<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/cyber-risk/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #cyber risk</title><description>Cloud 9 Advisers - News #cyber risk</description><link>https://www.cloud9advisers.com/News/tag/cyber-risk</link><lastBuildDate>Wed, 25 Feb 2026 18:43:52 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Under Constant Attack]]></title><link>https://www.cloud9advisers.com/News/post/under-constant-attack</link><description><![CDATA[Most companies only have basic firewall protection, generally hardware-based and maybe a few others may conduct regular scans of their environment. Really no different than your home having a basic lock and maybe a deadbolt.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PeBlM-B7QBSoRizcLxfeFg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bVe8xmGiRf2NMBIZ-WIqQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RkvKXUFZSsSuqpus-rrQQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Constant attacks require constant Security<br></h2></div>
<div data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ"].zpelem-text { border-radius:1px; padding:100px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We’re in an environment where our systems are constantly under attack. They're under attack from all sorts of diverse players who are trying to take advantage of the private proprietary information that is available.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Companies are really focused on compliance ensuring that they are protecting their business value from these types of attacks. Every executive has an obligation to ensure that they are compliant with security.&nbsp;<br></div><p><br></p><div>What are most companies doing for security?&nbsp;</div><p><br></p><div>Most companies only have basic firewall protection, your basic intrusion prevention (not necessarily intrusion detection), generally just hardware-based. A few others may do just a little more; they may conduct regular scans of their environment. This is really no different than your home having a basic lock and maybe a deadbolt. There is no alarm system like you might have in a home to see and be alerted when intrusions are happening. Being alerted of intrusion is critical in business so that more immediate actions can be taken. Often enough, attacks can be sly and stealthy. Recent studies show that malicious code is embedded on business systems for more than 250 days before it is ever used to promote an actual attack. The reason being so that attackers know their code is also well planted in several layers of business backups as well as active systems.&nbsp;</div><p><br></p><div>How have today’s complex attacks changed systems and the approach to security?&nbsp;</div><p><br></p><div>The attacks are becoming more sophisticated, automated,&nbsp; and voluminous, so we no longer have the time nor capability to react in a manual way. We actually have to have machine learning and other artificial intelligence technologies to adapt and scan the environment much more rapidly looking for these constant intrusions malicious code, and breeches. These technologies work in tandem with professional cybersecurity teams and Security Operations Centers (SOCs) to constantly manage, monitor, and alert. The trick with alerts is dramatically reducing false positives. Too many alerts are just as futile as too few.&nbsp;</div><div><br></div><div>How much does a cyber attack cost?&nbsp;</div><p><br></p><p>Recent US cyber crime studies show an average measurement of damage from a breach: a 46 day long average resolution at an average of $21k per day, plus regulatory fines, and major customer fallout. These attacks can be highly damaging to any business. Cyber insurance can only go so far and cover so much. Claims can also be denied for a host of often confusing reasons, leaving the business to fit the bill. These newer types of cyber insurance policies have many requirements and stipulations, and with a sense of irony, those requirements are very much cybersecurity technology many of which are security technology related.<br></p><p><br></p><div>Contact us today and let’s evaluate your business security posture.</div></div>
</div><div data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers is a client-only, client-focused agency and consulting group offering vendor selection and management services to help you solve IT and general technology problems fast. We'll walk you through the identification, research, evaluation, and comparison process, provide board-ready documentation and due diligence, and provide oversight of solution implementation on any of our 250+ vendors, carriers, and service providers.&nbsp;</p><p><br></p><p>Our teams of vendor-neutral security focused engineers will help you slice through the marketing fluff and&nbsp; industry jargon so you know what you're buying. We'll help you make smart IT investments quickly and confidently. Reach out to us today!</p></div>
</div><div data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us page"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 21 Jul 2021 14:59:22 -0500</pubDate></item><item><title><![CDATA[ALERT: SolarWinds & FireEye]]></title><link>https://www.cloud9advisers.com/News/post/Alert-solarwinds-hack-is-serious</link><description><![CDATA[Unfortunately, Cyber Attacks don’t take time off to celebrate with family and friends. Are you concerned your business has been affected by the SolarWinds hack? If so, get help right away.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_LBgEgRbkQeqBq3tnqEjWwQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WiIOsdJiRzOhmFwfKBKXEQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_6w3WxJThTQiTYcaJbjRiaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_AMUHfIWXTS6nDZZQkBpu5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AMUHfIWXTS6nDZZQkBpu5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Tips to protect yourself against the SolarWinds Breach</span></h2></div>
<div data-element-id="elm_mwuPV9mDSQKsQwyP8h8RrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mwuPV9mDSQKsQwyP8h8RrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;font-weight:bold;">Are you concerned your business has been affected by the SolarWinds hack?</span><br></p></div>
</div><div data-element-id="elm_a-kWMZqRA4LITRoWxvgOFw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_a-kWMZqRA4LITRoWxvgOFw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/solarwinds-orion-campaign-victims-include-cisco-intel-imageFileLarge-10-a-15619.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_YonUOzoN41j1XXSbK8-85g" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_YonUOzoN41j1XXSbK8-85g"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_YonUOzoN41j1XXSbK8-85g"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_04_XKix86UNXolrDUAGsaQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_04_XKix86UNXolrDUAGsaQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3dpl_MXk67PcWSLIAnjcMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3dpl_MXk67PcWSLIAnjcMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DV-AHi70ArPv6wMKCePVRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DV-AHi70ArPv6wMKCePVRw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Are you concerned your business has been affected by the SolarWinds hack?</span><br></h3></div>
<div data-element-id="elm_GDLCbqoEOMpsxpsM5G5kBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GDLCbqoEOMpsxpsM5G5kBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Unfortunately, Cyber Attacks don’t take time off to celebrate with family and friends. Due to the recent news about FireEye discovering the major SolarWinds hack we want to make sure you are equipped and prepared. Cloud 9 and our cybersecurity vendors are receiving numerous inquiries about the recent cyber-attacks on Solarwinds.&nbsp;<br></div><p><br></p><p><span style="color:inherit;">Most people have never heard of SolarWinds, which provides IT infrastructure management tools to hundreds of thousands of customers including government agencies, corporations, and nonprofit organizations. SolarWinds boasts of&nbsp;</span><span style="color:inherit;">300,000 global customers of whom include most of the S&amp;P 500, hundreds of colleges and universities, and many of the country’s most important government agencies including the US State&nbsp;</span><span style="color:inherit;">Department</span><span style="color:inherit;">,&nbsp;</span><span style="color:inherit;">Department of&nbsp;</span><span style="color:inherit;">Commerce, US Treasury,&nbsp;</span><span style="color:inherit;">Department of&nbsp;</span><span style="color:inherit;">Homeland Security, and the National Institutes of Health to name a few.</span></p><p><span style="color:inherit;"><br></span></p><div>News sources are saying this is the biggest cyber attack from a nation state in US history. Many are blaming a state-sponsored attack from Russia, some say the Russian group &quot;Cozy Bear&quot;, still fewer have said that China may be involved. Even though the main target appears to be the US Government the threat goes much deeper giving the attackers administrative access to critical systems of potentially every SolarWinds customer. Because the attacks were targeted against a hugely popular and widely used IT infrastructure monitoring software the effects will be catastrophic to many commercial businesses around the globe.&nbsp;</div><p><span style="color:inherit;"><br></span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span style="color:inherit;">&quot;This is a huge problem for two major reasons: The attackers were able to gain access for a long period of time without being detected, and it will also take a long time for security experts to determine the extent of what's been compromised.&quot; -&nbsp;<span style="font-style:italic;">Business Insider</span></span></p></blockquote><p><span style="color:inherit;"><br></span></p><div>Here are just a few headlines from several news outlets about the breach:&nbsp;</div><ul><li><a href="https://apnews.com/article/hacking-russia-bafff5557a8941aa1a5ef239d36c4e28" target="_blank" rel="noreferrer">&quot;Hacked networks will need to be burned 'down to the ground'&quot; - Associated Press</a></li><li><a href="https://www.businessinsider.com/fallout-solarwinds-hack-get-worse-before-gets-better-2020-12" target="_blank" rel="noreferrer">&quot;The fallout from SolarWinds hack will get worse before it gets better&quot; - Business Insider</a></li><li><a href="https://arstechnica.com/information-technology/2020/12/feds-warn-that-solarwinds-hackers-likely-used-other-ways-to-breach-networks/" target="_blank" rel="noreferrer">&quot;SolarWinds hack that breached gov networks poses a 'grave risk' to the nation&quot; - Ars Technica</a></li><li><a href="https://www.crn.com/news/security/cisco-hacked-through-solarwinds-as-tech-casualties-mount" target="_blank" rel="noreferrer">&quot;Cisco Hacked Through SolarWinds As Tech Casualties Mount&quot; - CRN</a></li><li><a href="https://bobsullivan.net/cybercrime/google-down-government-hacked-fireeye-raided-amazon-outage-its-been-a-rough-patch/" target="_blank" rel="noreferrer">&quot;Google down, government hacked, FireEye raided, Amazon outage — it’s been a rough patch&quot; - BobSullivan.net</a><br></li></ul><div><br></div><div>If you are concerned you could be at risk, please reach out to Cloud 9 <span style="font-style:italic;font-weight:bold;">immediately</span>. Our vendor-neutral cybersecurity experts will help to validate any concerns, plot the best course of action, and determine the ideal Risk Assessment and Security Assessment services and vendors for your organization. This will give you the ability to inspect all targeted areas within your environment for active malware and other vulnerabilities.<br></div><p><span style="color:inherit;"><br></span></p><div>If you are experiencing questionable activity or are concerned in any way...<br></div><ol><li>Describe the suspicious activity.<br></li><li>When did you first notice it?<br></li><li>Are you a SolarWinds customer?<br></li><ul><li>If so, what have you done so far?&nbsp;</li><li>If not, what monitoring services do you use?</li></ul><li>Are any of your technology service providers a SolarWinds client? If so, who?<br></li><li>Have you noticed any impact to your business? If so, what?<br></li><li>Have you communicated the suspicious activity anyone else? (Executive team, corporate attorney, cyber-insurance provider, etc…)</li></ol><p><br></p><p><span style="font-weight:bold;">Immediate next steps </span>– contact Cloud 9 for help and guidance to find the right cybersecurity solution, service, and vendor for initial triage and long-term protection.<br></p></div>
</div></div><div data-element-id="elm_TPsdXBec5h1biu9y0Jhydw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TPsdXBec5h1biu9y0Jhydw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ"] div.zpspacer { height:241px; } @media (max-width: 768px) { div[data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ"] div.zpspacer { height:calc(241px / 3); } } </style><div class="zpspacer " data-height="241"></div>
</div><div data-element-id="elm_Bbb7VbciskA638VT8xUfJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Bbb7VbciskA638VT8xUfJg"].zpelem-text { border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 is here to help. Our Vendor Selection and Vendor Management services are free to our clients and are designed to help you determine the best course of action and quickly narrow the focus to the best solutions and vendors for your specific needs.&nbsp;</p><p><br></p><p style="text-align:center;">Learn more about&nbsp;<a href="/cybersecurity" title="Cybersecurity" target="_blank" rel="">Cybersecurity</a></p><p style="text-align:center;"><br></p><p style="text-align:left;">As a client you'll have guided access to our proprietary Pathfinder app and experts. We'll get you started down the right path, focused on the right solutions, and narrow down the right vendors to evaluate.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Click the button below to book your appointment now.&nbsp;</p></div>
</div><div data-element-id="elm_KsCt9SiHpega0rTPPcmtyA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_KsCt9SiHpega0rTPPcmtyA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book you appointment"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_sc5212VnR6-1wDAgXn8OAw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_sc5212VnR6-1wDAgXn8OAw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book your appointment"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 28 Dec 2020 12:23:55 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Vigilant Technology Solutions]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-vigilant5</link><description><![CDATA[Contact Cloud 9 to learn how Vigilant helps avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_S2bu05bgTouOYfLEkFqhVw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_14CUUbX4QtitSFNVn4n8rg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_MZTvZw0ZR_aD0KJjDyhIEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_-ihGIFdVTHaiXv3Ug0k6PA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-ihGIFdVTHaiXv3Ug0k6PA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Malware Found on Patient Medical Monitoring Devices</span></h2></div>
<div data-element-id="elm_pN8_GphHuFecAjxakhSuIw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_pN8_GphHuFecAjxakhSuIw"].zpelem-image { border-radius:1px; margin-block-start:37px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/57e8d4414a5bae14f6da8c7dda79367f103cd9ed55536c4870277bdd944fc551b1_1280.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_w2zTz4e4RxeE2KxioUzhVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_w2zTz4e4RxeE2KxioUzhVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">by: Vigilant Technologies and David Dickmeyer</span></p></div>
</div><div data-element-id="elm_DvWKLft1bV3hKLY1UpBgJA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DvWKLft1bV3hKLY1UpBgJA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Supplier Spotlight:&nbsp; <a href="https://vigilantnow.com/" title="Vigilant&nbsp;Technology Solutions" target="_blank">Vigilant</a><a href="https://vigilantnow.com/" title="Vigilant&nbsp;Technology Solutions" target="_blank">&nbsp;Technology Solutions</a></p></div>
</div><div data-element-id="elm_ry0gTuWgn_MDxHSnnBrnAA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_ry0gTuWgn_MDxHSnnBrnAA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Vigilant1.jfif" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_F1h_Qvhu8QbTIJlF-JbtnQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_F1h_Qvhu8QbTIJlF-JbtnQ"].zpelem-text { border-radius:1px; margin-block-start:52px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;font-weight:bold;">Vigilant helps you avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!&nbsp;</span><br></p></div>
</div><div data-element-id="elm_CIjwIvnHZ8ytl1QlF5gICw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CIjwIvnHZ8ytl1QlF5gICw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Why, does it seem that companies are falling victim to hackers left and right? To add insult to injury, these are not ordinary companies we are talking about. They are companies ranging from Fortune 500s and major retailers to banking institutions, all with very large security budgets intended to maintain the security of their customer’s data. These incidents lead organizations to ask themselves three important questions</div><div><ol><ol><ol><li>If all of these companies are compliant with industry regulations, how is it they are still so successfully attacked?</li><li>With security budgets of giant companies in the millions, how will I ever be able to afford protecting myself?</li><li>If Firewalls, logging, and AV are getting better all the time, how do these attacks go undetected?</li></ol></ol></ol></div><p><br></p><p>CyberDNA is a managed network security monitoring service from Vigilant LLC. and successfully reduces the overall cyber risk to an organization by proactively monitoring the customer’s network for signs of anomalous activity that could be indicative of an active compromise, misconfigurations, or other notable security risks. To allow customers to see the added value of CyberDNA over and above industry leaders, Vigilant offers a proof-of-value, free trial period, which produces a detailed threat report of our findings. This written report contains the findings from that free trial and highlights the value of having a fully managed continuous network security monitoring service.</p><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Why your Network Loves Ebola</span></div><p>The headline might seem a bit dramatic, but there really is a correlation between diseases, how (and when) they are treated, and how your network and company data are protected – specifically, how antivirus works.<br></p><p><br></p><div>Modern medicine is amazing. It seems like every other week another news story comes out about some major breakthrough, some miracle treatment for a disease once thought to be incurable. It has become so commonplace, in fact, that we often find ourselves scratching our heads, impatiently wondering why all disease can’t simply be cured.&nbsp;</div><div><br></div><div>We’ve become so accustomed to miraculous breakthroughs that it takes something extraordinary – a disease of incomparable fear - to make us take notice. In the 1940s and 50s, it was Polio. In the 1980s, it was HIV and AIDS. Today’s scariest threat is Ebola.</div><div><br></div><div><span style="color:inherit;"><div>More recently, we’ve observed the spread of Ebola throughout sub-Saharan Africa. What started as a&nbsp;<span style="color:inherit;">couple isolated cases quickly spread to dozens, dozens begat hundreds, and hundreds were quickly morphed into thousands.</span></div><br><div>But this is the where the cold, hard truth of modern medicine comes into play. While seemingly miraculous to the yet uninfected, the discovery and synthesis of treatments for some of our most troublesome and problematic medical disorders comes at the ultimate sacrifice of those unlucky enough to have been exposed before us. How many thousands died of HIV and AIDs before a cocktail of drugs was identified to control its symptoms? How many children were left stricken with Polio before Jonas Saulk synthesized his vaccine?</div><div><br></div><div>Ebola is no different. In order for people to be protected from Ebola, other people, unfortunately, need to get sick and often times die from it. It’s in this critical mass of early sufferers that treatment will be found. As more people get sick, more opportunities for study arise – more opportunities for testing treatments.</div><div><br></div><div>This phenomenon is the same with most modern-day “cyber-diseases&quot;. And the “cures”, like antivirus, next-generation firewalls, or intrusion detection and prevention solutions, all come from a method called signature-based detection. Signature-based detection at its core is the data security equivalent of antibiotics and vaccines. It is a treatment for an illness that has already infected many others – hopefully before you<span style="color:inherit;">. But, like many vaccines, it isn’t necessarily responsive. Other networks had to be infected with the disease first before any of the technologies had the ability to detect it. Therefore, widespread detection capabilities are merely reactive. They are only designed to discover <span style="font-style:italic;">known</span> threats and if it doesn’t know about them, it can’t detect them.</span></div><br><div><span style="color:inherit;"><div>Our largest challenge as defenders and cybersecurity professionals is that threats are constantly changing. Hackers are targeting companies with <span style="font-style:italic;">specific</span> tactics – tactics designed for exploiting an individual system, organization, or end user&nbsp;<span style="color:inherit;">– not just widespread threats</span><span style="color:inherit;">. It’s like a disease designed specifically to make you and only you sick. There’s no way to benefit from others prior illness. Signature based detection, which gives many network administrators a sense of security, is certainly good to have, but it’s only one layer of security – and not a terribly effective one on targeted attacks.&nbsp;</span></div></span><span style="color:inherit;"><br><div><span style="font-weight:bold;">Targeted tactics are why hackers can infiltrate and remain inside organizations undetected for up to 215 days on average and why big organizations are struggling to defend against them.</span></div><div><br></div><div>Protecting your network and data today requires multiple layers of security and the ability to identify <span style="font-style:italic;">any</span> abnormality – often the symptoms before a diagnosis. Network visibility is the essential prerequisite to effective security.</div></span></div></span></div></div>
</div><div data-element-id="elm_p8iaY-GUBL_mWR9sB0bubw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_p8iaY-GUBL_mWR9sB0bubw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Case Study: Malware Found on Patient Medical Monitoring Devices</span></h2></div>
<div data-element-id="elm_KdtHnziCSk4nv2EhPjyDuA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KdtHnziCSk4nv2EhPjyDuA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Vigilant was engaged by a Healthcare Provider who was experiencing a sudden and extreme drop in bandwidth within their infrastructure. Their IT staff had been working on the problem for two weeks without any detection or artifacts of the problem visible in their existing IDS/IPS or logs. Something was eating up their bandwidth and bringing them to a grinding halt. Upon starting the engagement, Vigilant installed its CyberDNA sensors that would give the best ability to collect all traffic traversing the customer network.&nbsp;</div><div>CyberDNA is agentless, meaning there is no software loaded on any customer devices, which also ensures that the attacker is not aware of the monitoring device/service. This further reduces the risk of any potential attacker’s countermeasures. We strategically placed our sensors in a manner that will not alert the attacker of our presence while still allowing full visibility. The remote attacker has to travel across the network at some point on their way out to the internet. This allows for an interesting vantage point of our detection and monitoring tools as no matter how the attacker tries to conceal themselves they still have to travel on the network and are detectable by the CyberDNA sensors and the Vigilant analyst team. Vigilant’s approach gives immediate visibility and can inform a customer in real-time about what is happening in the deepest parts of their network. It’s like turning on the lights late at night to see if there is a monster in the room, although you hope there isn’t one. If there is, however, now you know and can take appropriate actions. Within minutes of turning on Vigilant’s CyberDNA service, our analysts were able to detect that multiple heart monitor devices at one of the hospital’s remote locations were running an embedded operating system infected with a botnet known as Conficker. They may never have known what was going on or that they were on heart monitors hooked up to patients however the attackers were using these devices to attack other locations on the internet and brought down the hospital’s network in the crossfire. There were two problems here, first, the Conficker worm was bringing their network down, and second, the devices were running outdated and non-compliant operating systems that were connected to patients.&nbsp;</div><div>While the Conflicker worm, sometimes referred to as Downad, was first discovered over 12 years ago in November of 2008, many recent reports show that it is still highly active and is the worm that just won’t die. At its peak Conflicker managed to infect over 9 million systems worldwide, making it one of the most prolific malware of its day.&nbsp;</div><div>When using third-party software or devices like Point-of-Sale (POS) systems in retail, medical devices in healthcare, door-entry and other “smart” sensor systems in buildings, etc. businesses are at the mercy of the vendor’s level of security--or, the weakest link in the chain. If the vendor makes a mistake it can cost you. Vigilant CyberDNA gives you visibility into these devices without needing to have additional agents installed. By doing this we can show you all software and operating systems running on your network. We keep your vendors honest about security and greatly reduce your risk and exposure.</div><div>This attack was carried out by tactics that Vigilant detects every day. Without the visibility that Vigilant brings it would have likely gone undetected in this victimized organization because their other advanced detection tools simply couldn’t see it.</div><div><span style="font-weight:bold;">Summary:</span></div><p><span style="color:inherit;"></span></p><blockquote style="margin-left:40px;"><ul><li>The patient medical devices running an embedded operating system were first infected with Conficker behind the hospital firewall and were later activated.</li><li>The effects of the infected devices caused a sharp decrease in bandwidth across the hospital's network resulting in applications being rendered unusable.</li><li>All previously installed and active IDS/IPS and detection methods available within the hospital network did not see or know about the outdated operating system nor the Conficker infection.</li><li>CyberDNA was placed, agentless, within the environment and immediately detected both the non- compliant OS and that Conficker was the source of the bandwidth draw.</li><li>Vigilant’s analyst team notified the customer of the infected systems. The customer removed the systems from the patients, cleaned them and notified the manufacturer of the vulnerability.</li></ul></blockquote></div>
</div><div data-element-id="elm_7v4f9DNiQHopemalL4o3uw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7v4f9DNiQHopemalL4o3uw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Vigilant<br></h2></div>
<div data-element-id="elm_kTnX42qYQtKdOxlR4sCVMw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kTnX42qYQtKdOxlR4sCVMw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Vigilant Technology Solutions is a cybersecurity firm based out of Cincinnati, Ohio providing security detection and prevention solutions. Vigilant is strict in it methodology of separating threat detection from threat prevention, using two tools: CyberDNA and MEP (Managed Endpoint Protection). Remarkably affordable and extremely effective, we work with businesses of all sizes in all industries. Vigilant is particularly effective with businesses in heavily regulated industries like finance and healthcare and we actively work with numerous Fortune 500 companies around the world, Vigilant has been operating since 2009, is privately held (and will remain so) with no outside investment funding.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;font-weight:bold;">Vigilant helps you avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average.&nbsp;</span></div></div>
</div><div data-element-id="elm_LHxvoS-MQw2pdIP9r6_exA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_LHxvoS-MQw2pdIP9r6_exA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help me" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_PomgFAGDp-Up9Fzn4OQG2w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PomgFAGDp-Up9Fzn4OQG2w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 Advisers to see if Vigilant and their CyberDNA (detection) or MEP (protection) security solutions are right for your business. Cloud 9 Advisers is 100% vendor-agnostic. If Vigilant is not right for you we'll help steer you to the right company and solution from over 200 service providers in our<a href="/solution-portfolio" title="Supplier Portfolio.&nbsp;">&nbsp;</a>curated Supplier Portfolio</p></div>
</div><div data-element-id="elm_jW1nOZ3tH3a4CrmhB9UyLQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_jW1nOZ3tH3a4CrmhB9UyLQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_hDnQK4BBYoOgNHQUmcSNQg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_hDnQK4BBYoOgNHQUmcSNQg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" alt="Cloud 9 Advisers" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become a complementary extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers. Cloud 9, together with our distributors, is made up of more than two-hundred and fifty staff, all devoted to helping you save time and money. Our curated Supplier Portfolio contains nearly two-hundred of the best service provider companies. We are one of the largest buyers of technology in the country. Through us, you’ll get the collective buying power of thousands of other clients. Consider us your informed buyers, strategic partners, and technology advisers. We are impartial, unbiased, and vendor-agnostic. We sit on your side of the table to help you find, evaluate, and negotiate with service provider companies. We’ll help you design the right solution and identify the best technologies. We’ll get pricing from multiple competing companies, then guide you through the evaluation and procurement process. Use our evaluation tools for documentation and due diligence. Plus, have our entire team at your disposal before, during, and after the acquisition of your new services, for as long as you’re in business.</span></p></blockquote><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span></p></div>
</div></div><div data-element-id="elm_YYEmrDOumyDxgM4CteEdrg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_YYEmrDOumyDxgM4CteEdrg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help me" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 19 Feb 2020 12:13:14 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Allgress]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-Allgress</link><description><![CDATA[Allgress Business Risk Intelligence solutions converge disparate risk silos across global enterprise networks and automate governance, risk and compliance (GRC) management processes. Contact Cloud 9 to learn more]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Te1zGNokTfiKXTr5uHhfVA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ARsnD8-kRhCOuWbuWKl2Zg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_o-vJ5LZNQC-ELfjcfH0nWQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_o-vJ5LZNQC-ELfjcfH0nWQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_c02MTc_RTuK2asf1YE0csQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_c02MTc_RTuK2asf1YE0csQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Governance, Risk Management, and Compliance (GRC)</h2></div>
<div data-element-id="elm_inZYmHml6r5NGPsC-gfSvQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_inZYmHml6r5NGPsC-gfSvQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/shark_risk_danger_thinkstock_653794886-100749915-large.jpg" size="fit" alt="from Thinkstock" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_e-xWBeUu7SZfFgUy0gIAPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e-xWBeUu7SZfFgUy0gIAPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">by: Allgress</span></p></div>
</div><div data-element-id="elm_4YFzeh7RSmejJa4XidYzVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_4YFzeh7RSmejJa4XidYzVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;font-size:18px;">Cloud 9 Supplier Spotlight:&nbsp; <a href="https://allgress.com" title="Allgress" target="_blank">Allgress</a></span></p></div>
</div><div data-element-id="elm_I79rLOj31uEdpfAbPz0EyQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_I79rLOj31uEdpfAbPz0EyQ"].zpelem-image { border-radius:1px; margin-block-start:40px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20Allgress.png" size="medium" data-lightbox="true" style="width:1000px;"/></picture></span></figure></div>
</div><div data-element-id="elm_C2lJLaV_XAjeCQANhISqWw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_C2lJLaV_XAjeCQANhISqWw"].zprow{ border-radius:1px; margin-block-start:54px; } </style><div data-element-id="elm_5srqtSegac1F91pyHtRoGg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_5srqtSegac1F91pyHtRoGg"].zpelem-col{ border-radius:1px; } </style></div>
<div data-element-id="elm_dlSrwF_qblohhrsmIjsglg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dlSrwF_qblohhrsmIjsglg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_KPuWt6sjQ1_2BzCSKOzzjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KPuWt6sjQ1_2BzCSKOzzjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:15px;"><span style="font-weight:bold;">RISK EXCEPTION</span><br></span></p><p><span style="font-size:15px;">Track Risk – Evaluate and communicate strategic risks that align to your organizations enterprise risk program<br></span></p><p><br></p><p><span style="font-size:15px;"><span style="color:inherit;">Document and track risk exceptions with full life-cycle management by providing a standardized approach for the review, management, and acceptance of Findings and Exceptions</span><br></span></p><p><br></p><div><span style="font-weight:bold;font-size:15px;">THIRD PARTY VENDOR MANAGEMENT</span></div><p><span style="font-size:15px;">Oversee – Establish due diligence and ongoing monitoring of third party’s activities and performance<br></span></p><p><br></p><p><span style="font-size:15px;"><span style="color:inherit;">Gain visibility into your vendor’s risk posture and compliance to make informed decisions about the business relationship of your contracted vendors</span><br></span></p><p><span style="color:inherit;font-size:15px;"><br></span></p><div><span style="color:inherit;font-size:15px;"><div><span style="font-weight:bold;">COMPLIANCE MANAGEMENT</span></div><div>Assess Risk Efficiently – Assess risks against industry standards and regulatory requirements, provide gap analysis, risk treatment and reporting</div><div><br></div><div><span style="color:inherit;"><div><span style="font-weight:bold;">RISK MANAGEMENT</span></div><div>Communicate Strategically with Key Stakeholders – Track strategic risks, assign ownership across the enterprise, quickly and easily communicate risk posture through dashboards, and provide continuous monitoring and improvement of risk posture of the organization</div><br><div><span style="color:inherit;"><div><span style="font-weight:bold;">POLICY MANAGEMENT</span></div><div>Stay Organized – Unify and disseminate your organization’s document library from a centralized platform</div><div><br></div><div><span style="color:inherit;">Quickly assess your gaps in policy, mange your document lifecycle and exceptions</span><br></div><div><br></div><div><span style="color:inherit;"><div><span style="font-weight:bold;">INCIDENT RESPONSE</span></div><div>Investigate &amp; Mobilize – Track and respond to security threats impacting your company’s critical infrastructure&nbsp;<span style="color:inherit;">with centralized management, root cause analysis, reporting, and tracking</span></div></span><span style="color:inherit;"><div><br></div><div><span style="color:inherit;"><div><span style="font-weight:bold;">VULNERABILITY MANAGEMENT</span></div><div>Collect, analyze and v<span style="color:inherit;">isualize data in the way you need to see it so you can make key decisions that align security and regulatory compliance programs with top business priorities. Manage patch exceptions, and understand the impact of your organizations exposure of unpatched assets</span></div></span></div></span></div></span></div></span></div></span></div></div>
</div></div><div data-element-id="elm_nrw_s0c_Hegj92CrYLMCwQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nrw_s0c_Hegj92CrYLMCwQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_oEOA87AeYCj9AJBKawVcFw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oEOA87AeYCj9AJBKawVcFw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">Leverage AWS API’s to Automate Compliance.</span></div><p><span style="color:inherit;"><br></span></p><div>Allgress ComplianceVision (CV): Organizations are faced with the task of providing assurance that high-rated risk factors are being managed with the appropriate controls in place and that those controls are operating effectively. With increases in the regulatory regime, increasing technology complexity and pressures on cost, the demand is high for productivity improvements in the performance evaluation of internal controls. Allgress ComplianceVision (CV) provides continuous monitoring of control operating effectiveness. CV provides continuous data assurance to verify the integrity of data flowing through systems, as well as continuous risk monitoring and assessment to dynamically measure your organization’s risk.</div><p><br></p><div>Allgress CV improves control management and monitoring while reducing the time sink and complexity of traditionally annual, detailed controls assessments. Organizations are able to leverage API’s from Amazon Web Services (AWS) as well as AWS Technology Partners, enabling a continuous compliance process.&nbsp; In addition, policies in configuration content are included for all major compliance frameworks.&nbsp; With Allgress CV organizations realize cost reductions through improved efficiency and effectiveness, and additionally benefit from increased test coverage, improved timeliness of testing, reduced risk velocity and remediation cost, improved consistency, the ability to identify trends, and comprehensive risk visibility through the Allgress Platform. Allgress CV replaces the manual, error-prone, preventive controls of the past with automated, detective controls to reduce your risk profile.</div><p><br></p><div>CV identifies the shared, inherited, and customer specific control statements and demonstrates how you can leverage the AWS Shared Responsibility model to document adherence with applicable compliance standards. Focusing on all major compliance frameworks such as PCI, HIPAA, CJIS, NIST, and FISMA compliance, the portal guides you through the compliance process by providing targeted content at every step of the way. ComplianceVision automates manual compliance functions through integration with current AWS tools.</div><p><br></p><div>ComplianceVision will soon support all major cloud platforms, including Microsoft Azure, Google Cloud Platform and Oracle Cloud Platform.</div></div>
</div><div data-element-id="elm_sRnGlq4o7p3OZgl3rr9SYQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_sRnGlq4o7p3OZgl3rr9SYQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Allgress</h3></div>
<div data-element-id="elm_-lOm_baF8rAmgz6MhMg8Ug" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-lOm_baF8rAmgz6MhMg8Ug"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"> Founded in 2008, Allgress helps enterprise security and risk professionals solve the problem of how to assess, understand and manage corporate risk. <br><br>Its founders and management team are committed to providing CISOs with the ability to make effective investment decisions that align security and compliance programs with top business priorities, communicate the value of those decisions to senior executives, and manage risk, fines, and brand damage. <br><br>Allgress Business Risk Intelligence solutions converge disparate risk silos across global enterprise networks and automate governance, risk and compliance (IT GRC) management processes. Powered by the patented Allgress Business Risk Intelligence engine, the company's products, solutions and CISO reporting tools provide customers with heat maps and compliance assessment reports that reveal a comprehensive, immediate and intuitive picture of their organizations' security and compliance risk posture. <br><br>Allgress provides operational efficiency. Its solutions allow users to assess once and manage and report on many industry and government regulations. Allgress deploys faster than competing solutions and provides rapid ROI.</div>
</div><div data-element-id="elm_i-LILFeHM12szTnqq_EMHg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_i-LILFeHM12szTnqq_EMHg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HCCKRfQnQwuE6Mc6wymWkA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HCCKRfQnQwuE6Mc6wymWkA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I need help with cybersecurity, can Cloud9 help?" title="email us: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Is Allgress right for you?</span></a></div>
</div><div data-element-id="elm_55mGMJFctzliSwDzEDnLnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_55mGMJFctzliSwDzEDnLnA"].zpelem-text { border-radius:1px; margin-block-start:36px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 to see if Allgress is right for your business. Cloud 9 Advisers is vendor agnostic and can help you find the right solutions and the right companies from our list of over 200 vendors in our curated Supplier Portfolio.&nbsp;</p><p><br></p><p style="text-align:center;"><span style="font-weight:bold;">CyberSecurity&nbsp; Communications&nbsp; Connectivity&nbsp; Cloud</span></p></div>
</div><div data-element-id="elm_iyVjY8XYTq8VvUQKI-iNHg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_iyVjY8XYTq8VvUQKI-iNHg"].zpelem-button{ border-radius:1px; margin-block-start:55px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-outline " href="/"><span class="zpbutton-content">Learn more about Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 05 Feb 2020 18:19:35 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Nitel]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-Nitel</link><description><![CDATA[With technology becoming mission-critical, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their assets vulnerable to cybercriminals. Cloud 9 can help.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_D-Nz53vkQxquWyV5fg7jdQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MgtG_ZrcS2mNS7npggHEOA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BdizElknRkuISnouLpCG9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Nitel: Managed Next-Generation Security</span></h1></div>
<div data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/NITEL_Managed_Security_Testing.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By: Nitel USA, see the article here&nbsp;<a href="https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/">https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/</a></span></p></div>
</div><div data-element-id="elm_fciiwuYY6NKxhDk31yORrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fciiwuYY6NKxhDk31yORrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Supplier Spotlight:&nbsp; <a href="https://www.nitelusa.com/" title="NITEL" target="_blank">NITEL</a></p></div>
</div><div data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/ISP%20Nitel2.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_N294fkf-kdgYXGrWEEeODg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_N294fkf-kdgYXGrWEEeODg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Explore Four Levels of Security Testing</h2></div>
<div data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>With cloud, big data and mobile solutions becoming mission-critical to organizations of all sizes, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their organizations vulnerable to cybercriminals. And it’s not just large organizations cybercriminals are targeting; smaller companies are just as likely to be attacked. They tend to be easier targets, more likely to pay up in the case of a ransomware attack. They can also serve as a back door into other third-party organizations they do business with.</div><p><br></p><div><div>Although managed security is an investment, many organizations simply cannot afford to not conduct on-going security testing. According to a recent <a href="https://www.trustwave.com/en-us/" title="Trustwave security report," target="_blank">Trustwave security report,</a> 41% of those surveyed feared financial damage to their company in the event of a cyberattack or data breach.</div></div><p><br></p><div>Managed security testing is defined as subscription-based proactive scanning and testing of environment security to identify vulnerabilities. However, a comprehensive managed security solution does more than identify vulnerabilities and weak points.</div><p><br></p><div>When working with a qualified managed security provider an organization should not only gain insight into weaknesses, but gain a blueprint on how to prioritize, mitigate and remediate these risks. When your customer engages with a provider of managed security services like Nitel, backed by a cybersecurity Gartner Magic Quadrant Leader Trustwave, they can choose to engage with four levels of testing depending on their budget and business needs, including:</div><ul><ul><li><span style="font-weight:bold;">Basic threat</span> – Simulates the most common attacks executed in the wild today. This class of attacker typically uses freely-available, automated attack tools.</li><li><span style="font-weight:bold;">Opportunistic threat</span> – Builds upon the basic threat and simulates an opportunistic attack executed by a skilled attacker that does not spend an extensive amount of time executing highly sophisticated attacks. This type of attacker seeks easy targets (”low-hanging fruit”) and will use a mix of automated tools and manual exploitation to penetrate their targets.</li><li><span style="font-weight:bold;">Targeted threat</span> – Simulates a targeted attack executed by a skilled, patient attacker that has targeted a specific organization. This class of attacker will expend significant resources and effort trying to compromise an organization’s systems.</li><li><span style="font-weight:bold;">Advanced threat</span> – Simulates an advanced attack executed by a highly motivated, well-funded and extremely sophisticated attacker who will exhaust all options for compromise before relenting.</li></ul></ul><div>Cloud 9 Advisers clientele benefit from Nitel/Trustwave’s crowd-sourced, global threat intelligence through a solution that is scoped to fit their needs. Nitel's intrinsic network knowledge, combined with Trustwave’s highly skilled SpiderLab ethical hacker team, can quickly identify security weak points and guide you to a solution to protect your organization.</div></div>
</div><div data-element-id="elm_rRZDbyeva5vy63rqVWFVGw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rRZDbyeva5vy63rqVWFVGw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Managed Next-Gen Security Solutions</h2></div>
<div data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">What keps business and IT leaders up at night?</span></div><div>For business leaders everywhere, a data breach is on par with the most damaging things that could happen to an organization. The thought of being the next company to make headlines keeps leaders up at night while IT organizations fight to keep the bad guys out. As threats become increasingly widespread, sophisticated and dangerous, companies look to develop security strategies that protect their environment while staying within budgets that seem to get tighter every year.</div><div><br></div><div><span style="color:inherit;"><div>Your business is unique, with its own set of needs and priorities. That’s why we offer a suite of security solutions that offers multiple&nbsp;<span style="color:inherit;">ways for you to protect your business. Whether your business is big or small, whether you value distributed architecture or centralized,&nbsp;</span><span style="color:inherit;">you’ll find a solution that fits how you prefer to manage your environment.</span></div></span></div></div>
</div><div data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_44Ols88sMN6a-H9zszeCIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_44Ols88sMN6a-H9zszeCIQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;"><span style="color:inherit;">ENTERPRISE GRADE PROTECTION</span><br></span></p><div><ul><li>Safely enable applications, users and content by classifying all traffic, determining the business use case, and assigning policies to allow and protect access to relevant applications.</li><li>Prevent threats by eliminating unwanted applications to reduce your threat footprint and apply targeted security policies to block known vulnerability exploits, viruses, spyware, botnets and unknown malware (APTs).</li><li>Protect your datacenters through the validation of applications, isolation of data, control over rogue applications and high-speed threat prevention.</li><li>Secure public and private cloud computing environments with increased visibility and control; deploy, enforce and maintain security policies at the same pace as your virtual machines.</li><li>Embrace safe mobile computing by extending the enterprise security platform to users and devices no matter where they are located.</li></ul></div></div>
</div></div><div data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XMii76EEv6YXr4DApouFPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XMii76EEv6YXr4DApouFPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">ROCK SOLID PROTECTION FOR SMB</span><br></p><p><span style="color:inherit;">Our customized solutions deliver next-generation security for&nbsp;</span><span style="color:inherit;">every size and type of business. Gain full control and visibility&nbsp;</span><span style="color:inherit;">of application traffic passing through your network, even for&nbsp;</span><span style="color:inherit;">encrypted traffic, thanks to application detection, user-identity&nbsp;</span><span style="color:inherit;">awareness, SSL interception and built-in live reporting.</span></p><span style="color:inherit;"><br><div>You benefit from the same critical next-generation security&nbsp;<span style="color:inherit;">features that large enterprises receive—but sized appropriately&nbsp;</span><span style="color:inherit;">for your business. Your business will fend off threats with&nbsp;</span><span style="color:inherit;">included next-gen features that take place directly in the data&nbsp;</span><span style="color:inherit;">path, including:</span></div><div><ul><li>Firewalling</li><li>Intrusion Detection and Prevention (IDS/IPS)</li><li>URL Filtering</li><li>Dual Antivirus</li><li>Application Control</li></ul></div></span></div>
</div></div></div><div data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY EXPERTISE ON YOUR SIDE</span></div><p>Nitel has partnered with Gartner Magic Quadrant leader Trustwave to complement our managed next-generation firewall service with a suite of security management services. This 1–2 punch creates a comprehensive managed security solution to reduce your business risk and give you peace of mind. With Nitel overseeing your network health, performance and security, you have a single partner working on your behalf to ensure your business operates optimally and safely.<br></p></div>
</div><div data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kxjJly2NUqDKphGl7CZTBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kxjJly2NUqDKphGl7CZTBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY INFORMATIONEVENT MANAGEMENT</span></div><p>Achieve more effective identification and mitigation of security threats. You’ll reduce your burden with around-the-clock support from 10 global security operations centers staffed with experts who have in-depth knowledge and experience working with complex network environments for highly distributed organizations.<br></p><p><span style="color:inherit;"><br></span></p><div>Our SIEM service collects, analyzes and stores logs from networks, hosts and critical applications. It extends visibility beyond the network perimeter to the application layer, helping you achieve more effective identification and mitigation of security threats, and compliance validation with numerous regulatory and industry standards.</div><p><span style="color:inherit;"><br></span></p><div>Advantages:</div><ul><li>SpiderLabs security research utilizing global event data to identify current and emerging threats</li><li>Industry-leading compliance expertise</li><li>Solutions tailored to the specific needs of healthcare, financial, retail and more<br></li><li>Collects and reviews over 1 billion events per day</li></ul></div>
</div></div><div data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;color:rgb(48, 4, 234);">Need to maintain compliance with PCI, DDS, HIPAA, SOX, FISMA, GLBA/FFIEC? </span><span style="color:inherit;">Let Nitel help. We’ll help you fulfill your requirements for vulnerability scanning, penetration testing and ongoing evaluation of your environments and applications.</span><br></p></div>
</div><div data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">MANAGED SECURITY TESTING</span></div><p>Reveal potential vulnerabilities in your environment with thorough penetration testing. Expert “ethical hackers,” armed with the same techniques as today’s cybercriminals, attempt to hack into your network or application to help you identify network-connected assets, learn how those assets are vulnerable to attack and understand what could happen if those assets were compromised.</p></div>
</div></div></div></div></div><div data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 Advisers for expert guidance and help with any compliance, risk management, monitoring, edge security and any other cybersecurity issues. We'll guide you to the right vendors, like Nitel, from our <a href="/suppliers" title="Supplier Portfolio">Supplier Portfolio</a>.&nbsp;</p></div>
</div><div data-element-id="elm_whExP12qqr410n4GYwgVlQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_whExP12qqr410n4GYwgVlQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_4415zG0x20XtZyYAYT5sJg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4415zG0x20XtZyYAYT5sJg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;font-weight:bold;">Because it’s all about you.&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;">Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p><p><span style="color:inherit;font-weight:bold;"></span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></div>
</div></div><div data-element-id="elm_uv3x5ayeZhugascf41xYsQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uv3x5ayeZhugascf41xYsQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 04 Feb 2020 12:06:38 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: RSI]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-RSI</link><description><![CDATA[While a lot of our clients’ attention is focused on our unique Automated Cyber Risk Management solution, powered by CyberCompass, we also assist our forward-thinking clients to achieve Zero Trust Security through the adoption of our ‘Evolving Trust’ Framework.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_nQZIJH5QQIOFPDSbUUlrgQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wi_QXZ1PTa-ALmp5S7YmIw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_SOmJiVcYR56mXJZ10lVcxg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_SOmJiVcYR56mXJZ10lVcxg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_A3lLyquuTRKFRclfPBbYuQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_A3lLyquuTRKFRclfPBbYuQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Getting Zero Trust Right</span></h2></div>
<div data-element-id="elm_DUwACMZgs7NyNSthLBaS3A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_DUwACMZgs7NyNSthLBaS3A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1575018101372-580b21aab4d2?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" alt="Cloud 9 Zero Trust Security RSI" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_82qGMR4fTB-GccTIs6PXzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_82qGMR4fTB-GccTIs6PXzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By: Taylor Hersom, RSI, see the original article here&nbsp;<a href="https://www.rsitex.com/post/getting-zero-trust-right" title="RSItex.com/post/getting-zero-trust-right" target="_blank">RSItex.</a><a href="https://www.rsitex.com/post/getting-zero-trust-right" title="RSItex.com/post/getting-zero-trust-right" target="_blank">com/post/getting-zero-trust-right</a></span></p></div>
</div><div data-element-id="elm_nX8gbOipKRwy1Mwf0HlvJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nX8gbOipKRwy1Mwf0HlvJg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers, Supplier Spotlight:&nbsp;<span style="color:inherit;font-weight:bold;"><a href="http://www.rsitex.com" title="Renaissance Systems, Inc." target="_blank">Renaissance Systems, Inc.</a></span></p></div>
</div><div data-element-id="elm_jLznsLwAhg5J0isrpxr4LA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_jLznsLwAhg5J0isrpxr4LA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20RSI.jpg" size="original" data-lightbox="true" style="height:139px;width:246.94px;"/></picture></span></figure></div>
</div><div data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_eCwWj2BvsENLk1Nvm9_LmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eCwWj2BvsENLk1Nvm9_LmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>At RSI, our priority is to help companies improve their Cyber Risk Management. While a lot of our clients’ attention is focused on our unique Automated Cyber Risk Management solution, powered by CyberCompass, we also assist our forward-thinking clients to achieve Zero Trust Security through the adoption of our ‘Evolving Trust’ Framework. The purpose of this article is to provide some background on Zero Trust Security, highlight how RSI has re-imagined this strategy, and demonstrate how RSI can help you to adopt true Zero Trust using our Evolving Trust Framework.</div></div>
</div><div data-element-id="elm_-c_SxsRTYg0eZpRGqMK0uQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-c_SxsRTYg0eZpRGqMK0uQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">A Brief History</span></h3></div>
<div data-element-id="elm_YbAGwZioKx8E5rAQXhI5SQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YbAGwZioKx8E5rAQXhI5SQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Historically, network security hasn’t changed that much. Corporate networks were designed like a castle, where all users are screened at the gate (firewall) for appropriate credentials. Once a user is allowed access, they are trusted and therefore have access to all the goodies inside. In this model, it's difficult for a user to get into the ‘castle’, but the network is vulnerable to widespread turmoil if malicious users manage to get in. As the IT landscape has evolved into multiple devices per user, remote work policies, and sketchy Starbucks WiFi, the need for a better way of managing users/access has become dire.</div><p><br></p><div>Hence, Zero Trust is born. Originally known as ‘Zero Trust Network’ or ‘Zero Trust Architecture’, the idea was created in 2009-2010 by Forrester Research Inc.(specifically John Kindervag). While the concept was clever, it took a few years and a BIG company to provide a proof of concept. Google created an enterprise security model, coining it BeyondCorp, and achieved company-wide adoption of the Zero Trust model using home-grown, in-house tools and technologies. BeyondCorp achieved the previously inconceivable; it enabled every employee to work from untrusted networks without the use of a VPN. Since Zero Trust was only a concept at the time, Google had to create and piecemeal together a variety of technologies. Thankfully, there has since been widespread adoption and a variety of technologies created to help you achieve the same vision as Google, but we’ll get to that.</div><p><br></p><div>What is Zero Trust? I encourage you to read more about Google’s BeyondCorp solution to gain insight into the intricacies, but in a nutshell: the Zero Trust model asserts that organizations should not automatically trust anything or anyone inside or outside its perimeter(s). Instead, access controls are shifted from the network perimeter to individual endpoints/users and data analytics (i.e. location, time of day, employee credentials, etc.) are used to create meaningful decisions on whether an access request is appropriate. This all adds up to what is called a ‘Trust Score’, and it’s assigned every time a user attempts to log in. Remember the castle analogy above? Think about it like this: Zero Trust micro-segments your castle into a bunch of little castles. You now have the ability to determine which castle(s) your users have access to. If implemented properly, you no longer have to be connected to the corporate network and can work from any internet connection.</div></div>
</div><div data-element-id="elm_7Syd4Hlql88lFUn2osEi1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7Syd4Hlql88lFUn2osEi1Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><div>The Case for <span style="font-style:italic;">Evolving </span>Trust Security</div></span></h3></div>
<div data-element-id="elm_qPUyyucUpmXWxQPJrrUX3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qPUyyucUpmXWxQPJrrUX3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Early on, RSI understood the value of Zero Trust, especially as businesses increasingly allow remote work, BYOD, and SaaS solutions to accomplish daily tasks. Many companies have moved their most precious data to the cloud and manage an average of 1000 applications at any given time. RSI built a professional services arm to assist companies in understanding the value of this Zero Trust model as well as adopting it without any significant, upfront requirements. In order to accomplish this, we took the Google approach and adopted it ourselves (thankfully we didn’t have to build all the technology from the ground up). This journey allowed us to identify pain points, discern shortcuts from pitfalls, and ultimately develop a framework that adds tremendous value to each of our clients. What’s more, we took the time to look at Zero Trust from a non-traditional lens by including some non-traditional thinkers from our Innovation Center (and its data scientists with their big, beautiful scientific brains). What we identified is a gap in how Zero Trust is discussed, how it is interpreted, and how companies are leveraging the current solutions. RSI took that data and developed our Evolving Trust Framework. The following are some of our biggest takeaways:</div><p><br></p><div><ol><li><span style="font-weight:bold;">One Size <span style="font-style:italic;">Does Not</span> Fit All</span><br>Arguably the most important point I will stress is that while advertisements show you can “adopt Zero Trust in minutes with our tool”, those marketing gurus are causing companies to put the proverbial cart before the horse. Even with incredible SaaS tools at your disposal, you still have to be extremely familiar with the implementation and all the nuances that stem from the process, such as certificate authority, device discovery, and inherent limitations. This requires members of your organization to take the time to understand Zero Trust, understand the variety of required tools, and figure out a launch strategy that doesn’t cripple your organization. Furthermore, while there are a variety of technical solutions on the market that claim ‘Zero Trust Security’ (i.e. OKTA, Duo Security), this is only part of the puzzle. There are more components to the Zero Trust Model than those addressed by these Identity &amp; Access Management (IAM) tools. Without this knowledge and expertise, your Zero Trust strategy will gain zero traction.<br><br></li><li><span style="font-weight:bold;">Easy to Miss the Mark On Execution</span><br>Unfortunately, companies tend to fall into this pit of saying “let’s require every user to authenticate in three different ways every time they access any critical application”. Not only does this create a very difficult beast to manage for your IT department, but it also doesn’t even accomplish some of the biggest potential benefits of Zero Trust. This was the #1 reason RSI created the Evolving Trust framework, and the name says it all: we believe in incorporating deep monitoring/data analytics into the entire process so that checks and balances are strategically placed throughout a users’ access journey rather than just at the beginning. For example, when a user authenticates and meets our basic requirements (i.e. correct credentials, an appropriate device, relevant geo-location), we let them in. Next, we monitor those users and what they are trying to access. If they attempt to access any system/data we deem critical, then we require another authentication check. Finally, we keep an eye on the patterns of each user to detect anomalies in what/when/where they are accessing critical applications or data. This allows us to control the narrative for every user, every time, without creating huge inefficiencies in our organization.<br><br></li><li><span style="font-weight:bold;">Employee Education is Even More Important Than Technology</span><br>Zero Trust is just another component of cyber security and one of the biggest problems that security experts are facing is the fact that people LOVE to skirt rules. It’s human nature to make assumptions that we all know everything and we all deserve the best for ourselves, especially when some very nice Nigerian prince is trying to wire us FREE money. RSI discovered the hard way that this unfortunate mindset carries into the Zero Trust realm. The fact of the matter is, Zero Trust adds at least one extra step for every employee when they attempt to login to a critical application by requiring Multi-Factor Authentication (MFA). This causes some people to lose their minds (especially those pesky developers who are obsessed with minimizing clicks), which creates a snowball effect down the road when they decide to adopt a shiny, new SaaS tool and choose not to tell anyone about it. What’s more, IT experts have developed a mindset that firewalls keep bad actors out and that they can inherently trust their environments. The same people who haven’t changed their server admin passwords in 4 years are now required to shift their mindset to the opposite end of the spectrum, which takes time. Your Zero Trust model is only as powerful as the IT people, processes, and technologies you are in control of, which is why RSI identified other strategies to counteract these risks in the form of discovery tools, monitoring, and data analytics.<br><br></li><li><span style="font-weight:bold;">It Takes A Village Just to Manage A Village</span><br>Similar to the game of Monopoly, acquiring the esteemed Boardwalk space is only half the battle. You still have to enforce and manage your acquisition or the positive effects are moot. Zero Trust requires a SOC team to actively manage access, evaluate trust scores on a periodic basis, track new assets, and manage vulnerable endpoints (i.e. outdated OS, vulnerable applications, etc.). RSI treated our implementation as an opportunity to train our entire Technical Assistance Center (TAC) team, creating a squad of experts in the entire Zero Trust Management process and providing them the tools to scale this expertise to our clients. One of the biggest benefits of our Evolving Trust framework is that it requires a LOT less effort for our TAC team to manage access because we have automated many of the previously manual processes.</li></ol></div></div>
</div><div data-element-id="elm_tvu7Je8Lh7DDguJT3omq_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tvu7Je8Lh7DDguJT3omq_Q"].zpelem-text { border-radius:1px; margin-block-start:63px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>In summary, Zero Trust is an incredibly useful strategy for companies to keep up with the evolving IT landscape of endless personal devices, SaaS solutions out the wazoo, and cyber-crime galore. In my humble opinion, I don’t see how any company can keep up with this transformation without Zero Trust. However, I’m concerned that many companies are fooled by the current glamour of Zero Trust and their desperation to improve overall cyber hygiene can create more problems than solutions. RSI is working hard to address the Access Management cyber epidemic, and we strongly believe that the Zero Trust model (more specifically, our Evolving Trust framework) is a huge step in the right direction.</div></div>
</div><div data-element-id="elm_dfuFRhtU_UFpK1Xr-NUKTw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dfuFRhtU_UFpK1Xr-NUKTw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:18px;font-weight:bold;">To learn more about Zero Trust and how RSI can help, please contact Cloud 9 Advisers.&nbsp;</span></p><p><span style="font-size:18px;font-weight:bold;">RSI is a member of the Cloud 9 Supplier Portfolio</span></p></div>
</div><div data-element-id="elm_H9sSNBiVQNKH6BbfTsm1zA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_H9sSNBiVQNKH6BbfTsm1zA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn about Cloud 9 Advisers" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_RBVsAV4oOft68H40wlYavg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_RBVsAV4oOft68H40wlYavg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About RSI</h2></div>
<div data-element-id="elm_Rk7t7Iyt2D0Y9HqriXjUOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rk7t7Iyt2D0Y9HqriXjUOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>RSI transforms company and culture through fully automated solutions for business workflow. We serve the enterprise with software solutions for business process improvement, artificial intelligence for big data, and custom, managed IT services.</div><p><span style="color:inherit;"><br></span></p><div>RSI is the exclusive channel distributor of CyberCompass™, a SaaS solution for cyber risk management and remediation.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div><ul><li>Automated solutions for business workflow</li><li>AI solutions for data analytics</li><li>Custom, managed IT services</li><li>Exclusive distributor of CyberCompass™, automated cyber risk management</li><li>Drone Services</li></ul></div><br><div><span style="color:inherit;">For more than 35 years, the passion for helping people has transformed our business and that of our customers. By developing strong partnerships with our clients, we have a deeper understanding of what they need to better run their businesses. As a result, our services have expanded for a greater reach with every client.</span><br></div></span></div></div>
</div><div data-element-id="elm_O88xUHjSrO4y97kjAqkIPg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_O88xUHjSrO4y97kjAqkIPg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_hjWRgLAI8r0Z5tbVOx4d4g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_hjWRgLAI8r0Z5tbVOx4d4g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><span style="color:inherit;"><p><span style="font-size:11pt;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></p><p><span style="font-size:11pt;font-weight:bold;"><br></span></p><p><span style="font-size:11pt;font-weight:bold;">Because it’s all about you.&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;">Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</span></p><br><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Feb 2020 10:29:06 -0500</pubDate></item><item><title><![CDATA[10 risk factors no one talks about]]></title><link>https://www.cloud9advisers.com/News/post/the-10-risk-factors</link><description><![CDATA[We've all fretted about the difficulty of calculating both the likelihood of an event and its potential damages. They have always been more like a best guess than an insurance actuarial table. How can anyone estimate the chances with any accuracy?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ZILm5ayPSjimnQ6tIb1shQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1989m1t-TtGBxJEWbnf6Zg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__dqtCOYlSniuS9NJGC776w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm__dqtCOYlSniuS9NJGC776w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ke_BzlrsRQ2ntwM4x4z1Iw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ke_BzlrsRQ2ntwM4x4z1Iw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Ten Cybersecurity Risk Factors No One Talks About</span></span></h1></div>
<div data-element-id="elm_cF04ykSASiCzZwRbNm7XyA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cF04ykSASiCzZwRbNm7XyA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><span style="font-size:18px;">These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them.</span></div></div>
</div><div data-element-id="elm_LYOF6Q7ZYqWpvwSjmdVwMA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_LYOF6Q7ZYqWpvwSjmdVwMA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/50e3d2464c50b108f5d084609629367b1638d6e3514c704c722d7fd09f4ac35e_1280.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_pWnrF324eYFCTjmuYQpFsA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pWnrF324eYFCTjmuYQpFsA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-weight:700;">By&nbsp;<a rel="author" href="https://www.csoonline.com/author/Roger-A.-Grimes/" id="4fc323b3-5506-43ac-9490-30610eaba998">Roger A. Grimes</a>,&nbsp;<span style="font-weight:normal;">Columnist,&nbsp;</span><span style="font-weight:normal;">CSO</span><span style="font-weight:normal;">&nbsp;</span><span style="font-weight:normal;">|</span><span style="font-weight:normal;">&nbsp;</span><span style="font-weight:normal;">OCT 17, 2019 3:00 AM PDT&nbsp; &nbsp;see the original article at <a href="https://www.csoonline.com/article/3446019/10-risk-factors-no-one-talks-about.html?upd=1572445327584" title="CSOonline.com" target="_blank">CSOonline.com</a></span></p></div>
</div><div data-element-id="elm_YBRIjDK0VpSuhvESMJYsnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YBRIjDK0VpSuhvESMJYsnA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The traditional risk management factors you are all taught include the staid process of categorizing potential threats and risks, evaluating their likelihood of occurrence, and estimating the damage that would result from them if not mitigated. The costs of the potential mitigations and controls are measured against the potential damage. Mitigations are put in place if they are cheaper and better to implement than allowing the risks and threats to occur.</div><div><br></div><div>You have all fretted about the difficulty of calculating both the likelihood of an event and its potential damages. They have always been more like a best guess than an insurance actuarial table. How can anyone estimate the chances that a sophisticated ransomware, DDoS or insider attack will occur to their organization in a given year or what assets it might be able to take out with any accuracy? Can anyone prove that likelihood is 20% versus 60% in a given year?</div><p><br></p><div>We all struggle with those large estimation issues, but there are a ton of other factors that impact risk management. Here are ten that are rarely discussed openly.</div><div><br></div></div>
</div><div data-element-id="elm_f_pvM-Ri6QNZWFTEZVeekQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_f_pvM-Ri6QNZWFTEZVeekQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Fighting over “might happen” risk</span></h2></div>
<div data-element-id="elm_r-CLxdHjsLQfoPjzB6VTOg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r-CLxdHjsLQfoPjzB6VTOg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Every risk assessment is a fight between something that might happen and doing nothing, especially if it hasn’t happened before. Many people believe it’s cheaper to do nothing, and those who fight to do something might be seen as wasting money. “Why waste the money? That’s never going to happen!”</div><p><br></p><div>Few people get in trouble for following the status quo and doing what has always been done. It’s far harder to push to be proactive, especially when large sums of money are involved, than to just wait for the damage to happen and address it then.</div><p><br></p><div>The story I like to use is 9/11 and air travel safety. It’s not like air travel safety experts didn’t already know before 9/11/01 that a hijacker could take over a cockpit using a boxcutter or smuggle explosives onto a plane. These risks had been known for decades. Imagine the public outcry if passengers were made to throw out their water bottles and get full body scans before 9/11 happened. It would have outraged the public and the airlines would have proactively tried to get rid of the security measures.</div><p><br></p><div>After 9/11, we happily take off our shoes, throw away our water bottles, and subject ourselves to full-body scans. Getting real money to fight possible risks is much harder to do than to get the money after the damage has happened. It takes real bravery every time a risk assessor warns about a problem that has never ever happened. They are the unsung heroes.</div><p><br></p></div>
</div><div data-element-id="elm_55de-AifxZ-9DbE1v_aCQg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_55de-AifxZ-9DbE1v_aCQg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Political risk</span></h2></div>
<div data-element-id="elm_bkA7bRIhgPxVHxoZ0s-n8A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bkA7bRIhgPxVHxoZ0s-n8A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Proactive risk-taking leads to the next unknown risk component: political risk. Every time proactive heroes argue for something that never happens, they lose a little bit of their political capital. The only time they win is when the thing they were proactive about happens. If they are successful and convince the company to put controls and mitigations in place so the bad thing never happens, well, it never happens.</span><br></p><p><span style="color:inherit;"><br></span></p><div>It’s a self-defeating prophecy. When they win, no one ever knows because they successfully argued for the controls. So, each time the thing they worried about never happens, they are seen as “crying wolf.” They lose political capital.</div><p><br></p><div>Anyone who has fought one of these risk management battles can tell you they don’t want to take on too many of them. Each one taken burns their reputation a bit (or a lot). So, proactive warriors calculate which battles they want to fight. Over time, seasoned warriors pick fewer battles. They have to. It’s survival of the fittest. Many of them are just waiting for the day when a really bad thing happens that they didn’t fight to prevent hurts the organization and they become scapegoats.</div><div><br></div></div>
</div><div data-element-id="elm_jLJzyJ3WxlPuS2bpZS6gMg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jLJzyJ3WxlPuS2bpZS6gMg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. &quot;We say it’s done, but not really&quot; risk</span></h2></div>
<div data-element-id="elm_o2A0Uvx5yprQZ7iOMutmwg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_o2A0Uvx5yprQZ7iOMutmwg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Many of the controls and mitigations we say we have done aren’t really done…at least not at 100%. Many people in the process understand it’s not really done. The most common examples are patching and backups. Most companies I know say they are 99% to 100% patched. In my over 30-year career of checking on the patch status of millions of devices, I’ve never found one that was truly fully patched. Yet, every company I’ve audited told me they were fully patched or nearly so.</div><p><br></p><div>The same is true of backups. The current ransomware epidemic has laid bare that most organizations don’t do good backups. Despite most organizations and their auditors checking off for years that critical backups are both done and are regularly tested, it just takes one big ransomware hit to show how radically different the truth is.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div>Everyone in risk management knows this. How can a person who is in charge of backups ever test everything when they aren’t given the time and resources to do so? To test if a backup and restore would work, you would have to do a test restore of many different systems, all at once, into a separate environment where it would have to work (even though all the resources are pointing in the original environment). That takes a huge commitment of people, time, and other resources, and most organizations don’t give the responsible person any of that for the task.</div><div><br></div></span></div></div>
</div><div data-element-id="elm_gEdeqIu57iZH30KFuVv9yw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gEdeqIu57iZH30KFuVv9yw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><div>4. Institutionalized risk: “It’s always been done that way”</div></span></h2></div>
<div data-element-id="elm_q-HAFuaP0WjwiEXfY_yZog" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_q-HAFuaP0WjwiEXfY_yZog"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>It’s hard to argue against “that’s the way we’ve always done it,” especially when no attacks against the weakness have occurred for decades. For example, I frequently come across organizations that allow passwords to be six-characters long and never changed. Sometimes it’s that way because the PC network passwords have to be the same as the passwords connecting to some archaic “big iron” system that the company depends on. Everyone might know that six-character, non-changing passwords are not a good idea, but it’s never caused any problems.</div><p><br></p><div>Good luck arguing that everything needs to be upgraded to support longer and more complex passwords, possibly spending millions of dollars, The institutional “wisdom” is against you, and most of those people have been there way longer than you.</div></div>
</div><div data-element-id="elm_587t-wBnYfbPBz7zFQ7Otw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_587t-wBnYfbPBz7zFQ7Otw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Operational interruption risk</span></h2></div>
<div data-element-id="elm_hRujAgSePBurMekPuLZlpw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hRujAgSePBurMekPuLZlpw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Every control and mitigation you implement might cause an operational issue. It might even disrupt operations. You are far more likely to get fired for accidentally disrupting operations than for proactively preventing some theoretical risk. For every control and mitigation that you push, you worry about the potential operational interruption it will cause.</div><p><br></p><div>The more radical the control, the more likely it is to mitigate every bit of the risk of the threat it is fighting, but the more suspicious you are that it can do so without operational interruption. If mitigating risks without causing operational interruption were easy, everyone would be doing it.</div></div>
</div><div data-element-id="elm_7P0Vvpm_iJynjkny6rjQaw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7P0Vvpm_iJynjkny6rjQaw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">6. Employee dissatisfaction risk</span></h2></div>
<div data-element-id="elm_6yDT2RVVGFaZcG4DWQWcoQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6yDT2RVVGFaZcG4DWQWcoQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>No risk manager wants to make employees angry. If you want to do so, implement any control that restricts where they can go on the internet and what they can do on their computer. End users are responsible for 70% to 90% of all malicious data breaches (through phishing and social engineering). You cannot trust end users’ instincts to protect the organization.</div><p><br></p><div>Yet the mere mention of restrictions on what end users can do, such allowing only pre-approved programs to run or restricting where and what they can do on the internet, is met by hostility from most employees. The labor market is tight. Every company is struggling to get good employees, who don’t want to be told they can’t do whatever they want to do on “their” computer. You lock it down too much and they might go work somewhere else.</div><p><br></p></div>
</div><div data-element-id="elm_qPwjmhPTyTxmaho80m2Jjg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qPwjmhPTyTxmaho80m2Jjg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">7. Customer dissatisfaction risk</span></h2></div>
<div data-element-id="elm_j-5BhFKake6jj7TlG2nV9Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_j-5BhFKake6jj7TlG2nV9Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>No one wants to implement a policy or procedure that turns customers off. Upset customers become other companies’ happy customers. For example, credit card companies are far more concerned with accidentally denying a legitimate customer a legitimate transaction than in stopping fraud. They care about fraud, but it’s at a level they feel is long-term sustainable. The subcontractors and companies that make credit card transactions more accurate sell their services to the credit card companies on how well they don’t deny legitimate transactions. Customers wrongly denied twice in a year will use someone else’s credit card.</div><p><br></p><div>It’s also why you don’t need to use a PIN with a chipped card in the US. The rest of the world requires both the chip and a PIN, and this is a more secure option by far. How did it get that way? Because PIN and chip cards came to the US relatively recently, and merchants and customers were just getting used to swiping cards. Requiring people to insert the card so that the chip was read correctly was going to make a small percentage of transactions fail and upset some customers.</div><div><br></div></div>
</div><div data-element-id="elm_ZHKFxHm23knXG-eVHbIf2Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZHKFxHm23knXG-eVHbIf2Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">8. Cutting edge risk</span></h2></div>
<div data-element-id="elm_56YeCbVxAfAg_REt7MP-IQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_56YeCbVxAfAg_REt7MP-IQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>People on the cutting edge often get cut. No one wants to be on the pointy tip of the spear. Early adopters are rarely rewarded for being early. They often become the lessons learned that make it easier for the herd to adopt improved tactics.</div><p><br></p><div><div>Two years ago, the US National Institute of Standards and Technology (NIST) said that its long-standing password policy of requiring long and complex passwords that are frequently changed caused more hacking than it prevented. Its new Digital Identity Guidelines, <a href="https://pages.nist.gov/800-63-3/sp800-63-3.html" title="NIST Special Publication 800-63-3">NIST Special Publication 800-63-3</a>, says passwords can be short, non-complex, and never have forced password changes unless you know the passwords have been compromised. It was a complete 180-degree turn from the previous advice that was accepted as dogma.</div></div><p><br></p><div>Since then, no compliance guideline or regulatory law has been updated to say that following the new advice is recommended or legal. I haven’t seen or heard of any companies moving to the new policies. That’s probably a good thing, because if you changed your policy and got hacked because of it, even if NIST said it was the right thing to do, fingers will be pointed at you asking why you did it. It’s much safer to wait for the herd to move to the new password policies and they are proven right or wrong.</div><div><br></div></div>
</div><div data-element-id="elm_Q4OmtjVhf6Af8C-1UXST2Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Q4OmtjVhf6Af8C-1UXST2Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">9. Time lag risk</span></h2></div>
<div data-element-id="elm_Ku2atl6j3uEQk_Ifo3YK0g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ku2atl6j3uEQk_Ifo3YK0g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">You are almost always fighting some risk that has already happened to other people (or to your organization). You wait to see what tricks the hackers have up their sleeves and then create mitigations and controls to fight those new risks. Having to first wait to see what the hackers are doing makes a time lag from when the new malicious behavior is spotted until you can assess the new technique, think of new controls, and push them out. In a wait-and-see game, you are always behind.</span><br></p><p><span style="color:inherit;"><br></span></p></div>
</div><div data-element-id="elm_Ws5FRi3Zl3u9_WENUkn-qg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ws5FRi3Zl3u9_WENUkn-qg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">10. &quot;Can’t do everything right&quot; risk</span></h2></div>
<div data-element-id="elm_kT0G2-ZkxZuRbpvcS3lobw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kT0G2-ZkxZuRbpvcS3lobw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Last year more than 16,555 new public vulnerabilities were announced. More than 100 million unique malware programs are known. Every type of hacker from nation-states to financial thieves to script kiddies are trying to break into your organization. It’s a lot to worry about. You have no way to defend against it all unless someone gives you an unlimited amount of money, time and resources. The best you can do is guess (see #1 above) what are the most important risks and try to stop them.</div><p><br></p><div>These are not new components of risk assessment. They have always been there, and they are what you are all thinking about when assessing risk and thinking of controls. It all points to the fact that risk assessment and risk management are far harder to do than it seems, especially on paper or from formal theory in a book. When you consider all the things the average computer security person has to worry about and contemplate, it’s amazing that we can actually get it right most of the time.</div><p><br></p><div>Now go out there and continue to fight the good fight!</div><p><br></p></div>
</div><div data-element-id="elm_qOqlUcPPS_qe7aMXc9DtfA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qOqlUcPPS_qe7aMXc9DtfA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cybersecurity"><span class="zpbutton-content">Learn more about CyberSecurity and Cloud 9 Advisers</span></a></div>
</div><div data-element-id="elm_peamuDvJWBkDV0gwQ-nlSQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_peamuDvJWBkDV0gwQ-nlSQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_qO2_SHxDuHqMbm8K52kyAw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_qO2_SHxDuHqMbm8K52kyAw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers. When it comes to cyber security there is far too much to consider. Cloud 9, together with our distributors, is made up of more than two-hundred and fifty experts, engineers and staff, all devoted to helping you save time and money and make choices easier. Our curated Supplier Portfolio contains nearly two-hundred of the best service provider companies. We are one of the largest buyers of technology in the country. Through us, you’ll get the collective buying power of thousands of other clients. Consider us your professional technology shoppers and babysitters. We are impartial, unbiased, and supplier-neutral. We sit on your side of the table to help you find, evaluate, and negotiate with service provider companies. We’ll help you design the right solution and identify the best technologies. We’ll get pricing from multiple competing companies, then guide you through the evaluation and procurement process. Use our evaluation tools for documentation and due diligence. Plus, have our entire team at your disposal before, during, and after the acquisition of your new services. We'll be by your side for as long as you’re in business.</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span><span style="font-size:11pt;">&nbsp;</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:11pt;"><br></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Oct 2019 10:24:06 -0500</pubDate></item><item><title><![CDATA[China Tops List as Top Risk (duh!)]]></title><link>https://www.cloud9advisers.com/News/post/China-Tops-List-as-Top-Risk</link><description><![CDATA[It probably goes without saying, but China is a major risk for most US business and certainly anyone conduction any sort of business online. Read more and contact Cloud 9 to learn ways to protect your digital assets]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rVgB2_y6QFqaWlc7I3Es5w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fZQ618y0S0yVuwgeACBtZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mvhK6RVoT6WNKbwJ9O62dA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">China Tops List of U.S. Cybersecurity Agency’s Top Risks</span></h2></div>
<div data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:12.6px;">By William Turton |&nbsp;August 23, 2019 - see the full article at <a href="https://www.insurancejournal.com/news/national/2019/08/23/537801.htm?utm_source=Partner%2BAug%2B%2719%2BNewsletter&utm_campaign=Partner%2BNewsletters&utm_medium=email" title="InsuranceJournal.com" target="_blank">InsuranceJournal.com</a></span></span><br></p></div>
</div><div data-element-id="elm_wpQyrPryRuPCab8mdi4FTw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_wpQyrPryRuPCab8mdi4FTw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1501621185719-221c3312e3ba?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_-l1px7zed5YDyx5NhzqrHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-l1px7zed5YDyx5NhzqrHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;">Cybersecurity and Infrastructure Security Agency (CISA), a</span>&nbsp;newly created U.S. cybersecurity agency said Thursday that China represents the greatest strategic risk to the U.S., and as a result, the agency’s top operational priority is reducing the risks from Chinese compromises to the global supply chain, including emerging 5G technology. The statement was part of a report outlining CISA's strategic intent for the next five years. The agency is responsible for protecting America’s critical infrastructure, like election systems and power grids, from hackers and other cybersecurity threats.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div>Besides China, the agency’s other priorities include federal cybersecurity and reducing risks for industrial control systems.&nbsp;<span style="color:inherit;">Christopher Krebs, the agency’s director, said in a speech Thursday that his agency is the nation’s “risk adviser,” which doesn’t have its hands on the keyboards of computer networks but rather seeks to make other agencies and companies do a better job managing risks against cyberattacks.</span></div><div><br></div><div>The priorities reflect the work CISA has already been doing since the agency was established in November 2018, a time during which the Chinese manufacturer Huawei Technologies Co. was blacklisted by the Trump administration amid security concerns and Russian agents were indicted for seeking to manipulate the 2016 presidential election.</div><div><br></div><div>“When we think about Russia, they’re trying to disrupt the system,” Krebs said, at an event at Auburn University in Alabama. “And China is trying to manipulate the system, so that requires us to take different approaches.”</div><div><br></div><div>CISA is currently offering services to election equipment vendors to find potential vulnerabilities in its systems. CISA’s work also includes protecting state and local governments from ransomware attacks, like the one that hit 22 towns in Texas last week. “Ransomware is not going anywhere,” Krebs said. “It’s only getting worse.”</div><br><div><span style="color:inherit;"><p style="margin-bottom:20px;font-size:16px;">CISA sits within the Department of Homeland Security. Krebs, the agency’s first director, joined the DHS in 2017 and was nominated to lead the agency by President Donald Trump in 2018. Before that, he was the Director for Cybersecurity Policy on Microsoft Corp.’s U.S. Government Affairs team.</p></span></div></span></div></div>
</div><div data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Learn how Cloud 9 can help you protect your business</span></a></div>
</div><div data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_2haLWEezyEXAZAWFZIYwGw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_2haLWEezyEXAZAWFZIYwGw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers.&nbsp;</span></span><br></p><p><span style="color:inherit;"><span style="font-size:11pt;"><br></span></span></p><ul><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Time: </span>We manage everything by becoming an extension of your team and do the legwork for you.</span><br></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Money: </span>We save you big by getting the buying power of thousands of other clients.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Confidence: </span>We evaluate and negotiate to get you the best solution, best supplier, and the best price.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Clarity:</span> We find the right companies, distill the information, and clear the clutter.</span></li></ul><div><span style="font-size:11pt;"><br></span></div><div><span style="color:inherit;"><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 08 Oct 2019 04:02:04 -0500</pubDate></item></channel></rss>