Level 1</strong> and a subset of companies at <strong>Level 2</strong> are allowed to demonstrate compliance through annual self-assessments rather than a mandatory third-party audit.</p><p><br/></p><p>This is a significant and <strong>pragmatic change</strong> that alleviates the immediate, immense cost and logistical burden a universal audit requirement would have placed on the DIB, especially on small businesses. This evolution represents a calculated, risk-based decision by the DoD, which has determined that for contracts involving less sensitive information, the risk of unverified compliance is acceptable when weighed against the practical realities and costs imposed on the defense industrial marketplace.</p><h3><br/></h3><h3>Takeaway 2: Perfection Isn't Required to Win a Contract</h3><p>A common misconception about CMMC is that a contractor must have a perfect cybersecurity assessment score to be eligible for a contract award. This assumption has been a major source of stress for companies working toward compliance, as achieving 100% implementation of all security controls is a formidable task.</p><p><br/></p><p>The final rule clarifies that this is not the case. An organization can be awarded a contract by achieving a <strong>&quot;Conditional Level 2&quot; or &quot;Conditional Level 3&quot;</strong> CMMC status. To qualify, a company must achieve a minimum score equal to 80% of the maximum score on a CMMC Level 2 or Level 3 assessment. All unmet requirements must be documented in a Plan of Action and Milestones (POA&amp;M).</p><p><br/></p><p>Critically, the organization has a <strong>180-day deadline</strong> from the date of the conditional assessment to close out the POA&amp;M and meet all remaining requirements. This is a significant and practical concession from the DoD, allowing companies to <strong>win business while still finalizing their compliance efforts</strong>.</p><h3><br/></h3><h3>Takeaway 3: The Government Won't Tell You Exactly What to Protect</h3><p>One of the most persistent areas of confusion for contractors is determining what information, exactly, constitutes Controlled Unclassified Information (CUI). Many have asked the government for clearer definitions, guidance, and contract-specific lists to help define the scope of their CMMC efforts.</p><p><br/></p><p>The counter-intuitive reality is that the DoD has officially stated this is outside the scope of the CMMC rule, placing the primary responsibility for identifying CUI <strong>squarely on the contractor</strong>. The rule's commentary includes a direct and unambiguous response to industry requests for guidance:</p><blockquote><p><em><br/></em></p><p><em>The CMMC Program will not provide CUI guidance materials to industry as it is outside the scope of this CMMC rule.</em></p></blockquote><p><br/></p><p>The document further clarifies that official DoD policy states, &quot;The authorized holder of a document or material is responsible for determining, at the time of creation, whether information in a document or material falls into a CUI category.&quot; This places a significant burden on contractors, who must become experts in <strong>data classification</strong> to accurately define the scope of their own CMMC assessments.</p><h3><br/></h3><h3>Takeaway 4: The Biggest Costs of CMMC Aren't Considered &quot;CMMC Costs&quot;</h3><p>The high cost of CMMC compliance is a major concern across the DIB. However, the DoD's official position on what constitutes a &quot;CMMC cost&quot; may come as a surprise. The costs to <strong>implement</strong> the required security controls for Level 1 (from FAR 52.204-21) and Level 2 (from NIST SP 800-171) are <strong>not</strong> considered costs attributable to the CMMC rule.</p><p><br/></p><p>The government's rationale is that these implementation requirements were mandated years earlier, with a deadline to implement the NIST SP 800-171 controls set back in December 2017. Therefore, from the DoD's perspective, companies should have already incurred these implementation costs. The only new costs officially attributed to CMMC Levels 1 and 2 are for the <strong>assessment and affirmation</strong> activities required to verify that those pre-existing requirements have been met. The DoD reinforces its perspective on the necessity of these costs with a powerful statement:</p><blockquote><p><em><br/></em></p><p><em>The cost of lost technological advantage over potential adversaries is greater than the costs of such enforcement.</em></p></blockquote><h3><br/></h3><h3>Takeaway 5: Your Cloud Provider Is Part of Your Audit</h3><p>A company’s CMMC compliance boundary does not end with its own on-premises servers and workstations. If an organization uses an external Cloud Service Provider (CSP) to process, store, or transmit CUI, that CSP is <strong>unequivocally part of the CMMC assessment scope</strong>.</p><p><br/></p><p>The final rule specifies a clear and impactful requirement for these providers: the CSP must meet the <strong>FedRAMP Moderate baseline</strong> or an equivalent standard. The rule documents are explicit on this point, stating the following:</p><blockquote><p><em><br/></em></p><p><em>...the DoD is not willing to assume all the risk of non-FedRAMP Moderate Equivalent CSOs when the CSO is used to process, store, or transmit CUI.</em></p></blockquote><p><br/></p><p>This effectively makes <strong>vendor selection a compliance decision</strong>, not just an IT one. The contractor is ultimately responsible for ensuring its entire CUI data chain—including services provided by third parties—meets DoD's stringent security standards.</p><h3><br/></h3><h3>Takeaway 6: The &quot;COTS Exception&quot; Is Narrower Than You Think</h3><p>The CMMC rule provides a well-known exemption for contracts that are <strong>solely</strong> for the acquisition of Commercially Available Off-the-Shelf (COTS) items. This has led some to believe that if they sell COTS products, they are exempt from CMMC entirely.</p><p><br/></p><p>However, there is a critical and surprising nuance in this rule. The source text clarifies: <strong>&quot;The exemption does not apply to a contractor's use of COTS products within its information systems that process, store, or transmit CUI.&quot;</strong></p><p><br/></p><p>A simple example illustrates this crucial distinction:</p><ul><li><p>A company whose contract is <em>solely</em> to sell COTS laptops directly to the DoD might be exempt from CMMC for that specific contract.</p></li><li><p>However, if that same company uses those same COTS laptops <strong>in its own corporate network</strong> to perform work on a different DoD contract that involves CUI, then its network <strong>is</strong> subject to CMMC requirements.</p></li></ul><p><br/></p><p>The exemption applies to <strong>what is being sold</strong>, not to <strong>what is being used to perform contract work involving sensitive data</strong>. This is a crucial detail that could easily lead to a failed assessment if misinterpreted.</p><h3><br/></h3><h3>Conclusion: A New Era of Accountability and Pragmatism</h3><p>The Cybersecurity Maturity Model Certification program represents a fundamental shift in the DoD's approach to securing its supply chain. It moves the DIB from a model based on trust and self-attestation to one centered on verification and accountability. Yet, as these takeaways reveal, the final rule is not a rigid, one-size-fits-all mandate. It includes pragmatic allowances—such as self-assessments and conditional certifications—that acknowledge the business realities faced by the thousands of companies that support the U.S. warfighter.</p><p><br/></p><p>The rules are now set, and the phased implementation is underway. With this new era of accountability beginning, the true test now begins: will this landmark regulation successfully raise the DIB's security baseline to protect against advanced threats, or will it create unforeseen obstacles for the very innovators the DoD relies on? The path forward requires clarity, and recognizing these six realities is the first step toward confident compliance.</p></div><p></p></div>
</div></div><div data-element-id="elm_u4jtLHuu95aVqoSw57_pGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_5YETy6OdEpzOZhUe2TZVIQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_5YETy6OdEpzOZhUe2TZVIQ"].zpelem-divider{ margin-block-start:47px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_a8ThMKJKSJW5zjjmqAgPDA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/assessments" target="_blank"><span class="zpbutton-content">3rd-Party Assessments</span></a></div>
</div><div data-element-id="elm_z63eqdvp1fudtxaZpzjCzA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/security-readiness" target="_blank"><span class="zpbutton-content">Initial Evaluation</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 20 Oct 2025 09:49:47 -0500</pubDate></item><item><title><![CDATA[The (Data) Constitution]]></title><link>https://www.cloud9advisers.com/News/post/the-data-constitution</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/Blog images/US Constitution.jpg"/>Explore why robust data governance is essential for ethical, compliant, and effective AI deployment in mid-sized organizations, covering regulatory and ethical considerations.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_bWthBAKbTUGMQi1vDLzxvw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_IhiUOfwhTcym_NLGrFuhnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Y-H0qfOTSTmfnhT7JO-vGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_CxwZDIJNS-yqaSqu_owwCA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span><span>Governing Your AI's Future</span></span></h1></div>
<div data-element-id="elm_fhLXwuW9SNu7brukI0BMLQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>Robust data governance is essential for ethical, compliant, and effective AI deployments in organizations, covering regulatory and ethical considerations.</span></p></div>
</div><div data-element-id="elm_BVaLmIydi0rLbnXfR2eBZA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_BVaLmIydi0rLbnXfR2eBZA"] .zpimage-container figure img { width: 1000px !important ; height: 667px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/US%20Constitution.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_dGbFyjLwam2xv6c5wo6Mgg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_-o4GBhACcQxZY7n6J2rfmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_vsc5B5ZlX8YtUBukEEMUSA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>In our journey through AI data readiness, we've explored how data is the true magic behind Artificial Intelligence and why its quality is paramount. Now, it's time to delve into the foundational framework that underpins both: Data Governance. Think of data governance as the &quot;constitution&quot; for your organization's data – a living document of policies, principles, and procedures that dictate how data is collected, stored, used, and protected. Without this robust constitution, your AI initiatives, no matter how innovative, risk operating in a chaotic, non-compliant, and ultimately unsustainable environment. For mid-sized organizations navigating the complex currents of AI adoption, establishing sound data governance isn't just a best practice; it's a strategic imperative for building a trustworthy and resilient AI-powered future.</div><br/><div>The promise of AI is immense, offering mid-sized businesses the agility and insights once exclusive to larger enterprises. However, the rapid pace of AI adoption often outstrips the foundational work required to manage the data that fuels it. This is where data governance steps in – not as a bureaucratic hurdle, but as the essential blueprint for order, ethics, and compliance in your AI ecosystem. It's the difference between a well-ordered society and a free-for-all.</div><br/><div>Data governance refers to the overarching policies and procedures that determine an organization's overall data readiness. It's about establishing clear accountability and processes for managing data assets, ensuring they are available, usable, secure, and compliant throughout their lifecycle. For AI, this means ensuring the data fed into models is not only high-quality but also ethically sourced, legally permissible, and consistently managed.</div></div><p></p></div>
</div><div data-element-id="elm_YZDgp7vVeuR2rjhd5CwjYQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Core Components of Your Data Constitution<br/></span></h2></div>
<div data-element-id="elm_7cXHq3IVtWfMGjcn-qf6dg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>A robust data governance framework is built upon several interconnected pillars, each vital for supporting effective AI deployment:</div></div><p></p></div>
</div><div data-element-id="elm_hi29NMQYV5j2RPcAehvbpw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>1. The Rulebook</span><br/></h4></div>
<div data-element-id="elm_dhp0ME97Un0wGjqaNbF2yA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span><span>Policies and Standards:&nbsp;</span>These are the defined guidelines for how data is handled across the organization. They cover everything from data entry protocols to data retention schedules. For AI, clear policies ensure consistency in data collection, labeling, and usage, which directly impacts model accuracy and reliability. Standards dictate formats, definitions, and quality benchmarks, ensuring that data from disparate sources can be harmonized for AI consumption.</span></p><p></p></div>
</div><div data-element-id="elm_RKWTIf6DzQyMZLYh10o2aw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>2. Navigating the Legal and Moral Landscape<br/></span></h4></div>
<div data-element-id="elm_ry1GYvBFa9769O4d7JZaNA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span><span>Regulatory &amp; Ethical Considerations:&nbsp;</span>This is perhaps the most complex and rapidly evolving aspect of data governance for AI. The global regulatory landscape for data privacy is a labyrinth, with over 144 countries now having national data privacy laws. For mid-sized firms operating internationally or handling diverse customer data, navigating this patchwork of regulations is critical.</span></p><ul><li><p><span style="font-weight:700;">Data Privacy Laws:</span><span> Beyond the well-known GDPR in Europe, the U.S. has a growing number of state-specific laws (e.g., California's CCPA, Virginia's CDPA, Colorado's CPA, Utah's UCPA, Texas's TDPSA), each with nuances regarding consumer data rights, consent, and data processing. AI initiatives must be designed with these laws in mind, particularly concerning how personal or sensitive data is used for training and inference.</span></p></li><li><p><span style="font-weight:700;">The EU AI Act:</span><span> This landmark legislation, currently rolling out in phases, specifically regulates how businesses use AI, categorizing AI systems by risk level and imposing stringent requirements on high-risk applications. For any mid-sized company engaging with EU citizens or operating in the EU, understanding and adhering to this act is paramount for AI deployment. As already seen with State-level data privacy laws, it's likely that similar AI-specific legislation will come to the US, likely starting at the state level before potentially making it’s way into federal regulations.</span></p></li><li><p><span style="font-weight:700;">Ethical AI Principles:</span><span> Beyond legal compliance, ethical considerations are gaining increasing prominence. Organizations must proactively address:</span></p></li><ul><li><p><span style="font-weight:700;">Fairness:</span><span> Ensuring AI models are trained and developed to avoid bias. This requires diverse datasets and continuous monitoring for algorithmic fairness, preventing discriminatory outcomes.</span></p></li><li><p><span style="font-weight:700;">Accountability:</span><span> Establishing clear audit trails and logs to track AI decision-making. AI systems should have built-in processes for human oversight and mechanisms for addressing errors or unintended consequences. Who is responsible when an autonomous system makes a critical decision? Governance provides the answer.</span></p></li><li><p style="margin-bottom:12pt;"><span style="font-weight:700;">Transparency:</span><span> Moving towards &quot;explainable AI&quot; (XAI) processes to understand the reasoning behind AI outputs and actions. This builds trust and allows for debugging and improvement.</span></p></li></ul></ul><span style="font-weight:700;">Privacy and Consent Management:</span><span> Ensuring AI systems respect individual privacy rights. This includes limiting data collection, anonymization techniques, and providing clear mechanisms for individuals to control their data, especially crucial when dealing with sensitive information.</span><p></p></div>
</div><div data-element-id="elm_Br3zGDIYcc77ycQ99f3aXw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>3.&nbsp; Protecting Your Crown Jewels<br/></span></h4></div>
<div data-element-id="elm_57c-rrrx23KUmEZeN3Kffg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span><span>Confidentiality (Encryption):&nbsp;</span>Data governance mandates robust security measures to protect sensitive information from unauthorized access, breaches, and cyber threats. For AI, this means encrypting data at rest and in transit, especially when it's being used for model training or inference. Confidentiality protocols ensure that even if a system is compromised, the underlying data remains protected.</span></p><p></p></div>
</div><div data-element-id="elm_l1RbZwImXXch9pCPIGXh5g" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>4.&nbsp; Knowing Who's Who<br/><br/></span></h4></div>
<div data-element-id="elm_6akaKG4JbTmukpLcZH1u_A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Authentication protocols verify the identity of users or systems attempting to access data. Strong authentication mechanisms, such as multi-factor authentication (MFA), are critical for preventing unauthorized access to data repositories that feed AI models. Without proper authentication, even the most secure data can be vulnerable.</div></div><p></p></div>
</div><div data-element-id="elm_cUkQ1g80DR2jMwjQu5XW5w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h4
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>5. Authorization: Defining Access Rights<br/></span></h4></div>
<div data-element-id="elm_mI2RLLxDCsQZnKdgbPNPUg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Authorization determines what specific actions an authenticated user or system can perform on particular data assets. This involves implementing granular access controls, ensuring that AI models or human users only have access to the data necessary for their specific function. This minimizes the risk of data misuse or accidental exposure, especially important when dealing with diverse datasets for different AI applications.</span></p><p></p></div>
</div><div data-element-id="elm_pt6F8dVyDbZ_1zzMwJ_DKw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Challenges for Small and Mid-Sized Organizations:<br/></span></h2></div>
<div data-element-id="elm_7G_PWf1wGGeozO4RCsbqgw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span></span></span></p><p style="margin-bottom:12pt;"><span>Building and maintaining such a Data Constitution on a lean budget can seem impossible. While the necessity of data governance is clear, small and mid-sized organizations often face unique hurdles in its implementation:</span></p><ul><li><p><span style="font-weight:700;">Lack of Operational Oversight:</span><span> Many executives may claim to have AI governance frameworks, but the reality often falls short on operational implementation and continuous review. Lean IT teams might lack the dedicated staff to manage and enforce complex governance policies.</span></p></li><li><p><span style="font-weight:700;">Limited Legal/Compliance Resources:</span><span> Unlike large enterprises with dedicated legal and compliance departments, mid-sized firms may struggle to keep pace with the rapidly evolving regulatory landscape for data and AI.</span></p></li><li><p style="margin-bottom:12pt;"><span style="font-weight:700;">Difficulty in Implementing Comprehensive Frameworks:</span><span> Building a holistic data governance framework from scratch can seem overwhelming with limited resources and competing priorities. The temptation to focus solely on immediate AI deployment, rather than foundational governance, is strong.</span></p></li></ul><p style="margin-bottom:12pt;"><span>However, these challenges are not insurmountable. The key is a pragmatic, phased approach. Start by identifying the most critical data assets and AI use cases, then build governance around them. Leverage technology solutions that specialize in automating aspects of data discovery, quality, and access control. Partnering with external service provider experts can bridge resource gaps and provide specialized knowledge.</span></p><p></p></div>
</div><div data-element-id="elm_MXbhrBMddynT4JU7yThmGA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Data Governance – The Strategic Enabler</span></h2></div>
<div data-element-id="elm_ZenzQhe8P_Uj77Zsa9vXmQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><div>Data governance is far more than a compliance checklist; it is the strategic enabler for building trustworthy, compliant, and high-performing AI systems. It mitigates risks, fosters innovation by providing reliable data, and builds confidence in your AI initiatives. For mid-sized organizations, embracing data governance means laying a solid, ethical, and legally sound foundation for your AI-powered future. It ensures that your AI &quot;magic&quot; is not only dazzling but also responsible, sustainable, and truly transformative.</div></div><p></p></div>
</div><div data-element-id="elm_19jEuwl-D1gFLHMtDnc2vw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_19jEuwl-D1gFLHMtDnc2vw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_19jEuwl-D1gFLHMtDnc2vw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_qAuumgW6Hgdt5RTT0V25DQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p>Read more about the importance of Data Readiness in AI:&nbsp;</p><p><br/></p><p></p><p><span style="font-weight:bold;">&nbsp; &nbsp;&nbsp;<a href="https://www.cloud9advisers.com/News/post/the-ai-magic-trick" title="The AI Magic Trick: Why Your Data is the Real Star of the Show" target="_blank" rel="">The AI Magic Trick: Why Your Data is the Real Star of the Show</a></span></p><p><br/></p><p><span style="font-weight:bold;">&nbsp; &nbsp;&nbsp;</span><span style="font-weight:bold;"><a href="https://www.cloud9advisers.com/News/post/the-unseen-imperfection" title="The Unseen Imperfection:&nbsp;Why Data Quality Makes or Breaks Your AI" rel="">The Unseen Imperfection:&nbsp;</a><a href="https://www.cloud9advisers.com/News/post/the-unseen-imperfection" title="The Unseen Imperfection:&nbsp;Why Data Quality Makes or Breaks Your AI" rel="">Why Data Quality Makes or Breaks Your AI</a></span></p><p><br/></p></div>
</div></div><div data-element-id="elm_hdrOcXSIpipejaWEI-1Xgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_KbTq5GGiqoypd5JQ_Yc1Bw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_KbTq5GGiqoypd5JQ_Yc1Bw"] div.zpspacer { height:159px; } @media (max-width: 768px) { div[data-element-id="elm_KbTq5GGiqoypd5JQ_Yc1Bw"] div.zpspacer { height:calc(159px / 3); } } </style><div class="zpspacer " data-height="159"></div>
</div><div data-element-id="elm_PWE0bZwnS8WrYU0Sju5iKw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Schedule a phone call</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 13 Aug 2025 13:01:00 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Allgress]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-Allgress</link><description><![CDATA[Allgress Business Risk Intelligence solutions converge disparate risk silos across global enterprise networks and automate governance, risk and compliance (GRC) management processes. Contact Cloud 9 to learn more]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Te1zGNokTfiKXTr5uHhfVA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ARsnD8-kRhCOuWbuWKl2Zg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_o-vJ5LZNQC-ELfjcfH0nWQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_o-vJ5LZNQC-ELfjcfH0nWQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_c02MTc_RTuK2asf1YE0csQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_c02MTc_RTuK2asf1YE0csQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Governance, Risk Management, and Compliance (GRC)</h2></div>
<div data-element-id="elm_inZYmHml6r5NGPsC-gfSvQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_inZYmHml6r5NGPsC-gfSvQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/shark_risk_danger_thinkstock_653794886-100749915-large.jpg" size="fit" alt="from Thinkstock" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_e-xWBeUu7SZfFgUy0gIAPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e-xWBeUu7SZfFgUy0gIAPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">by: Allgress</span></p></div>
</div><div data-element-id="elm_4YFzeh7RSmejJa4XidYzVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4YFzeh7RSmejJa4XidYzVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <a href="https://allgress.com" title="Allgress" target="_blank">Allgress</a></span></p></div>
</div><div data-element-id="elm_I79rLOj31uEdpfAbPz0EyQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_I79rLOj31uEdpfAbPz0EyQ"].zpelem-image { border-radius:1px; margin-block-start:40px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Allgress.png" size="medium" data-lightbox="true" style="width:1000px;"/></picture></span></figure></div>
</div><div data-element-id="elm_C2lJLaV_XAjeCQANhISqWw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_C2lJLaV_XAjeCQANhISqWw"].zprow{ border-radius:1px; margin-block-start:54px; } </style><div data-element-id="elm_5srqtSegac1F91pyHtRoGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_5srqtSegac1F91pyHtRoGg"].zpelem-col{ border-radius:1px; } </style></div>
<div data-element-id="elm_dlSrwF_qblohhrsmIjsglg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dlSrwF_qblohhrsmIjsglg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_KPuWt6sjQ1_2BzCSKOzzjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KPuWt6sjQ1_2BzCSKOzzjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:15px;"><span style="font-weight:bold;">RISK EXCEPTION</span><br></span></p><p><span style="font-size:15px;">Track Risk – Evaluate and communicate strategic risks that align to your organizations enterprise risk program<br></span></p><p><br></p><p><span style="font-size:15px;"><span style="color:inherit;">Document and track risk exceptions with full life-cycle management by providing a standardized approach for the review, management, and acceptance of Findings and Exceptions</span><br></span></p><p><br></p><div><span style="font-weight:bold;font-size:15px;">THIRD PARTY VENDOR MANAGEMENT</span></div><p><span style="font-size:15px;">Oversee – Establish due diligence and ongoing monitoring of third party’s activities and performance<br></span></p><p><br></p><p><span style="font-size:15px;"><span style="color:inherit;">Gain visibility into your vendor’s risk posture and compliance to make informed decisions about the business relationship of your contracted vendors</span><br></span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="color:inherit;font-size:15px;"><div><span style="font-weight:bold;">COMPLIANCE MANAGEMENT</span></div><div>Assess Risk Efficiently – Assess risks against industry standards and regulatory requirements, provide gap analysis, risk treatment and reporting</div><div><br></div><div><span style="color:inherit;"><div><span style="font-weight:bold;">RISK MANAGEMENT</span></div><div>Communicate Strategically with Key Stakeholders – Track strategic risks, assign ownership across the enterprise, quickly and easily communicate risk posture through dashboards, and provide continuous monitoring and improvement of risk posture of the organization</div><br><div><span style="color:inherit;"><div><span style="font-weight:bold;">POLICY MANAGEMENT</span></div><div>Stay Organized – Unify and disseminate your organization’s document library from a centralized platform</div><div><br></div><div><span style="color:inherit;">Quickly assess your gaps in policy, mange your document lifecycle and exceptions</span><br></div><div><br></div><div><span style="color:inherit;"><div><span style="font-weight:bold;">INCIDENT RESPONSE</span></div><div>Investigate &amp; Mobilize – Track and respond to security threats impacting your company’s critical infrastructure&nbsp;<span style="color:inherit;">with centralized management, root cause analysis, reporting, and tracking</span></div></span><span style="color:inherit;"><div><br></div><div><span style="color:inherit;"><div><span style="font-weight:bold;">VULNERABILITY MANAGEMENT</span></div><div>Collect, analyze and v<span style="color:inherit;">isualize data in the way you need to see it so you can make key decisions that align security and regulatory compliance programs with top business priorities. Manage patch exceptions, and understand the impact of your organizations exposure of unpatched assets</span></div></span></div></span></div></span></div></span></div></span></div></div>
</div></div><div data-element-id="elm_nrw_s0c_Hegj92CrYLMCwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nrw_s0c_Hegj92CrYLMCwQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oEOA87AeYCj9AJBKawVcFw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oEOA87AeYCj9AJBKawVcFw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">Leverage AWS API’s to Automate Compliance.</span></div><p><span style="color:inherit;"><br></span></p><div>Allgress ComplianceVision (CV): Organizations are faced with the task of providing assurance that high-rated risk factors are being managed with the appropriate controls in place and that those controls are operating effectively. With increases in the regulatory regime, increasing technology complexity and pressures on cost, the demand is high for productivity improvements in the performance evaluation of internal controls. Allgress ComplianceVision (CV) provides continuous monitoring of control operating effectiveness. CV provides continuous data assurance to verify the integrity of data flowing through systems, as well as continuous risk monitoring and assessment to dynamically measure your organization’s risk.</div><p><br></p><div>Allgress CV improves control management and monitoring while reducing the time sink and complexity of traditionally annual, detailed controls assessments. Organizations are able to leverage API’s from Amazon Web Services (AWS) as well as AWS Technology Partners, enabling a continuous compliance process.&nbsp; In addition, policies in configuration content are included for all major compliance frameworks.&nbsp; With Allgress CV organizations realize cost reductions through improved efficiency and effectiveness, and additionally benefit from increased test coverage, improved timeliness of testing, reduced risk velocity and remediation cost, improved consistency, the ability to identify trends, and comprehensive risk visibility through the Allgress Platform. Allgress CV replaces the manual, error-prone, preventive controls of the past with automated, detective controls to reduce your risk profile.</div><p><br></p><div>CV identifies the shared, inherited, and customer specific control statements and demonstrates how you can leverage the AWS Shared Responsibility model to document adherence with applicable compliance standards. Focusing on all major compliance frameworks such as PCI, HIPAA, CJIS, NIST, and FISMA compliance, the portal guides you through the compliance process by providing targeted content at every step of the way. ComplianceVision automates manual compliance functions through integration with current AWS tools.</div><p><br></p><div>ComplianceVision will soon support all major cloud platforms, including Microsoft Azure, Google Cloud Platform and Oracle Cloud Platform.</div></div>
</div><div data-element-id="elm_sRnGlq4o7p3OZgl3rr9SYQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_sRnGlq4o7p3OZgl3rr9SYQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Allgress</h3></div>
<div data-element-id="elm_-lOm_baF8rAmgz6MhMg8Ug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-lOm_baF8rAmgz6MhMg8Ug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"> Founded in 2008, Allgress helps enterprise security and risk professionals solve the problem of how to assess, understand and manage corporate risk. <br><br>Its founders and management team are committed to providing CISOs with the ability to make effective investment decisions that align security and compliance programs with top business priorities, communicate the value of those decisions to senior executives, and manage risk, fines, and brand damage. <br><br>Allgress Business Risk Intelligence solutions converge disparate risk silos across global enterprise networks and automate governance, risk and compliance (IT GRC) management processes. Powered by the patented Allgress Business Risk Intelligence engine, the company's products, solutions and CISO reporting tools provide customers with heat maps and compliance assessment reports that reveal a comprehensive, immediate and intuitive picture of their organizations' security and compliance risk posture. <br><br>Allgress provides operational efficiency. Its solutions allow users to assess once and manage and report on many industry and government regulations. Allgress deploys faster than competing solutions and provides rapid ROI.</div>
</div><div data-element-id="elm_i-LILFeHM12szTnqq_EMHg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_i-LILFeHM12szTnqq_EMHg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HCCKRfQnQwuE6Mc6wymWkA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HCCKRfQnQwuE6Mc6wymWkA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I need help with cybersecurity, can Cloud9 help?" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Is Allgress right for you?</span></a></div>
</div><div data-element-id="elm_55mGMJFctzliSwDzEDnLnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_55mGMJFctzliSwDzEDnLnA"].zpelem-text { border-radius:1px; margin-block-start:36px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 to see if Allgress is right for your business. Cloud 9 Advisers is vendor agnostic and can help you find the right solutions and the right companies from our list of over 200 vendors in our curated Supplier Portfolio.&nbsp;</p><p><br></p><p style="text-align:center;"><span style="font-weight:bold;">CyberSecurity&nbsp; Communications&nbsp; Connectivity&nbsp; Cloud</span></p></div>
</div><div data-element-id="elm_iyVjY8XYTq8VvUQKI-iNHg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_iyVjY8XYTq8VvUQKI-iNHg"].zpelem-button{ border-radius:1px; margin-block-start:55px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/"><span class="zpbutton-content">Learn more about Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Feb 2020 18:19:35 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Nitel]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-Nitel</link><description><![CDATA[With technology becoming mission-critical, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their assets vulnerable to cybercriminals. Cloud 9 can help.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_D-Nz53vkQxquWyV5fg7jdQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MgtG_ZrcS2mNS7npggHEOA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BdizElknRkuISnouLpCG9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Nitel: Managed Next-Generation Security</span></h1></div>
<div data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/NITEL_Managed_Security_Testing.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By: Nitel USA, see the article here&nbsp;<a href="https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/">https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/</a></span></p></div>
</div><div data-element-id="elm_fciiwuYY6NKxhDk31yORrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fciiwuYY6NKxhDk31yORrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Supplier Spotlight:&nbsp; <a href="https://www.nitelusa.com/" title="NITEL" target="_blank">NITEL</a></p></div>
</div><div data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/ISP%20Nitel2.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_N294fkf-kdgYXGrWEEeODg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_N294fkf-kdgYXGrWEEeODg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Explore Four Levels of Security Testing</h2></div>
<div data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>With cloud, big data and mobile solutions becoming mission-critical to organizations of all sizes, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their organizations vulnerable to cybercriminals. And it’s not just large organizations cybercriminals are targeting; smaller companies are just as likely to be attacked. They tend to be easier targets, more likely to pay up in the case of a ransomware attack. They can also serve as a back door into other third-party organizations they do business with.</div><p><br></p><div><div>Although managed security is an investment, many organizations simply cannot afford to not conduct on-going security testing. According to a recent <a href="https://www.trustwave.com/en-us/" title="Trustwave security report," target="_blank">Trustwave security report,</a> 41% of those surveyed feared financial damage to their company in the event of a cyberattack or data breach.</div></div><p><br></p><div>Managed security testing is defined as subscription-based proactive scanning and testing of environment security to identify vulnerabilities. However, a comprehensive managed security solution does more than identify vulnerabilities and weak points.</div><p><br></p><div>When working with a qualified managed security provider an organization should not only gain insight into weaknesses, but gain a blueprint on how to prioritize, mitigate and remediate these risks. When your customer engages with a provider of managed security services like Nitel, backed by a cybersecurity Gartner Magic Quadrant Leader Trustwave, they can choose to engage with four levels of testing depending on their budget and business needs, including:</div><ul><ul><li><span style="font-weight:bold;">Basic threat</span> – Simulates the most common attacks executed in the wild today. This class of attacker typically uses freely-available, automated attack tools.</li><li><span style="font-weight:bold;">Opportunistic threat</span> – Builds upon the basic threat and simulates an opportunistic attack executed by a skilled attacker that does not spend an extensive amount of time executing highly sophisticated attacks. This type of attacker seeks easy targets (”low-hanging fruit”) and will use a mix of automated tools and manual exploitation to penetrate their targets.</li><li><span style="font-weight:bold;">Targeted threat</span> – Simulates a targeted attack executed by a skilled, patient attacker that has targeted a specific organization. This class of attacker will expend significant resources and effort trying to compromise an organization’s systems.</li><li><span style="font-weight:bold;">Advanced threat</span> – Simulates an advanced attack executed by a highly motivated, well-funded and extremely sophisticated attacker who will exhaust all options for compromise before relenting.</li></ul></ul><div>Cloud 9 Advisers clientele benefit from Nitel/Trustwave’s crowd-sourced, global threat intelligence through a solution that is scoped to fit their needs. Nitel's intrinsic network knowledge, combined with Trustwave’s highly skilled SpiderLab ethical hacker team, can quickly identify security weak points and guide you to a solution to protect your organization.</div></div>
</div><div data-element-id="elm_rRZDbyeva5vy63rqVWFVGw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rRZDbyeva5vy63rqVWFVGw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Managed Next-Gen Security Solutions</h2></div>
<div data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">What keps business and IT leaders up at night?</span></div><div>For business leaders everywhere, a data breach is on par with the most damaging things that could happen to an organization. The thought of being the next company to make headlines keeps leaders up at night while IT organizations fight to keep the bad guys out. As threats become increasingly widespread, sophisticated and dangerous, companies look to develop security strategies that protect their environment while staying within budgets that seem to get tighter every year.</div><div><br></div><div><span style="color:inherit;"><div>Your business is unique, with its own set of needs and priorities. That’s why we offer a suite of security solutions that offers multiple&nbsp;<span style="color:inherit;">ways for you to protect your business. Whether your business is big or small, whether you value distributed architecture or centralized,&nbsp;</span><span style="color:inherit;">you’ll find a solution that fits how you prefer to manage your environment.</span></div></span></div></div>
</div><div data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_44Ols88sMN6a-H9zszeCIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_44Ols88sMN6a-H9zszeCIQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;"><span style="color:inherit;">ENTERPRISE GRADE PROTECTION</span><br></span></p><div><ul><li>Safely enable applications, users and content by classifying all traffic, determining the business use case, and assigning policies to allow and protect access to relevant applications.</li><li>Prevent threats by eliminating unwanted applications to reduce your threat footprint and apply targeted security policies to block known vulnerability exploits, viruses, spyware, botnets and unknown malware (APTs).</li><li>Protect your datacenters through the validation of applications, isolation of data, control over rogue applications and high-speed threat prevention.</li><li>Secure public and private cloud computing environments with increased visibility and control; deploy, enforce and maintain security policies at the same pace as your virtual machines.</li><li>Embrace safe mobile computing by extending the enterprise security platform to users and devices no matter where they are located.</li></ul></div></div>
</div></div><div data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XMii76EEv6YXr4DApouFPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XMii76EEv6YXr4DApouFPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">ROCK SOLID PROTECTION FOR SMB</span><br></p><p><span style="color:inherit;">Our customized solutions deliver next-generation security for&nbsp;</span><span style="color:inherit;">every size and type of business. Gain full control and visibility&nbsp;</span><span style="color:inherit;">of application traffic passing through your network, even for&nbsp;</span><span style="color:inherit;">encrypted traffic, thanks to application detection, user-identity&nbsp;</span><span style="color:inherit;">awareness, SSL interception and built-in live reporting.</span></p><span style="color:inherit;"><br><div>You benefit from the same critical next-generation security&nbsp;<span style="color:inherit;">features that large enterprises receive—but sized appropriately&nbsp;</span><span style="color:inherit;">for your business. Your business will fend off threats with&nbsp;</span><span style="color:inherit;">included next-gen features that take place directly in the data&nbsp;</span><span style="color:inherit;">path, including:</span></div><div><ul><li>Firewalling</li><li>Intrusion Detection and Prevention (IDS/IPS)</li><li>URL Filtering</li><li>Dual Antivirus</li><li>Application Control</li></ul></div></span></div>
</div></div></div><div data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY EXPERTISE ON YOUR SIDE</span></div><p>Nitel has partnered with Gartner Magic Quadrant leader Trustwave to complement our managed next-generation firewall service with a suite of security management services. This 1–2 punch creates a comprehensive managed security solution to reduce your business risk and give you peace of mind. With Nitel overseeing your network health, performance and security, you have a single partner working on your behalf to ensure your business operates optimally and safely.<br></p></div>
</div><div data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kxjJly2NUqDKphGl7CZTBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kxjJly2NUqDKphGl7CZTBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY INFORMATIONEVENT MANAGEMENT</span></div><p>Achieve more effective identification and mitigation of security threats. You’ll reduce your burden with around-the-clock support from 10 global security operations centers staffed with experts who have in-depth knowledge and experience working with complex network environments for highly distributed organizations.<br></p><p><span style="color:inherit;"><br></span></p><div>Our SIEM service collects, analyzes and stores logs from networks, hosts and critical applications. It extends visibility beyond the network perimeter to the application layer, helping you achieve more effective identification and mitigation of security threats, and compliance validation with numerous regulatory and industry standards.</div><p><span style="color:inherit;"><br></span></p><div>Advantages:</div><ul><li>SpiderLabs security research utilizing global event data to identify current and emerging threats</li><li>Industry-leading compliance expertise</li><li>Solutions tailored to the specific needs of healthcare, financial, retail and more<br></li><li>Collects and reviews over 1 billion events per day</li></ul></div>
</div></div><div data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;color:rgb(48, 4, 234);">Need to maintain compliance with PCI, DDS, HIPAA, SOX, FISMA, GLBA/FFIEC? </span><span style="color:inherit;">Let Nitel help. We’ll help you fulfill your requirements for vulnerability scanning, penetration testing and ongoing evaluation of your environments and applications.</span><br></p></div>
</div><div data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">MANAGED SECURITY TESTING</span></div><p>Reveal potential vulnerabilities in your environment with thorough penetration testing. Expert “ethical hackers,” armed with the same techniques as today’s cybercriminals, attempt to hack into your network or application to help you identify network-connected assets, learn how those assets are vulnerable to attack and understand what could happen if those assets were compromised.</p></div>
</div></div></div></div></div><div data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 Advisers for expert guidance and help with any compliance, risk management, monitoring, edge security and any other cybersecurity issues. We'll guide you to the right vendors, like Nitel, from our <a href="/suppliers" title="Supplier Portfolio">Supplier Portfolio</a>.&nbsp;</p></div>
</div><div data-element-id="elm_whExP12qqr410n4GYwgVlQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_whExP12qqr410n4GYwgVlQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_4415zG0x20XtZyYAYT5sJg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4415zG0x20XtZyYAYT5sJg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;font-weight:bold;">Because it’s all about you.&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;">Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p><p><span style="color:inherit;font-weight:bold;"></span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></div>
</div></div><div data-element-id="elm_uv3x5ayeZhugascf41xYsQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uv3x5ayeZhugascf41xYsQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 04 Feb 2020 12:06:38 -0500</pubDate></item><item><title><![CDATA[3 Reasons for Hybrid Cloud]]></title><link>https://www.cloud9advisers.com/News/post/3-reasons-for-hybrid-cloud</link><description><![CDATA[Hybrid Cloud is the pragmatic reality. We detail 3 strategic drivers: ultimate flexibility, dramatic cost reduction (especially egress fees), and improved IT efficiency—freeing up key resources for core business initiatives.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PqfCnGRsTK2UNcFrgfpfaQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1oLTCta2Qp6TSc8HRTDGRA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_2UmUh2JnbEJE5G5hwzPs4w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
<div data-element-id="elm_FKyIIRQ3QLqViQwMAGPv9g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YTr3K_g3RgCX9IaurCtAdQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Top Three Strategic Reasons Why Hybrid Cloud is the Pragmatic Choice</span></h1></div>
<div data-element-id="elm_zCWMzB_WJ2OYm16Or9lxHw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_zCWMzB_WJ2OYm16Or9lxHw"] .zpimagetext-container figure img { width: 513px !important ; height: 288px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Cloud%20hybrid%20private%20public.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left zpimage-text-align-mobile-left zpimage-text-align-tablet-left " data-editor="true"><div><div style="text-align:center;"><span>Hybrid infrastructure is the ultimate custom-fit solution, allowing businesses to maximize flexibility, reduce major operational costs, and align their IT resources with strategic business goals.</span></div><div style="text-align:center;"><span><br/></span></div><div><span><span style="font-style:italic;font-weight:bold;">UPDATED!</span></span></div></div></div>
</div></div><div data-element-id="elm_Vn_k3cE09kZj0nhHuhLl7g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"></style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-align-mobile-center zpdivider-align-tablet-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_OMuoVmWf53P55ZAeoAl6Kw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h3>Top Three Strategic Reasons Why Hybrid Cloud is the Pragmatic Choice</h3><p>Businesses are adopting cloud technologies at an unprecedented speed, transforming how they handle communications, applications, backups, and compute. Yet, despite the market drive toward &quot;all-in&quot; cloud solutions, the reality for most B2B organizations is a balanced, measured approach.</p><p><br/></p><p>The vast majority of companies today operate with a <strong>hybrid infrastructure</strong>: they use the public cloud for certain applications, a private cloud for others, while retaining physical or colocation infrastructure for specialized or legacy workloads.</p><p><br/></p><p>This is not a sign of hesitation; it is a sign of <strong>pragmatism</strong>. A custom-fit hybrid approach is often the most strategic way to ensure resources across the entire enterprise are supported fully, ensuring optimal performance and maximum cost efficiency.</p><p><br/></p><p>Here are the top three strategic reasons businesses are consciously choosing the hybrid route.</p><h3><br/></h3><h3>1. Increase Flexibility and Regulatory Agility</h3><p>The core benefit of hybrid cloud lies in its unparalleled flexibility—it combines the best attributes of different environments to meet diverse and often conflicting needs. A single architecture cannot successfully satisfy all requirements across a large enterprise, which may include regulatory demands, multiple complex applications, varying data storage needs, and aggressive development cycles.</p><h4><br/></h4><h4>Beyond the Single Platform Trap</h4><p>A critical mistake in cloud strategy is adhering to a <strong>one-size-fits-all model</strong>. Hybrid cloud allows an organization to place each application or workload on the platform best suited for it.</p><ul><li><p><strong>Application Placement:</strong> Mission-critical systems requiring dedicated resources, predictable latency, or the power of bare metal can reside in a Private Cloud or dedicated Colocation. Meanwhile, highly scalable or variable workloads—like development, testing, and seasonal e-commerce traffic—can burst into the Public Cloud, leveraging its on-demand resources without over-provisioning private infrastructure. This flexibility is key to meeting fluctuating business demands without massive, unpredictable capital outlay.</p></li><li><p><strong>The Power of Policy-Driven Placement:</strong> True hybrid flexibility is less about <em>where</em> the resource is and more about the <em>policy</em> that dictates its location. By establishing clear policies based on criteria like data sensitivity, performance requirements, and cost-per-hour, B2B leaders can build an infrastructure that dynamically optimizes itself. This requires a vendor-neutral, overarching strategy that treats all infrastructure—public, private, and on-premise—as a single resource pool.</p></li></ul><h4><br/></h4><h4>Navigating Compliance and Data Sovereignty</h4><p>For industries like finance (FINRA, PCI), healthcare (HIPAA), or government, strict data sovereignty and compliance rules often preclude using a multi-tenant public cloud for certain sensitive data sets. A hybrid strategy ensures compliance by creating necessary walls of isolation.</p><ul><li><p><strong>Regulatory Isolation:</strong> A dedicated Private Cloud environment or secure Colocation facility can host data that must remain within strict geographic or regulatory boundaries. The private element of the hybrid system acts as a high-security vault, ensuring compliance by restricting access to a single organization.</p></li><li><p><strong>Accessing Agility Without Compromise:</strong> This doesn't mean sacrificing the agility of the public cloud. The hybrid model allows the <em>processing</em> of non-sensitive data, development environments, and front-end user applications to utilize public cloud resources, while the sensitive, regulated <em>data store</em> remains secure in the private environment. This balanced approach provides regulatory peace of mind without creating a development bottleneck.</p></li></ul><h4><br/></h4><h4>Strategic Staggered Migration</h4><p>For organizations with existing physical infrastructure, a hybrid approach allows them to stagger their migration. They can immediately leverage cloud benefits for low-hanging fruit (like disaster recovery or collaboration tools) while methodically planning the virtualization of complex legacy systems. This achieves consolidation goals on the company’s terms, not a vendor’s rushed deadline. The ability to use existing hardware until its natural end-of-life significantly reduces premature asset write-offs and ensures a more financially sound transition.</p><h3><br/></h3><h3>2. Reduce Costs Through Strategic Optimization</h3><p>The assumption that &quot;cloud is always cheaper&quot; has been proven false for many businesses. Hybrid cloud allows businesses to realize genuine cost savings by providing intelligent controls over the most expensive aspect of public cloud consumption: <strong>data egress fees</strong>, and by optimizing resource allocation.</p><h4><br/></h4><h4>The Egress Fee Burden and Mitigation</h4><p>Data egress is the cost charged by hyperscale providers (AWS, Azure, GCP) to move data <em>out</em> of their cloud environment. For businesses engaging in data analytics, replication for disaster recovery, or moving data between clouds, these fees can quickly accumulate, turning what seemed like a cost-saving strategy into a budgetary liability.</p><ul><li><p><strong>Mitigating Egress Fees is Crucial:</strong> This is arguably the most financially compelling reason for a hybrid approach. By positioning a dedicated hybrid cloud aggregator or using a smart interconnection strategy, businesses can significantly reduce the connectivity needed directly to hyperscale providers. By processing data closer to its destination or using proprietary private connections, this strategic placement can result in cutting AWS, Azure, GCP, and IBM egress fees by up to <strong>66%</strong>—a massive, immediate saving for any data-intensive organization.</p></li><li><p><strong>Avoiding Repurchase Costs (The Retain Strategy):</strong> As discussed in the &quot;6 R's&quot; migration strategy, some applications should simply be <strong>retained</strong>. A hybrid strategy validates this decision. By keeping certain legacy, low-changing applications on existing or managed dedicated infrastructure, the business avoids the massive cost of rewriting (Refactoring) or porting (Rehosting) them to a hyperscale environment where the cost of operation might exceed the cost of maintenance.</p></li></ul><h4><br/></h4><h4>Strategic Financial Discipline: OpEx vs. CapEx</h4><p>Hybrid architecture promotes financial discipline by ensuring resources are always optimized and aligned with the OpEx model.</p><ul><li><p><strong>Right-Sizing the Environment:</strong> You limit data transfer fees, control resource and storage costs precisely, and avoid the public cloud trap of over-provisioning resources just to be safe. By paying for precisely what is used, and nothing more, you maximize every infrastructure investment.</p></li><li><p><strong>Predictable Operational Expenditure (OpEx):</strong> While Public Cloud is consumption-based, Private Cloud components of a hybrid environment often operate on a <strong>subscription-based OpEx model</strong>. This combines the budget predictability required by finance departments with the agility needed by IT, allowing for easier, more reliable quarterly and annual forecasting than relying purely on volatile, consumption-based public cloud metrics.</p></li></ul><h3><br/></h3><h3>3. Improve Efficiency and Align Resources with Strategy</h3><p>For many companies, highly skilled and highly compensated IT professionals are spending an excessive amount of time on the <em>care and feeding</em> of physical infrastructure—tasks that do not advance the core business mission. This is the definition of <strong>IT fatigue</strong>, and it directly impacts a company's ability to innovate.</p><h4><br/></h4><h4>Freeing IT to Focus on Business Value</h4><p>Migrating appropriate workloads to a hosted datacenter or cloud environment helps to strategically free those resources, allowing them to shift their focus to helping advance strategic business initiatives.</p><ul><li><p><strong>Focus on Innovation:</strong> When the infrastructure is managed, maintained, and scaled by the cloud provider, the internal IT team is freed to focus on <strong>application optimization, security strategy, and business intelligence</strong>. They stop reacting to server alerts and start contributing to growth, competitive advantage, and business-facing projects. This directly translates infrastructure efficiency into business value.</p></li><li><p><strong>The TCO of IT Fatigue:</strong> The Total Cost of Ownership (TCO) calculation for on-premise hardware often fails to account for the true cost of time spent by highly paid engineers on maintenance tasks like patching, cooling, and power management. Shifting these tasks to a hybrid provider dramatically reduces this <strong>shadow cost</strong>.</p></li></ul><h4><br/></h4><h4>Elastic Adaptability and Future-Proofing</h4><p>The hybrid model ensures the infrastructure solution is fluid and adaptable, essential in a rapidly changing B2B environment.</p><ul><li><p><strong>Dynamic Workload Shifting:</strong> A flexible, scalable hybrid infrastructure solution ensures that as workloads shift (due to consolidation, acquisition, or a new product launch), the underlying infrastructure adapts dynamically. The business avoids being locked into static, rigid systems.</p></li><li><p><strong>Optimal Resource Placement:</strong> The ultimate efficiency gain is tailoring your infrastructure so that every application or workload is supported by the platform <strong>best suited for it</strong>, rather than forcing a one-size-fits-all approach. This keeps the business on target to reach its goals by prioritizing performance and financial governance simultaneously. Furthermore, a hybrid approach allows a business to strategically use emerging technologies—such as edge computing or serverless functions—wherever they make the most sense, integrating them seamlessly with existing private core systems.</p></li></ul><h3><br/></h3><h3>Finding the Right Mix in a Complex Landscape</h3><p>Adopting a hybrid strategy is the smart move, but executing it flawlessly requires navigating a diverse and often confusing landscape of cloud aggregators, interconnection providers, colocation facilities, private cloud managers, and managed services firms.</p><p><br/></p><p>The right hybrid approach isn't something you buy off the shelf; it's a strategic architecture you build to meet your specific needs. That complexity—the sheer number of vendors, contracts, and technical specifications—is precisely where impartial, vendor-neutral expertise becomes invaluable.</p><p><br/></p><p>We partner only with our clients, operating solely as an expert resource to find the perfect mix of solutions and the best providers to deliver them. Our only objective is to ensure we are bringing the right companies from our Supplier Portfolio to help you achieve your goals and objectives.</p><p><strong><br/></strong></p><p><strong>Technology. Driven. Outcomes.</strong></p><h3><br/></h3><h3>Next Step</h3><p>If you are currently evaluating how to combine your existing infrastructure with modern cloud services to gain better financial and operational control, the next step is to formalize your hybrid strategy, making specific decisions about application placement and vendor selection.</p><p><br/></p><p>If you are ready to identify and evaluate the portfolio of companies needed to establish the most effective custom-fit hybrid approach for your business, <strong>get in touch</strong> to explore your options.</p><p><br/></p><p><br/></p></div><p></p></div>
</div><div data-element-id="elm_E_5VNZTnVFMoVCeqfi-Lmw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/cloud" target="_blank"><span class="zpbutton-content">More About Cloud</span></a></div>
</div><div data-element-id="elm_1QJN2sEjPBilbhyS4_okXg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-right zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span style="font-weight:bold;">Related Articles:</span></p><div><a href="https://www.cloud9advisers.com/News/post/get-into-the-cloud-now" rel="">Get into the Cloud, NOW</a></div><div><a href="https://www.cloud9advisers.com/News/post/Still-Managing-Hardware" rel="">Still Managing Hardware?</a></div></div><div><p style="margin-bottom:5px;"><a href="https://www.cloud9advisers.com/News/post/cloud-migration">Cloud Migration: The 6 Rs</a></p><p style="margin-bottom:5px;"></p><div><p style="margin-bottom:5px;"><a href="https://www.cloud9advisers.com/News/post/the-day-the-cloud-blinked">The Day the Cloud Blinked</a></p></div><p></p></div><p></p></div>
</div><div data-element-id="elm_-rTDA-PgR6KtSfSHwK8sCg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 18 Jun 2019 12:33:14 -0500</pubDate></item><item><title><![CDATA[CyberSecurity Basics]]></title><link>https://www.cloud9advisers.com/News/post/cybersecurity-basics</link><description><![CDATA[The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp; Vulnerability Scannin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ssfqJdnYTPqaI4KdiXha5g==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VuBZ60mUQAW5kxDvBEjbvA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eWNoaWioQjCbE-D3VmBUNw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZXOzB36hQqKKOOp30fMHJw==" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">The Basics of Cyber Security, What&nbsp;<span style="font-style:italic;">every</span>&nbsp;business should do</h2></div>
<div data-element-id="elm_v3UJN5KXS_6VeAJJXXZX_g==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span>The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp;</span></span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Vulnerability Scanning</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Doesn’t actually fix anything, but...</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Shows “bad spots’”</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Good services will show a plan of remediation</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">If subject to compliance (HIPPA, PCI, etc) recurring V.Scans are required </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Do it </span><span style="font-size:11pt;font-style:italic;">at least </span><span style="font-size:11pt;">&nbsp;annually, quarterly is common for many businesses, monthly “managed” services best, but more costly</span></p></li></ul></ul><p style="margin-left:72pt;"><span style="font-size:11pt;">Think of it as a home inspection. </span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Penetration Testing</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Different than a V.Scan but related</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Considered “white-hat” or “ethical” hacking</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Attempts to actually hack into your network</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Should come after a V.Scan and initial remediations steps to test efficacy </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Most Pen Tests will deliver a detailed, lengthy report of findings and remediation suggestions</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Usually done annually. Should at least be done every couple/few years. </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Endpoint Security</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Mobile Security; </span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">increasingly important and often overlooked window in to the network </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">proprietary and cloud apps. </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">corporate or employee owned mobile devices (BYOD) </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Anti-Virus</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Firewall, go with a Next Gen FW (NGFW). Best would be a managed Firewall solution. Depending on your situation also look into a cloud firewall solution.&nbsp;</span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Employee Education</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Email phishing; train employees to recognize bad, phishing emails by using mock emails </span></p></li></ul></ul><p><span style="color:inherit;"><span><br></span></span></p><p><span style="font-size:11pt;">Contact us at </span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">Cloud 9 Advisers</a></span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">. </a>We are impartial, independent, and provider-neutral, consultants of Communications, Collaboration, Connectivity, and Cloud technologies. We guide our clients through the morass of options, solutions, and providers. Sign up for our Consulting &amp; Buying Program and get the real story on CyberSecurity and the best methodology for your business.</span><span style="font-size:11pt;">Find out who the best providers are and who to avoid. Get real-world advice, recommendations, and unbiased solution design.&nbsp;</span></p><p><span style="color:inherit;"><br><span style="font-size:11pt;">Through the Program, you’ll have access to our distributor team of provider-neutral SME-Subject Matter Experts and Services Engineers. We’ll help you get pricing and bids from multiple, competing companies through our distributor portfolio of nearly 200 vetted and approved service providers. Use our evaluation tools to show decision makers the entire process, reasoning, and recommendations and complete due diligence for the project. We’ll help manage the entire procurement process (and keep all those pesky sales-guys off your back!). Visit </span><span style="font-size:11pt;"><a href="/" title="www.Cloud9Advisers.com">www.Cloud9Advisers.com</a></span><span style="font-size:11pt;"> for more information</span></span><br></p></div>
</div><div data-element-id="elm_lPPlgC14BcKXAxO2d18kvg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-sm zpbutton-style-roundcorner " href="/engagement" target="_blank"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 29 Sep 2018 12:27:49 -0500</pubDate></item><item><title><![CDATA[Cyber Security - What is the cost?]]></title><link>https://www.cloud9advisers.com/News/post/cyber-security-what-is-the-cost</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/files/image- work in real world 2.jpg"/>what is the real cost of a cybersecurity breach? Are you too small to worry about these things? Are you willing to bet your business on your Firewall and the IT group managing it?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QBHuJXfaSU2N6lTO3DKwDA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1_7v-2uRT0GJrVBMqCKTbA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_30He43UiQkCeS2yxIdDPSw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_w0U9xwvbR8G5HlhF7Y6EJQ==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>The costs associated with security breaches are going up, jumping 29 percent in recent years to more than $4 million per incident, according to Ponemon’s annual bench marking report. In addition, when it comes to the impacts of breaches – such as cost per record lost – Ponemon says the gap is widening between organizations that are unprepared and those that have added policies and processes like incident response plans, encryption, and employee training.</div><p><br></p><div>To calculate the average cost of a data breach, Ponemon collects both the direct and indirect expenses as well as opportunity costs incurred by the organization as follows:</div><ul><li><span style="font-weight:700;">Direct cost</span> – the direct expense outlay to accomplish a given activity, such as engaging forensic experts, outsourcing hotline support and providing free credit monitoring subscriptions and discounts for future products and services.<br></li><li><span style="font-weight:700;">Indirect cost</span> – the amount of time, effort and other organizational resources spent in the aftermath of a breach, such as in-house investigations and communications. This category also includes the extrapolated value of customer loss resulting from turnover.<br></li><li><span style="font-weight:700;">Opportunity cost </span>– the cost of lost business opportunities resulting from negative reputation effects after the breach has been reported to victims and publicly revealed to the media.<br></li></ul><p>A recent report from Deloitte says the costs of a cybersecurity breach could be higher than most data shows as the costs can rack up for many years after the initial incident. The firm identified 14 cyberattack impact factors, including seven it claims are hiding beneath the surface and account for 95 percent of the financial impact. (see chart below).<br></p></div>
</div><div data-element-id="elm_EohnBovmbHX4hQpxlo2AwA" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/14%20impacts%20of%20cyberattack.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_9KItdo1-cR6utLWqbfh90A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>Small business owners need to take caution as well. One may think; "I'm too small to be a target". Security by obscurity is not a good policy. One may think: "I've got a firewall and a good IT company".&nbsp;<span style="color:inherit;">Are you willing to bet your business on that?&nbsp;</span>Cyber Security is a specialized field and many "generalist" IT and MSP organizations today simply do not have the expertise needed to properly and adequately protect your hard earned investment and customers. There are numerous cost-effective, methods, practices, and managed services that will significantly reduce your exposure and augment what your IT company is already doing.</div><p><br></p><div>Contact us at Cloud 9 Advisers to learn about better ways to protect your business. Through our Consulting &amp; Buying Program, our consulting services are free to you. We are provider-neutral, independent, and unbiased consultants of technology, telecom, cloud, <span style="font-style:italic;">and </span>security services.</div></div>
</div><div data-element-id="elm_HHOJ_jSGTpiyagB3K_W2CQ==" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 23 Jul 2018 13:50:54 -0500</pubDate></item></channel></rss>