<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/cyber-attack/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #cyber attack</title><description>Cloud 9 Advisers - News #cyber attack</description><link>https://www.cloud9advisers.com/News/tag/cyber-attack</link><lastBuildDate>Wed, 25 Feb 2026 18:46:58 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[EDR, XDR, and MDR]]></title><link>https://www.cloud9advisers.com/News/post/edr-xdr-and-mdr</link><description><![CDATA[Back in the old days the name of the cybersecurity game was prevention - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it regardless.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_xi8EiLn9TIW0uATsv_GPPg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_s-rvUTpkR62m2FRCBDHQTg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_tDT5eudNTdWvm6byINTgDA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_tDT5eudNTdWvm6byINTgDA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jWrAiBL2Seuoz3VziRLVsQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><div>EDR, XDR, and MDR: What are they and why are they important?</div></div></div></h2></div>
<div data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_13Kq9Tyg8H0jV4QIZucjwg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_DjM1Njwb2lljQkqTcgryuw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_DjM1Njwb2lljQkqTcgryuw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kOSll6w1qazWgnXNw_s9Xw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;">As one piece to a larger cybersecurity puzzle (strategy, plan, and ultimately, framework), EDR, XDR, and MDR are all cybersecurity <span style="font-style:italic;">solutions</span> that help organizations detect and respond to threats. However, they have different features and capabilities.</p><div style="color:inherit;"><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">Importance of EDR, XDR, and MDR</span></p><p style="margin-bottom:24px;font-size:16px;">EDR, XDR, and MDR are all important cybersecurity solutions, but the best solution for an organization will depend on its specific needs and budget.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with limited resources may want to consider EDR. EDR solutions can be effective at detecting and responding to threats, and they are typically more affordable than XDR and MDR solutions.</p><p style="margin-bottom:24px;font-size:16px;">Organizations with more complex needs may want to consider XDR or MDR. XDR solutions can provide a more complete view of threats and can automate threat detection and response. MDR solutions can provide organizations with 24/7 monitoring and threat response, which can be helpful for organizations with limited security resources.</p><div><div><span style="font-weight:bold;">What are they?</span></div>
</div><div><span style="font-weight:bold;"><br></span></div></div><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">EDR</span> (Endpoint Detection and Response) is a software solution that collects and analyzes endpoint data to detect and respond to threats. EDR solutions typically collect data from endpoints such as Windows Event Logs, Sysmon logs, and file system changes. They use this data to identify suspicious activity, such as malware infections, unauthorized access, and data exfiltration. EDR solutions can also be used to block threats and remediate incidents.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">XDR</span> (Extended Detection and Response) is a more comprehensive approach to EDR that collects data from a wider range of sources, including endpoints, networks, cloud, and user behavior. This allows XDR solutions to provide a more complete view of threats and to respond more effectively. XDR solutions typically integrate with other security tools, such as SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response), to automate threat detection and response.</p><p style="margin-bottom:24px;font-size:16px;"><span style="font-weight:bold;">MDR</span> (Managed Detection and Response) is a service that provides organizations with 24/7 monitoring and threat response for their endpoints. MDR providers typically use EDR or XDR solutions to collect and analyze endpoint data. They then use this data to identify and respond to threats on behalf of their customers. MDR providers can also provide additional services, such as threat hunting, incident response, and compliance reporting.</p><p style="margin-bottom:24px;font-size:16px;">In summary, the key differences between EDR, XDR, and MDR are:</p><ul><li style="margin-bottom:10px;">Scope:&nbsp;EDR focuses on endpoints, while XDR collects data from a wider range of sources. MDR is a service that provides 24/7 monitoring and threat response for endpoints and other key components of the network.</li><li style="margin-bottom:10px;">Capabilities:&nbsp;EDR can detect and respond to threats, but XDR has more comprehensive capabilities, such as threat hunting and incident response. MDR providers can also provide additional services, such as threat hunting and compliance reporting.</li><li style="margin-bottom:10px;">Pricing:&nbsp;EDR solutions are typically priced per endpoint, while XDR and MDR solutions are typically priced per organization.</li></ul><p style="margin-bottom:24px;font-size:16px;">The best solution for an organization will depend on its specific needs and budget. Organizations with limited resources may want to consider EDR. Organizations with more complex needs may want to consider XDR or MDR.</p><p style="margin-bottom:24px;font-size:16px;">Here is a table that summarizes the key differences between EDR, XDR, and MDR</p></div>
</div></div><div data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_gyRIFGoh65EFx0q6svaIVQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:25%;" class="zp-selected-cell"><span style="font-weight:bold;"><span style="color:inherit;"><span style="font-size:14px;">Feature</span></span> </span></td><td style="width:25%;"><span style="font-weight:bold;">EDR</span></td><td style="width:25%;"><span style="font-weight:bold;">XDR</span></td><td style="width:25%;"><span style="font-weight:bold;">MDR</span></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Scope</span></span><br></td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td><td style="width:25%;"> Endpoints, networks, cloud, user behavior</td><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Endpoints</span></span><br></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Capabilities</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Detect and respond to threats</span><br></td><td style="width:25%;"><span style="color:inherit;">Detect, respond, and hunt for threats</span><br></td><td style="width:25%;"><div style="color:inherit;"><div>Detect, respond, hunt for threats, and provide 24/7 monitoring</div><br><div><br></div></div></td></tr><tr><td style="width:25%;"><span style="color:inherit;"><span style="font-size:14px;">Pricing</span></span><br></td><td style="width:25%;"><span style="color:inherit;">Per endpoint</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td><td style="width:25%;"><span style="color:inherit;">Per organization</span><br></td></tr></tbody></table></div>
</div><div data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2pLXKWWkKP0xFH9UhNZ6oQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div><span style="font-weight:bold;">Why should&nbsp;<span style="font-style:italic;">every</span> company have either one, two, or all three solutions in place?</span></div>
</div><div><br></div><div><div> No matter what size or industry, every company should have well-thought-out cybersecurity solutions in place to protect against threats. Back in &quot;the old days&quot; the name of the cybersecurity game was prevention (only) - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it&nbsp;regardless. Today, to protect yourself, you must first be able to <span style="font-style:italic;">detect</span>&nbsp;those threats first in order to respond. EDR, XDR, and MDR can all help companies to detect and respond to threats effectively.&nbsp; </div>
</div><div><br></div><div><div> EDR is a great foundation for any cybersecurity strategy. Many will argue that EDR should be the <span style="font-style:italic;">first</span>&nbsp;step. It can help to detect and respond to threats on endpoints, which are often the first target of attackers - especially considering so many remote/hybrid staff with access to company data.&nbsp; </div>
</div><div><br></div><div> XDR can provide a more complete view of threats and can automate threat detection and response. This can be helpful for companies with complex IT environments. </div>
<div><br></div><div> MDR can provide companies with 24/7 monitoring and threat response, which can be helpful for companies with limited security resources. </div>
<div><br></div><div> A typical company should have one, two, or all three of these solutions in place depending on its specific needs and budget. For example, a small company with limited resources may only need EDR. A large company with a complex IT environment may want to have all three solutions in place. </div>
</div></div></div><div data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"].zpelem-table{ border-radius:1px; } [data-element-id="elm_zp13fDFmZGlc7cBg8d7IqQ"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-left zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="width:50%;"><span style="color:inherit;">Company type</span> </td><td style="width:50%;"><div style="color:inherit;"><div>Best solution</div></div></td></tr><tr><td style="width:50%;"><span style="color:inherit;">Small company with limited resources</span><br></td><td style="width:50%;">EDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Medium-sized company with moderate resources</span><br></td><td style="width:50%;">EDR and/or XDR</td></tr><tr><td style="width:50%;"><span style="color:inherit;">Large company with complex IT environment</span><br></td><td style="width:50%;" class="zp-selected-cell">EDR + XDR and/or MDR</td></tr></tbody></table></div>
</div><div data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2-QsG4go9CYs7RMcMBfA8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>It is important to note that this is just a general guide. The best way to determine which solution is right for your company is to consult with a vendor-neutral, unbiased cybersecurity expert.</div><br><div><span style="font-style:italic;font-weight:bold;">Remember: if your company can only afford one cybersecurity solution, make it EDR</span></div></div><div style="color:inherit;"><div style="width:948px;"><div><div></div></div></div><div style="width:948px;"></div></div></div>
</div></div><div data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg zpsticky-enabled"><style type="text/css"> [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ border-radius:1px; } @media (min-width:992px) { [data-element-id="elm_fHtwhbUv4Ei7bJ7CZgJNYg"].zpelem-col{ top:0px;z-index:1; } } </style><div data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width: 350px ; height: 254.92px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:723px ; height:526.59px ; } } @media (max-width: 767px) { [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"] .zpimage-container figure img { width:415px ; height:302.26px ; } } [data-element-id="elm_HeVyzUP7UgPW-pafKN8J3g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/TPS-Report-Meme.jpg" width="415" height="302.26" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Uj2bEWxJE05ghFSbibOy1g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:rgb(48, 4, 234);">Readiness Report</span></h2></div>
<div data-element-id="elm_azldy0VBAu7gRgLjB6TkDw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_azldy0VBAu7gRgLjB6TkDw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(48, 4, 234);">Schedule a security interview with one of our experts, then in a few days, we'll generate a custom, 50 to 100 page Cybersecurity Readiness Report you can use&nbsp; as a playbook for your security strategy.&nbsp;<br></span></p><p><span style="color:rgb(48, 4, 234);"><br></span></p><p><span style="color:rgb(48, 4, 234);">You can even use the report as ammunition for your case to get your security budget passed.&nbsp;</span></p></div></div>
</div><div data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_hj4rUfdaxsD5ZteiO_PN9w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/aboutus" target="_blank"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_uPz45HKcReKZhhdLR5m6sw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uPz45HKcReKZhhdLR5m6sw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Security Experts</span></a></div>
</div><div data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4a5p1d_2uL6Vbm39-egz8Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jcH2LiwKlaBzMqIn95Yayg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Cloud 9 Advisers, LLC was formed as a client-facing, </span>business<span style="color:inherit;">-to-</span>business<span style="color:inherit;">&nbsp;agency/firm in 2017 with the goal of forever changing the way businesses buy AI, cybersecurity, contact center, and other important IT-related services and solutions: faster, better, less formal, and with the high-quality due diligence and integrity that all companies expect.&nbsp;</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;font-weight:bold;">Technology Sourcing Experts</span></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 17 Oct 2023 17:49:19 -0500</pubDate></item><item><title><![CDATA[Under Constant Attack]]></title><link>https://www.cloud9advisers.com/News/post/under-constant-attack</link><description><![CDATA[Most companies only have basic firewall protection, generally hardware-based and maybe a few others may conduct regular scans of their environment. Really no different than your home having a basic lock and maybe a deadbolt.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PeBlM-B7QBSoRizcLxfeFg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bVe8xmGiRf2NMBIZ-WIqQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RkvKXUFZSsSuqpus-rrQQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Constant attacks require constant Security<br></h2></div>
<div data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ"].zpelem-text { border-radius:1px; padding:100px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We’re in an environment where our systems are constantly under attack. They're under attack from all sorts of diverse players who are trying to take advantage of the private proprietary information that is available.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Companies are really focused on compliance ensuring that they are protecting their business value from these types of attacks. Every executive has an obligation to ensure that they are compliant with security.&nbsp;<br></div><p><br></p><div>What are most companies doing for security?&nbsp;</div><p><br></p><div>Most companies only have basic firewall protection, your basic intrusion prevention (not necessarily intrusion detection), generally just hardware-based. A few others may do just a little more; they may conduct regular scans of their environment. This is really no different than your home having a basic lock and maybe a deadbolt. There is no alarm system like you might have in a home to see and be alerted when intrusions are happening. Being alerted of intrusion is critical in business so that more immediate actions can be taken. Often enough, attacks can be sly and stealthy. Recent studies show that malicious code is embedded on business systems for more than 250 days before it is ever used to promote an actual attack. The reason being so that attackers know their code is also well planted in several layers of business backups as well as active systems.&nbsp;</div><p><br></p><div>How have today’s complex attacks changed systems and the approach to security?&nbsp;</div><p><br></p><div>The attacks are becoming more sophisticated, automated,&nbsp; and voluminous, so we no longer have the time nor capability to react in a manual way. We actually have to have machine learning and other artificial intelligence technologies to adapt and scan the environment much more rapidly looking for these constant intrusions malicious code, and breeches. These technologies work in tandem with professional cybersecurity teams and Security Operations Centers (SOCs) to constantly manage, monitor, and alert. The trick with alerts is dramatically reducing false positives. Too many alerts are just as futile as too few.&nbsp;</div><div><br></div><div>How much does a cyber attack cost?&nbsp;</div><p><br></p><p>Recent US cyber crime studies show an average measurement of damage from a breach: a 46 day long average resolution at an average of $21k per day, plus regulatory fines, and major customer fallout. These attacks can be highly damaging to any business. Cyber insurance can only go so far and cover so much. Claims can also be denied for a host of often confusing reasons, leaving the business to fit the bill. These newer types of cyber insurance policies have many requirements and stipulations, and with a sense of irony, those requirements are very much cybersecurity technology many of which are security technology related.<br></p><p><br></p><div>Contact us today and let’s evaluate your business security posture.</div></div>
</div><div data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers is a client-only, client-focused agency and consulting group offering vendor selection and management services to help you solve IT and general technology problems fast. We'll walk you through the identification, research, evaluation, and comparison process, provide board-ready documentation and due diligence, and provide oversight of solution implementation on any of our 250+ vendors, carriers, and service providers.&nbsp;</p><p><br></p><p>Our teams of vendor-neutral security focused engineers will help you slice through the marketing fluff and&nbsp; industry jargon so you know what you're buying. We'll help you make smart IT investments quickly and confidently. Reach out to us today!</p></div>
</div><div data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us page"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 21 Jul 2021 14:59:22 -0500</pubDate></item><item><title><![CDATA[ALERT: SolarWinds & FireEye]]></title><link>https://www.cloud9advisers.com/News/post/Alert-solarwinds-hack-is-serious</link><description><![CDATA[Unfortunately, Cyber Attacks don’t take time off to celebrate with family and friends. Are you concerned your business has been affected by the SolarWinds hack? If so, get help right away.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_LBgEgRbkQeqBq3tnqEjWwQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WiIOsdJiRzOhmFwfKBKXEQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_6w3WxJThTQiTYcaJbjRiaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_AMUHfIWXTS6nDZZQkBpu5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AMUHfIWXTS6nDZZQkBpu5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Tips to protect yourself against the SolarWinds Breach</span></h2></div>
<div data-element-id="elm_mwuPV9mDSQKsQwyP8h8RrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mwuPV9mDSQKsQwyP8h8RrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;font-weight:bold;">Are you concerned your business has been affected by the SolarWinds hack?</span><br></p></div>
</div><div data-element-id="elm_a-kWMZqRA4LITRoWxvgOFw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_a-kWMZqRA4LITRoWxvgOFw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/solarwinds-orion-campaign-victims-include-cisco-intel-imageFileLarge-10-a-15619.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_YonUOzoN41j1XXSbK8-85g" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_YonUOzoN41j1XXSbK8-85g"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_YonUOzoN41j1XXSbK8-85g"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_04_XKix86UNXolrDUAGsaQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_04_XKix86UNXolrDUAGsaQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3dpl_MXk67PcWSLIAnjcMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3dpl_MXk67PcWSLIAnjcMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DV-AHi70ArPv6wMKCePVRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DV-AHi70ArPv6wMKCePVRw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Are you concerned your business has been affected by the SolarWinds hack?</span><br></h3></div>
<div data-element-id="elm_GDLCbqoEOMpsxpsM5G5kBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GDLCbqoEOMpsxpsM5G5kBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Unfortunately, Cyber Attacks don’t take time off to celebrate with family and friends. Due to the recent news about FireEye discovering the major SolarWinds hack we want to make sure you are equipped and prepared. Cloud 9 and our cybersecurity vendors are receiving numerous inquiries about the recent cyber-attacks on Solarwinds.&nbsp;<br></div><p><br></p><p><span style="color:inherit;">Most people have never heard of SolarWinds, which provides IT infrastructure management tools to hundreds of thousands of customers including government agencies, corporations, and nonprofit organizations. SolarWinds boasts of&nbsp;</span><span style="color:inherit;">300,000 global customers of whom include most of the S&amp;P 500, hundreds of colleges and universities, and many of the country’s most important government agencies including the US State&nbsp;</span><span style="color:inherit;">Department</span><span style="color:inherit;">,&nbsp;</span><span style="color:inherit;">Department of&nbsp;</span><span style="color:inherit;">Commerce, US Treasury,&nbsp;</span><span style="color:inherit;">Department of&nbsp;</span><span style="color:inherit;">Homeland Security, and the National Institutes of Health to name a few.</span></p><p><span style="color:inherit;"><br></span></p><div>News sources are saying this is the biggest cyber attack from a nation state in US history. Many are blaming a state-sponsored attack from Russia, some say the Russian group &quot;Cozy Bear&quot;, still fewer have said that China may be involved. Even though the main target appears to be the US Government the threat goes much deeper giving the attackers administrative access to critical systems of potentially every SolarWinds customer. Because the attacks were targeted against a hugely popular and widely used IT infrastructure monitoring software the effects will be catastrophic to many commercial businesses around the globe.&nbsp;</div><p><span style="color:inherit;"><br></span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span style="color:inherit;">&quot;This is a huge problem for two major reasons: The attackers were able to gain access for a long period of time without being detected, and it will also take a long time for security experts to determine the extent of what's been compromised.&quot; -&nbsp;<span style="font-style:italic;">Business Insider</span></span></p></blockquote><p><span style="color:inherit;"><br></span></p><div>Here are just a few headlines from several news outlets about the breach:&nbsp;</div><ul><li><a href="https://apnews.com/article/hacking-russia-bafff5557a8941aa1a5ef239d36c4e28" target="_blank" rel="noreferrer">&quot;Hacked networks will need to be burned 'down to the ground'&quot; - Associated Press</a></li><li><a href="https://www.businessinsider.com/fallout-solarwinds-hack-get-worse-before-gets-better-2020-12" target="_blank" rel="noreferrer">&quot;The fallout from SolarWinds hack will get worse before it gets better&quot; - Business Insider</a></li><li><a href="https://arstechnica.com/information-technology/2020/12/feds-warn-that-solarwinds-hackers-likely-used-other-ways-to-breach-networks/" target="_blank" rel="noreferrer">&quot;SolarWinds hack that breached gov networks poses a 'grave risk' to the nation&quot; - Ars Technica</a></li><li><a href="https://www.crn.com/news/security/cisco-hacked-through-solarwinds-as-tech-casualties-mount" target="_blank" rel="noreferrer">&quot;Cisco Hacked Through SolarWinds As Tech Casualties Mount&quot; - CRN</a></li><li><a href="https://bobsullivan.net/cybercrime/google-down-government-hacked-fireeye-raided-amazon-outage-its-been-a-rough-patch/" target="_blank" rel="noreferrer">&quot;Google down, government hacked, FireEye raided, Amazon outage — it’s been a rough patch&quot; - BobSullivan.net</a><br></li></ul><div><br></div><div>If you are concerned you could be at risk, please reach out to Cloud 9 <span style="font-style:italic;font-weight:bold;">immediately</span>. Our vendor-neutral cybersecurity experts will help to validate any concerns, plot the best course of action, and determine the ideal Risk Assessment and Security Assessment services and vendors for your organization. This will give you the ability to inspect all targeted areas within your environment for active malware and other vulnerabilities.<br></div><p><span style="color:inherit;"><br></span></p><div>If you are experiencing questionable activity or are concerned in any way...<br></div><ol><li>Describe the suspicious activity.<br></li><li>When did you first notice it?<br></li><li>Are you a SolarWinds customer?<br></li><ul><li>If so, what have you done so far?&nbsp;</li><li>If not, what monitoring services do you use?</li></ul><li>Are any of your technology service providers a SolarWinds client? If so, who?<br></li><li>Have you noticed any impact to your business? If so, what?<br></li><li>Have you communicated the suspicious activity anyone else? (Executive team, corporate attorney, cyber-insurance provider, etc…)</li></ol><p><br></p><p><span style="font-weight:bold;">Immediate next steps </span>– contact Cloud 9 for help and guidance to find the right cybersecurity solution, service, and vendor for initial triage and long-term protection.<br></p></div>
</div></div><div data-element-id="elm_TPsdXBec5h1biu9y0Jhydw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TPsdXBec5h1biu9y0Jhydw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ"] div.zpspacer { height:241px; } @media (max-width: 768px) { div[data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ"] div.zpspacer { height:calc(241px / 3); } } </style><div class="zpspacer " data-height="241"></div>
</div><div data-element-id="elm_Bbb7VbciskA638VT8xUfJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Bbb7VbciskA638VT8xUfJg"].zpelem-text { border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 is here to help. Our Vendor Selection and Vendor Management services are free to our clients and are designed to help you determine the best course of action and quickly narrow the focus to the best solutions and vendors for your specific needs.&nbsp;</p><p><br></p><p style="text-align:center;">Learn more about&nbsp;<a href="/cybersecurity" title="Cybersecurity" target="_blank" rel="">Cybersecurity</a></p><p style="text-align:center;"><br></p><p style="text-align:left;">As a client you'll have guided access to our proprietary Pathfinder app and experts. We'll get you started down the right path, focused on the right solutions, and narrow down the right vendors to evaluate.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Click the button below to book your appointment now.&nbsp;</p></div>
</div><div data-element-id="elm_KsCt9SiHpega0rTPPcmtyA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_KsCt9SiHpega0rTPPcmtyA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book you appointment"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_sc5212VnR6-1wDAgXn8OAw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_sc5212VnR6-1wDAgXn8OAw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book your appointment"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 28 Dec 2020 12:23:55 -0500</pubDate></item></channel></rss>