<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/cyber-security/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #cyber security</title><description>Cloud 9 Advisers - News #cyber security</description><link>https://www.cloud9advisers.com/News/tag/cyber-security</link><lastBuildDate>Tue, 24 Feb 2026 13:00:50 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Under Constant Attack]]></title><link>https://www.cloud9advisers.com/News/post/under-constant-attack</link><description><![CDATA[Most companies only have basic firewall protection, generally hardware-based and maybe a few others may conduct regular scans of their environment. Really no different than your home having a basic lock and maybe a deadbolt.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PeBlM-B7QBSoRizcLxfeFg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bVe8xmGiRf2NMBIZ-WIqQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RkvKXUFZSsSuqpus-rrQQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Constant attacks require constant Security<br></h2></div>
<div data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ"].zpelem-text { border-radius:1px; padding:100px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We’re in an environment where our systems are constantly under attack. They're under attack from all sorts of diverse players who are trying to take advantage of the private proprietary information that is available.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Companies are really focused on compliance ensuring that they are protecting their business value from these types of attacks. Every executive has an obligation to ensure that they are compliant with security.&nbsp;<br></div><p><br></p><div>What are most companies doing for security?&nbsp;</div><p><br></p><div>Most companies only have basic firewall protection, your basic intrusion prevention (not necessarily intrusion detection), generally just hardware-based. A few others may do just a little more; they may conduct regular scans of their environment. This is really no different than your home having a basic lock and maybe a deadbolt. There is no alarm system like you might have in a home to see and be alerted when intrusions are happening. Being alerted of intrusion is critical in business so that more immediate actions can be taken. Often enough, attacks can be sly and stealthy. Recent studies show that malicious code is embedded on business systems for more than 250 days before it is ever used to promote an actual attack. The reason being so that attackers know their code is also well planted in several layers of business backups as well as active systems.&nbsp;</div><p><br></p><div>How have today’s complex attacks changed systems and the approach to security?&nbsp;</div><p><br></p><div>The attacks are becoming more sophisticated, automated,&nbsp; and voluminous, so we no longer have the time nor capability to react in a manual way. We actually have to have machine learning and other artificial intelligence technologies to adapt and scan the environment much more rapidly looking for these constant intrusions malicious code, and breeches. These technologies work in tandem with professional cybersecurity teams and Security Operations Centers (SOCs) to constantly manage, monitor, and alert. The trick with alerts is dramatically reducing false positives. Too many alerts are just as futile as too few.&nbsp;</div><div><br></div><div>How much does a cyber attack cost?&nbsp;</div><p><br></p><p>Recent US cyber crime studies show an average measurement of damage from a breach: a 46 day long average resolution at an average of $21k per day, plus regulatory fines, and major customer fallout. These attacks can be highly damaging to any business. Cyber insurance can only go so far and cover so much. Claims can also be denied for a host of often confusing reasons, leaving the business to fit the bill. These newer types of cyber insurance policies have many requirements and stipulations, and with a sense of irony, those requirements are very much cybersecurity technology many of which are security technology related.<br></p><p><br></p><div>Contact us today and let’s evaluate your business security posture.</div></div>
</div><div data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers is a client-only, client-focused agency and consulting group offering vendor selection and management services to help you solve IT and general technology problems fast. We'll walk you through the identification, research, evaluation, and comparison process, provide board-ready documentation and due diligence, and provide oversight of solution implementation on any of our 250+ vendors, carriers, and service providers.&nbsp;</p><p><br></p><p>Our teams of vendor-neutral security focused engineers will help you slice through the marketing fluff and&nbsp; industry jargon so you know what you're buying. We'll help you make smart IT investments quickly and confidently. Reach out to us today!</p></div>
</div><div data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us page"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 21 Jul 2021 14:59:22 -0500</pubDate></item><item><title><![CDATA[Never Trust and Always Verify]]></title><link>https://www.cloud9advisers.com/News/post/never-trust-and-always-verify</link><description><![CDATA[Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TAHtRM7MTwyz93DQF4vulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EK0C27GDQIeK-T7DwhG40g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1wDa-H2ITMKidvNyBIDVAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Zero Trust Picking up Steam in the Enterprise</h2></div>
<div data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/ZeroTrustSecurity.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_3MYoUag1of7CYIZHqfMTrA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_3MYoUag1of7CYIZHqfMTrA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KX-DnESpwPeszGZSn0xybQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KX-DnESpwPeszGZSn0xybQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gmq_CGqL3txZQszRpkTkTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gmq_CGqL3txZQszRpkTkTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something. </p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">&quot;The traditional perimeter-based security model is dead. It has been overtaken by an era of cloud, mobility, and BYOD that requires a new approach to network access control.&quot;</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">The Zero Trust Network Access (ZTNA) model is a new method of access control that considers all network connections untrusted. This is a shift from the traditional concept of an inside/outside network where only some connections were considered trusted. The ZTNA model requires organizations to consider all traffic as potential threats, which means security controls must be in place at every stage of the attack lifecycle and beyond the firewall layer into your environment.</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">Never Trust and Always Verify</span>&nbsp;is the general premise behind Zero Trust Network Access (ZTNA). A strong proponent for the replacement of traditional remote access like Virtual Private Networking (VPN), where a secure tunnel straight into the corporate network is created and anything that goes through that tunnel is presumed &quot;safe&quot; and &quot;trusted&quot;. There are a number of &quot;faith-based&quot; assumptions that take place when using&nbsp; VPN. One big one being the remote device creating the tunnel is <span style="font-style:italic;">still</span>&nbsp;a trusted device. ZTNA takes a different approach: nothing is trusted and everything must be verified. This might seem laborious, but the user experience is minimally affected and security benefits are significant.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">ZTNA is starting to turn heads with IT for its protection of applications, data, and networks, easier control, and innate simplicity allowing access to remote staff, suppliers, and contractors. Some providers offer client and clientless versions for far greater flexibility and no need to constantly update Active Directory just to let a supplier in for two hours worth of work. And even provided secure access to users' personal devices without the typically required &quot;big brother'&quot;intrusions.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">The real power of ZTNA comes when its combined with the power of a Secure Access Service Edge (SASE) solution. These two put together forms a full security barrier and flexible perimeter thoroughly protecting endpoints and users.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">Using disparate/separate SASE and ZTNA platforms can certainly be done, but should only be done so by the most adept and experience security professionals. The management interface and integration of these separated systems is highly complex. Many solutions exist&nbsp; that combine both SASE and ZTNA together with a single management interface. Some providers also offer a completely managed solutions as well.&nbsp;</p><p style="font-size:16px;"><br></p><p><span style="color:inherit;"></span></p><p style="font-size:16px;">Regardless there is a lot to consider. Contact us and we'll get you in contact with a Strategic Tech Expert to wal you through all of the options and find out who the best vendors are for your business</p></div>
</div></div><div data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_iS6O_iNXLx1VEelRIBau9w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_iS6O_iNXLx1VEelRIBau9w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all.png" data-src="/C9-Logo1.t-all.png" size="medium" data-lightbox="true" style="height:140px;width:271.85px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy great technology. We work with you to rationalize and reduce technology spending without sacrificing the technology itself and employ sound digital transformation principles and strategies.</div><p><span style="color:inherit;"><br></span></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We diagnose problems, prescribe solutions, and facilitate decisions.</div><p><span style="color:inherit;"><br></span></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>To learn more contact us today and book an appointment.</div><p><span style="color:inherit;"><br></span></p><div><br></div></div>
</div></div></div><div data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 17:11:26 -0500</pubDate></item><item><title><![CDATA[ALERT: SolarWinds & FireEye]]></title><link>https://www.cloud9advisers.com/News/post/Alert-solarwinds-hack-is-serious</link><description><![CDATA[Unfortunately, Cyber Attacks don’t take time off to celebrate with family and friends. Are you concerned your business has been affected by the SolarWinds hack? If so, get help right away.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_LBgEgRbkQeqBq3tnqEjWwQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_WiIOsdJiRzOhmFwfKBKXEQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_6w3WxJThTQiTYcaJbjRiaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_AMUHfIWXTS6nDZZQkBpu5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AMUHfIWXTS6nDZZQkBpu5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Tips to protect yourself against the SolarWinds Breach</span></h2></div>
<div data-element-id="elm_mwuPV9mDSQKsQwyP8h8RrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mwuPV9mDSQKsQwyP8h8RrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;font-weight:bold;">Are you concerned your business has been affected by the SolarWinds hack?</span><br></p></div>
</div><div data-element-id="elm_a-kWMZqRA4LITRoWxvgOFw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_a-kWMZqRA4LITRoWxvgOFw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/solarwinds-orion-campaign-victims-include-cisco-intel-imageFileLarge-10-a-15619.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_YonUOzoN41j1XXSbK8-85g" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_YonUOzoN41j1XXSbK8-85g"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_YonUOzoN41j1XXSbK8-85g"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_04_XKix86UNXolrDUAGsaQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_04_XKix86UNXolrDUAGsaQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_3dpl_MXk67PcWSLIAnjcMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_3dpl_MXk67PcWSLIAnjcMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DV-AHi70ArPv6wMKCePVRw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DV-AHi70ArPv6wMKCePVRw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Are you concerned your business has been affected by the SolarWinds hack?</span><br></h3></div>
<div data-element-id="elm_GDLCbqoEOMpsxpsM5G5kBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GDLCbqoEOMpsxpsM5G5kBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Unfortunately, Cyber Attacks don’t take time off to celebrate with family and friends. Due to the recent news about FireEye discovering the major SolarWinds hack we want to make sure you are equipped and prepared. Cloud 9 and our cybersecurity vendors are receiving numerous inquiries about the recent cyber-attacks on Solarwinds.&nbsp;<br></div><p><br></p><p><span style="color:inherit;">Most people have never heard of SolarWinds, which provides IT infrastructure management tools to hundreds of thousands of customers including government agencies, corporations, and nonprofit organizations. SolarWinds boasts of&nbsp;</span><span style="color:inherit;">300,000 global customers of whom include most of the S&amp;P 500, hundreds of colleges and universities, and many of the country’s most important government agencies including the US State&nbsp;</span><span style="color:inherit;">Department</span><span style="color:inherit;">,&nbsp;</span><span style="color:inherit;">Department of&nbsp;</span><span style="color:inherit;">Commerce, US Treasury,&nbsp;</span><span style="color:inherit;">Department of&nbsp;</span><span style="color:inherit;">Homeland Security, and the National Institutes of Health to name a few.</span></p><p><span style="color:inherit;"><br></span></p><div>News sources are saying this is the biggest cyber attack from a nation state in US history. Many are blaming a state-sponsored attack from Russia, some say the Russian group &quot;Cozy Bear&quot;, still fewer have said that China may be involved. Even though the main target appears to be the US Government the threat goes much deeper giving the attackers administrative access to critical systems of potentially every SolarWinds customer. Because the attacks were targeted against a hugely popular and widely used IT infrastructure monitoring software the effects will be catastrophic to many commercial businesses around the globe.&nbsp;</div><p><span style="color:inherit;"><br></span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p><span style="color:inherit;">&quot;This is a huge problem for two major reasons: The attackers were able to gain access for a long period of time without being detected, and it will also take a long time for security experts to determine the extent of what's been compromised.&quot; -&nbsp;<span style="font-style:italic;">Business Insider</span></span></p></blockquote><p><span style="color:inherit;"><br></span></p><div>Here are just a few headlines from several news outlets about the breach:&nbsp;</div><ul><li><a href="https://apnews.com/article/hacking-russia-bafff5557a8941aa1a5ef239d36c4e28" target="_blank" rel="noreferrer">&quot;Hacked networks will need to be burned 'down to the ground'&quot; - Associated Press</a></li><li><a href="https://www.businessinsider.com/fallout-solarwinds-hack-get-worse-before-gets-better-2020-12" target="_blank" rel="noreferrer">&quot;The fallout from SolarWinds hack will get worse before it gets better&quot; - Business Insider</a></li><li><a href="https://arstechnica.com/information-technology/2020/12/feds-warn-that-solarwinds-hackers-likely-used-other-ways-to-breach-networks/" target="_blank" rel="noreferrer">&quot;SolarWinds hack that breached gov networks poses a 'grave risk' to the nation&quot; - Ars Technica</a></li><li><a href="https://www.crn.com/news/security/cisco-hacked-through-solarwinds-as-tech-casualties-mount" target="_blank" rel="noreferrer">&quot;Cisco Hacked Through SolarWinds As Tech Casualties Mount&quot; - CRN</a></li><li><a href="https://bobsullivan.net/cybercrime/google-down-government-hacked-fireeye-raided-amazon-outage-its-been-a-rough-patch/" target="_blank" rel="noreferrer">&quot;Google down, government hacked, FireEye raided, Amazon outage — it’s been a rough patch&quot; - BobSullivan.net</a><br></li></ul><div><br></div><div>If you are concerned you could be at risk, please reach out to Cloud 9 <span style="font-style:italic;font-weight:bold;">immediately</span>. Our vendor-neutral cybersecurity experts will help to validate any concerns, plot the best course of action, and determine the ideal Risk Assessment and Security Assessment services and vendors for your organization. This will give you the ability to inspect all targeted areas within your environment for active malware and other vulnerabilities.<br></div><p><span style="color:inherit;"><br></span></p><div>If you are experiencing questionable activity or are concerned in any way...<br></div><ol><li>Describe the suspicious activity.<br></li><li>When did you first notice it?<br></li><li>Are you a SolarWinds customer?<br></li><ul><li>If so, what have you done so far?&nbsp;</li><li>If not, what monitoring services do you use?</li></ul><li>Are any of your technology service providers a SolarWinds client? If so, who?<br></li><li>Have you noticed any impact to your business? If so, what?<br></li><li>Have you communicated the suspicious activity anyone else? (Executive team, corporate attorney, cyber-insurance provider, etc…)</li></ol><p><br></p><p><span style="font-weight:bold;">Immediate next steps </span>– contact Cloud 9 for help and guidance to find the right cybersecurity solution, service, and vendor for initial triage and long-term protection.<br></p></div>
</div></div><div data-element-id="elm_TPsdXBec5h1biu9y0Jhydw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TPsdXBec5h1biu9y0Jhydw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ"] div.zpspacer { height:241px; } @media (max-width: 768px) { div[data-element-id="elm_1SajVwN0mLT-M5uZM9lkVQ"] div.zpspacer { height:calc(241px / 3); } } </style><div class="zpspacer " data-height="241"></div>
</div><div data-element-id="elm_Bbb7VbciskA638VT8xUfJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Bbb7VbciskA638VT8xUfJg"].zpelem-text { border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 is here to help. Our Vendor Selection and Vendor Management services are free to our clients and are designed to help you determine the best course of action and quickly narrow the focus to the best solutions and vendors for your specific needs.&nbsp;</p><p><br></p><p style="text-align:center;">Learn more about&nbsp;<a href="/cybersecurity" title="Cybersecurity" target="_blank" rel="">Cybersecurity</a></p><p style="text-align:center;"><br></p><p style="text-align:left;">As a client you'll have guided access to our proprietary Pathfinder app and experts. We'll get you started down the right path, focused on the right solutions, and narrow down the right vendors to evaluate.</p><p style="text-align:left;"><br></p><p style="text-align:left;">Click the button below to book your appointment now.&nbsp;</p></div>
</div><div data-element-id="elm_KsCt9SiHpega0rTPPcmtyA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_KsCt9SiHpega0rTPPcmtyA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book you appointment"><span class="zpbutton-content">Book now</span></a></div>
</div></div></div><div data-element-id="elm_sc5212VnR6-1wDAgXn8OAw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_sc5212VnR6-1wDAgXn8OAw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" title="Book your appointment"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 28 Dec 2020 12:23:55 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Nitel]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-Nitel</link><description><![CDATA[With technology becoming mission-critical, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their assets vulnerable to cybercriminals. Cloud 9 can help.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_D-Nz53vkQxquWyV5fg7jdQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MgtG_ZrcS2mNS7npggHEOA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BdizElknRkuISnouLpCG9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QJOCT7dRQDmslE7NejpYyQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Nitel: Managed Next-Generation Security</span></h1></div>
<div data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_4TKuqEeUkwPg9RaWb_7pFA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/NITEL_Managed_Security_Testing.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OHp_iLmqR6u-XaQx78xgeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By: Nitel USA, see the article here&nbsp;<a href="https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/">https://www.nitelusa.com/blog/explore-4-levels-of-security-testing/</a></span></p></div>
</div><div data-element-id="elm_fciiwuYY6NKxhDk31yORrQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fciiwuYY6NKxhDk31yORrQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Supplier Spotlight:&nbsp; <a href="https://www.nitelusa.com/" title="NITEL" target="_blank">NITEL</a></p></div>
</div><div data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_W4TKPMCMz1lTSPGcbsDXdw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/ISP%20Nitel2.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_N294fkf-kdgYXGrWEEeODg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_N294fkf-kdgYXGrWEEeODg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Explore Four Levels of Security Testing</h2></div>
<div data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FSt4bfxFQiqFOuoB2Fqz1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>With cloud, big data and mobile solutions becoming mission-critical to organizations of all sizes, IT teams are struggling to keep up with the adoption and innovation of the latest security best practices, leaving their organizations vulnerable to cybercriminals. And it’s not just large organizations cybercriminals are targeting; smaller companies are just as likely to be attacked. They tend to be easier targets, more likely to pay up in the case of a ransomware attack. They can also serve as a back door into other third-party organizations they do business with.</div><p><br></p><div><div>Although managed security is an investment, many organizations simply cannot afford to not conduct on-going security testing. According to a recent <a href="https://www.trustwave.com/en-us/" title="Trustwave security report," target="_blank">Trustwave security report,</a> 41% of those surveyed feared financial damage to their company in the event of a cyberattack or data breach.</div></div><p><br></p><div>Managed security testing is defined as subscription-based proactive scanning and testing of environment security to identify vulnerabilities. However, a comprehensive managed security solution does more than identify vulnerabilities and weak points.</div><p><br></p><div>When working with a qualified managed security provider an organization should not only gain insight into weaknesses, but gain a blueprint on how to prioritize, mitigate and remediate these risks. When your customer engages with a provider of managed security services like Nitel, backed by a cybersecurity Gartner Magic Quadrant Leader Trustwave, they can choose to engage with four levels of testing depending on their budget and business needs, including:</div><ul><ul><li><span style="font-weight:bold;">Basic threat</span> – Simulates the most common attacks executed in the wild today. This class of attacker typically uses freely-available, automated attack tools.</li><li><span style="font-weight:bold;">Opportunistic threat</span> – Builds upon the basic threat and simulates an opportunistic attack executed by a skilled attacker that does not spend an extensive amount of time executing highly sophisticated attacks. This type of attacker seeks easy targets (”low-hanging fruit”) and will use a mix of automated tools and manual exploitation to penetrate their targets.</li><li><span style="font-weight:bold;">Targeted threat</span> – Simulates a targeted attack executed by a skilled, patient attacker that has targeted a specific organization. This class of attacker will expend significant resources and effort trying to compromise an organization’s systems.</li><li><span style="font-weight:bold;">Advanced threat</span> – Simulates an advanced attack executed by a highly motivated, well-funded and extremely sophisticated attacker who will exhaust all options for compromise before relenting.</li></ul></ul><div>Cloud 9 Advisers clientele benefit from Nitel/Trustwave’s crowd-sourced, global threat intelligence through a solution that is scoped to fit their needs. Nitel's intrinsic network knowledge, combined with Trustwave’s highly skilled SpiderLab ethical hacker team, can quickly identify security weak points and guide you to a solution to protect your organization.</div></div>
</div><div data-element-id="elm_rRZDbyeva5vy63rqVWFVGw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rRZDbyeva5vy63rqVWFVGw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Managed Next-Gen Security Solutions</h2></div>
<div data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_e-8WVdP5N1Rd5BRWbLahzA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">What keps business and IT leaders up at night?</span></div><div>For business leaders everywhere, a data breach is on par with the most damaging things that could happen to an organization. The thought of being the next company to make headlines keeps leaders up at night while IT organizations fight to keep the bad guys out. As threats become increasingly widespread, sophisticated and dangerous, companies look to develop security strategies that protect their environment while staying within budgets that seem to get tighter every year.</div><div><br></div><div><span style="color:inherit;"><div>Your business is unique, with its own set of needs and priorities. That’s why we offer a suite of security solutions that offers multiple&nbsp;<span style="color:inherit;">ways for you to protect your business. Whether your business is big or small, whether you value distributed architecture or centralized,&nbsp;</span><span style="color:inherit;">you’ll find a solution that fits how you prefer to manage your environment.</span></div></span></div></div>
</div><div data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_kOm3EHvRU5lyVCF4U-B-RQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_44Ols88sMN6a-H9zszeCIQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_44Ols88sMN6a-H9zszeCIQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zvFUBuG0Ue5WxILuDG0FbA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;"><span style="color:inherit;">ENTERPRISE GRADE PROTECTION</span><br></span></p><div><ul><li>Safely enable applications, users and content by classifying all traffic, determining the business use case, and assigning policies to allow and protect access to relevant applications.</li><li>Prevent threats by eliminating unwanted applications to reduce your threat footprint and apply targeted security policies to block known vulnerability exploits, viruses, spyware, botnets and unknown malware (APTs).</li><li>Protect your datacenters through the validation of applications, isolation of data, control over rogue applications and high-speed threat prevention.</li><li>Secure public and private cloud computing environments with increased visibility and control; deploy, enforce and maintain security policies at the same pace as your virtual machines.</li><li>Embrace safe mobile computing by extending the enterprise security platform to users and devices no matter where they are located.</li></ul></div></div>
</div></div><div data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TAMU5VgF_kAjGqSw-FDDMg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_XMii76EEv6YXr4DApouFPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XMii76EEv6YXr4DApouFPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">ROCK SOLID PROTECTION FOR SMB</span><br></p><p><span style="color:inherit;">Our customized solutions deliver next-generation security for&nbsp;</span><span style="color:inherit;">every size and type of business. Gain full control and visibility&nbsp;</span><span style="color:inherit;">of application traffic passing through your network, even for&nbsp;</span><span style="color:inherit;">encrypted traffic, thanks to application detection, user-identity&nbsp;</span><span style="color:inherit;">awareness, SSL interception and built-in live reporting.</span></p><span style="color:inherit;"><br><div>You benefit from the same critical next-generation security&nbsp;<span style="color:inherit;">features that large enterprises receive—but sized appropriately&nbsp;</span><span style="color:inherit;">for your business. Your business will fend off threats with&nbsp;</span><span style="color:inherit;">included next-gen features that take place directly in the data&nbsp;</span><span style="color:inherit;">path, including:</span></div><div><ul><li>Firewalling</li><li>Intrusion Detection and Prevention (IDS/IPS)</li><li>URL Filtering</li><li>Dual Antivirus</li><li>Application Control</li></ul></div></span></div>
</div></div></div><div data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_xwzKvYLFv0iSWD7rAZLmvw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_aGCdmMTLWT3uXnRRpprJlw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TIbXzuGwNIZyyPUKlto0Lg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY EXPERTISE ON YOUR SIDE</span></div><p>Nitel has partnered with Gartner Magic Quadrant leader Trustwave to complement our managed next-generation firewall service with a suite of security management services. This 1–2 punch creates a comprehensive managed security solution to reduce your business risk and give you peace of mind. With Nitel overseeing your network health, performance and security, you have a single partner working on your behalf to ensure your business operates optimally and safely.<br></p></div>
</div><div data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_wRDB5vkfWpYhvgolP2hiSw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_A7Uxs0wzwOd4JppuM_pZaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kxjJly2NUqDKphGl7CZTBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kxjJly2NUqDKphGl7CZTBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">SECURITY INFORMATIONEVENT MANAGEMENT</span></div><p>Achieve more effective identification and mitigation of security threats. You’ll reduce your burden with around-the-clock support from 10 global security operations centers staffed with experts who have in-depth knowledge and experience working with complex network environments for highly distributed organizations.<br></p><p><span style="color:inherit;"><br></span></p><div>Our SIEM service collects, analyzes and stores logs from networks, hosts and critical applications. It extends visibility beyond the network perimeter to the application layer, helping you achieve more effective identification and mitigation of security threats, and compliance validation with numerous regulatory and industry standards.</div><p><span style="color:inherit;"><br></span></p><div>Advantages:</div><ul><li>SpiderLabs security research utilizing global event data to identify current and emerging threats</li><li>Industry-leading compliance expertise</li><li>Solutions tailored to the specific needs of healthcare, financial, retail and more<br></li><li>Collects and reviews over 1 billion events per day</li></ul></div>
</div></div><div data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4nbA8yZAxfLB0YgoXHocQg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DKxP6AjJ4qFTW-15oUjJWA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-weight:bold;color:rgb(48, 4, 234);">Need to maintain compliance with PCI, DDS, HIPAA, SOX, FISMA, GLBA/FFIEC? </span><span style="color:inherit;">Let Nitel help. We’ll help you fulfill your requirements for vulnerability scanning, penetration testing and ongoing evaluation of your environments and applications.</span><br></p></div>
</div><div data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vaHmouTnwhGdwxTmTqfr2w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">MANAGED SECURITY TESTING</span></div><p>Reveal potential vulnerabilities in your environment with thorough penetration testing. Expert “ethical hackers,” armed with the same techniques as today’s cybercriminals, attempt to hack into your network or application to help you identify network-connected assets, learn how those assets are vulnerable to attack and understand what could happen if those assets were compromised.</p></div>
</div></div></div></div></div><div data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HiJDjLcbTgWolupM1WT0sQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8e96XAy6BCk6Ady-wpVTqQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Contact Cloud 9 Advisers for expert guidance and help with any compliance, risk management, monitoring, edge security and any other cybersecurity issues. We'll guide you to the right vendors, like Nitel, from our <a href="/suppliers" title="Supplier Portfolio">Supplier Portfolio</a>.&nbsp;</p></div>
</div><div data-element-id="elm_whExP12qqr410n4GYwgVlQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_whExP12qqr410n4GYwgVlQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_4415zG0x20XtZyYAYT5sJg" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_4415zG0x20XtZyYAYT5sJg"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;font-weight:bold;">Because it’s all about you.&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;">Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p><p><span style="color:inherit;font-weight:bold;"></span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></div>
</div></div><div data-element-id="elm_uv3x5ayeZhugascf41xYsQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_uv3x5ayeZhugascf41xYsQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about how Cloud 9 can help" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 04 Feb 2020 12:06:38 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: RSI]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-RSI</link><description><![CDATA[While a lot of our clients’ attention is focused on our unique Automated Cyber Risk Management solution, powered by CyberCompass, we also assist our forward-thinking clients to achieve Zero Trust Security through the adoption of our ‘Evolving Trust’ Framework.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_nQZIJH5QQIOFPDSbUUlrgQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_wi_QXZ1PTa-ALmp5S7YmIw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_SOmJiVcYR56mXJZ10lVcxg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_SOmJiVcYR56mXJZ10lVcxg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_A3lLyquuTRKFRclfPBbYuQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_A3lLyquuTRKFRclfPBbYuQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Getting Zero Trust Right</span></h2></div>
<div data-element-id="elm_DUwACMZgs7NyNSthLBaS3A" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_DUwACMZgs7NyNSthLBaS3A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1575018101372-580b21aab4d2?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" alt="Cloud 9 Zero Trust Security RSI" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_82qGMR4fTB-GccTIs6PXzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_82qGMR4fTB-GccTIs6PXzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:12px;">By: Taylor Hersom, RSI, see the original article here&nbsp;<a href="https://www.rsitex.com/post/getting-zero-trust-right" title="RSItex.com/post/getting-zero-trust-right" target="_blank">RSItex.</a><a href="https://www.rsitex.com/post/getting-zero-trust-right" title="RSItex.com/post/getting-zero-trust-right" target="_blank">com/post/getting-zero-trust-right</a></span></p></div>
</div><div data-element-id="elm_nX8gbOipKRwy1Mwf0HlvJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nX8gbOipKRwy1Mwf0HlvJg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers, Supplier Spotlight:&nbsp;<span style="color:inherit;font-weight:bold;"><a href="http://www.rsitex.com" title="Renaissance Systems, Inc." target="_blank">Renaissance Systems, Inc.</a></span></p></div>
</div><div data-element-id="elm_jLznsLwAhg5J0isrpxr4LA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_jLznsLwAhg5J0isrpxr4LA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Sec%20RSI.jpg" size="original" data-lightbox="true" style="height:139px;width:246.94px;"/></picture></span></figure></div>
</div><div data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_cZ4rD1wgvny-QIAGFaGQjQ"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_eCwWj2BvsENLk1Nvm9_LmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eCwWj2BvsENLk1Nvm9_LmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>At RSI, our priority is to help companies improve their Cyber Risk Management. While a lot of our clients’ attention is focused on our unique Automated Cyber Risk Management solution, powered by CyberCompass, we also assist our forward-thinking clients to achieve Zero Trust Security through the adoption of our ‘Evolving Trust’ Framework. The purpose of this article is to provide some background on Zero Trust Security, highlight how RSI has re-imagined this strategy, and demonstrate how RSI can help you to adopt true Zero Trust using our Evolving Trust Framework.</div></div>
</div><div data-element-id="elm_-c_SxsRTYg0eZpRGqMK0uQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-c_SxsRTYg0eZpRGqMK0uQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">A Brief History</span></h3></div>
<div data-element-id="elm_YbAGwZioKx8E5rAQXhI5SQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YbAGwZioKx8E5rAQXhI5SQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Historically, network security hasn’t changed that much. Corporate networks were designed like a castle, where all users are screened at the gate (firewall) for appropriate credentials. Once a user is allowed access, they are trusted and therefore have access to all the goodies inside. In this model, it's difficult for a user to get into the ‘castle’, but the network is vulnerable to widespread turmoil if malicious users manage to get in. As the IT landscape has evolved into multiple devices per user, remote work policies, and sketchy Starbucks WiFi, the need for a better way of managing users/access has become dire.</div><p><br></p><div>Hence, Zero Trust is born. Originally known as ‘Zero Trust Network’ or ‘Zero Trust Architecture’, the idea was created in 2009-2010 by Forrester Research Inc.(specifically John Kindervag). While the concept was clever, it took a few years and a BIG company to provide a proof of concept. Google created an enterprise security model, coining it BeyondCorp, and achieved company-wide adoption of the Zero Trust model using home-grown, in-house tools and technologies. BeyondCorp achieved the previously inconceivable; it enabled every employee to work from untrusted networks without the use of a VPN. Since Zero Trust was only a concept at the time, Google had to create and piecemeal together a variety of technologies. Thankfully, there has since been widespread adoption and a variety of technologies created to help you achieve the same vision as Google, but we’ll get to that.</div><p><br></p><div>What is Zero Trust? I encourage you to read more about Google’s BeyondCorp solution to gain insight into the intricacies, but in a nutshell: the Zero Trust model asserts that organizations should not automatically trust anything or anyone inside or outside its perimeter(s). Instead, access controls are shifted from the network perimeter to individual endpoints/users and data analytics (i.e. location, time of day, employee credentials, etc.) are used to create meaningful decisions on whether an access request is appropriate. This all adds up to what is called a ‘Trust Score’, and it’s assigned every time a user attempts to log in. Remember the castle analogy above? Think about it like this: Zero Trust micro-segments your castle into a bunch of little castles. You now have the ability to determine which castle(s) your users have access to. If implemented properly, you no longer have to be connected to the corporate network and can work from any internet connection.</div></div>
</div><div data-element-id="elm_7Syd4Hlql88lFUn2osEi1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7Syd4Hlql88lFUn2osEi1Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><div>The Case for <span style="font-style:italic;">Evolving </span>Trust Security</div></span></h3></div>
<div data-element-id="elm_qPUyyucUpmXWxQPJrrUX3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qPUyyucUpmXWxQPJrrUX3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Early on, RSI understood the value of Zero Trust, especially as businesses increasingly allow remote work, BYOD, and SaaS solutions to accomplish daily tasks. Many companies have moved their most precious data to the cloud and manage an average of 1000 applications at any given time. RSI built a professional services arm to assist companies in understanding the value of this Zero Trust model as well as adopting it without any significant, upfront requirements. In order to accomplish this, we took the Google approach and adopted it ourselves (thankfully we didn’t have to build all the technology from the ground up). This journey allowed us to identify pain points, discern shortcuts from pitfalls, and ultimately develop a framework that adds tremendous value to each of our clients. What’s more, we took the time to look at Zero Trust from a non-traditional lens by including some non-traditional thinkers from our Innovation Center (and its data scientists with their big, beautiful scientific brains). What we identified is a gap in how Zero Trust is discussed, how it is interpreted, and how companies are leveraging the current solutions. RSI took that data and developed our Evolving Trust Framework. The following are some of our biggest takeaways:</div><p><br></p><div><ol><li><span style="font-weight:bold;">One Size <span style="font-style:italic;">Does Not</span> Fit All</span><br>Arguably the most important point I will stress is that while advertisements show you can “adopt Zero Trust in minutes with our tool”, those marketing gurus are causing companies to put the proverbial cart before the horse. Even with incredible SaaS tools at your disposal, you still have to be extremely familiar with the implementation and all the nuances that stem from the process, such as certificate authority, device discovery, and inherent limitations. This requires members of your organization to take the time to understand Zero Trust, understand the variety of required tools, and figure out a launch strategy that doesn’t cripple your organization. Furthermore, while there are a variety of technical solutions on the market that claim ‘Zero Trust Security’ (i.e. OKTA, Duo Security), this is only part of the puzzle. There are more components to the Zero Trust Model than those addressed by these Identity &amp; Access Management (IAM) tools. Without this knowledge and expertise, your Zero Trust strategy will gain zero traction.<br><br></li><li><span style="font-weight:bold;">Easy to Miss the Mark On Execution</span><br>Unfortunately, companies tend to fall into this pit of saying “let’s require every user to authenticate in three different ways every time they access any critical application”. Not only does this create a very difficult beast to manage for your IT department, but it also doesn’t even accomplish some of the biggest potential benefits of Zero Trust. This was the #1 reason RSI created the Evolving Trust framework, and the name says it all: we believe in incorporating deep monitoring/data analytics into the entire process so that checks and balances are strategically placed throughout a users’ access journey rather than just at the beginning. For example, when a user authenticates and meets our basic requirements (i.e. correct credentials, an appropriate device, relevant geo-location), we let them in. Next, we monitor those users and what they are trying to access. If they attempt to access any system/data we deem critical, then we require another authentication check. Finally, we keep an eye on the patterns of each user to detect anomalies in what/when/where they are accessing critical applications or data. This allows us to control the narrative for every user, every time, without creating huge inefficiencies in our organization.<br><br></li><li><span style="font-weight:bold;">Employee Education is Even More Important Than Technology</span><br>Zero Trust is just another component of cyber security and one of the biggest problems that security experts are facing is the fact that people LOVE to skirt rules. It’s human nature to make assumptions that we all know everything and we all deserve the best for ourselves, especially when some very nice Nigerian prince is trying to wire us FREE money. RSI discovered the hard way that this unfortunate mindset carries into the Zero Trust realm. The fact of the matter is, Zero Trust adds at least one extra step for every employee when they attempt to login to a critical application by requiring Multi-Factor Authentication (MFA). This causes some people to lose their minds (especially those pesky developers who are obsessed with minimizing clicks), which creates a snowball effect down the road when they decide to adopt a shiny, new SaaS tool and choose not to tell anyone about it. What’s more, IT experts have developed a mindset that firewalls keep bad actors out and that they can inherently trust their environments. The same people who haven’t changed their server admin passwords in 4 years are now required to shift their mindset to the opposite end of the spectrum, which takes time. Your Zero Trust model is only as powerful as the IT people, processes, and technologies you are in control of, which is why RSI identified other strategies to counteract these risks in the form of discovery tools, monitoring, and data analytics.<br><br></li><li><span style="font-weight:bold;">It Takes A Village Just to Manage A Village</span><br>Similar to the game of Monopoly, acquiring the esteemed Boardwalk space is only half the battle. You still have to enforce and manage your acquisition or the positive effects are moot. Zero Trust requires a SOC team to actively manage access, evaluate trust scores on a periodic basis, track new assets, and manage vulnerable endpoints (i.e. outdated OS, vulnerable applications, etc.). RSI treated our implementation as an opportunity to train our entire Technical Assistance Center (TAC) team, creating a squad of experts in the entire Zero Trust Management process and providing them the tools to scale this expertise to our clients. One of the biggest benefits of our Evolving Trust framework is that it requires a LOT less effort for our TAC team to manage access because we have automated many of the previously manual processes.</li></ol></div></div>
</div><div data-element-id="elm_tvu7Je8Lh7DDguJT3omq_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tvu7Je8Lh7DDguJT3omq_Q"].zpelem-text { border-radius:1px; margin-block-start:63px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>In summary, Zero Trust is an incredibly useful strategy for companies to keep up with the evolving IT landscape of endless personal devices, SaaS solutions out the wazoo, and cyber-crime galore. In my humble opinion, I don’t see how any company can keep up with this transformation without Zero Trust. However, I’m concerned that many companies are fooled by the current glamour of Zero Trust and their desperation to improve overall cyber hygiene can create more problems than solutions. RSI is working hard to address the Access Management cyber epidemic, and we strongly believe that the Zero Trust model (more specifically, our Evolving Trust framework) is a huge step in the right direction.</div></div>
</div><div data-element-id="elm_dfuFRhtU_UFpK1Xr-NUKTw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dfuFRhtU_UFpK1Xr-NUKTw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:18px;font-weight:bold;">To learn more about Zero Trust and how RSI can help, please contact Cloud 9 Advisers.&nbsp;</span></p><p><span style="font-size:18px;font-weight:bold;">RSI is a member of the Cloud 9 Supplier Portfolio</span></p></div>
</div><div data-element-id="elm_H9sSNBiVQNKH6BbfTsm1zA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_H9sSNBiVQNKH6BbfTsm1zA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn about Cloud 9 Advisers" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn More</span></a></div>
</div><div data-element-id="elm_RBVsAV4oOft68H40wlYavg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_RBVsAV4oOft68H40wlYavg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About RSI</h2></div>
<div data-element-id="elm_Rk7t7Iyt2D0Y9HqriXjUOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rk7t7Iyt2D0Y9HqriXjUOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>RSI transforms company and culture through fully automated solutions for business workflow. We serve the enterprise with software solutions for business process improvement, artificial intelligence for big data, and custom, managed IT services.</div><p><span style="color:inherit;"><br></span></p><div>RSI is the exclusive channel distributor of CyberCompass™, a SaaS solution for cyber risk management and remediation.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div><ul><li>Automated solutions for business workflow</li><li>AI solutions for data analytics</li><li>Custom, managed IT services</li><li>Exclusive distributor of CyberCompass™, automated cyber risk management</li><li>Drone Services</li></ul></div><br><div><span style="color:inherit;">For more than 35 years, the passion for helping people has transformed our business and that of our customers. By developing strong partnerships with our clients, we have a deeper understanding of what they need to better run their businesses. As a result, our services have expanded for a greater reach with every client.</span><br></div></span></div></div>
</div><div data-element-id="elm_O88xUHjSrO4y97kjAqkIPg" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_O88xUHjSrO4y97kjAqkIPg"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_hjWRgLAI8r0Z5tbVOx4d4g" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_hjWRgLAI8r0Z5tbVOx4d4g"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div><span style="color:inherit;"><p><span style="font-size:11pt;">Your Agent.&nbsp; Your Advocate. Your Adviser.</span></p><p><span style="font-size:11pt;font-weight:bold;"><br></span></p><p><span style="font-size:11pt;font-weight:bold;">Because it’s all about you.&nbsp;</span></p><p><span style="font-size:11pt;"><br></span></p><p><span style="font-size:11pt;">Cloud 9 Advisers will save you time during the often exhausting process of finding, evaluating, and selecting new technologies and competitive providers. We become an extension of your team and help manage the entire bidding and procurement process. We will save you money by using the buying power of thousands of other clients through our curated Supplier Portfolio, and finding the right companies from our portfolio to bid on your requirements. We provide you clarity by distilling all the information from each bidder, and clear the clutter so you can make the right decision on the best solution and provider. Cloud 9 gives you confidence throughout the decision-making process by continually evaluating the bidders and negotiating the best price and terms, so you can focus on what you do best.&nbsp;</span></p><br><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span></p><div><span style="font-size:11pt;font-weight:700;"><br></span></div></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 03 Feb 2020 10:29:06 -0500</pubDate></item><item><title><![CDATA[10 risk factors no one talks about]]></title><link>https://www.cloud9advisers.com/News/post/the-10-risk-factors</link><description><![CDATA[We've all fretted about the difficulty of calculating both the likelihood of an event and its potential damages. They have always been more like a best guess than an insurance actuarial table. How can anyone estimate the chances with any accuracy?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ZILm5ayPSjimnQ6tIb1shQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1989m1t-TtGBxJEWbnf6Zg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__dqtCOYlSniuS9NJGC776w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm__dqtCOYlSniuS9NJGC776w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ke_BzlrsRQ2ntwM4x4z1Iw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ke_BzlrsRQ2ntwM4x4z1Iw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Ten Cybersecurity Risk Factors No One Talks About</span></span></h1></div>
<div data-element-id="elm_cF04ykSASiCzZwRbNm7XyA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cF04ykSASiCzZwRbNm7XyA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><span style="font-size:18px;">These risk factors might not show up on an official risk assessment report, but every security professional should be thinking about them.</span></div></div>
</div><div data-element-id="elm_LYOF6Q7ZYqWpvwSjmdVwMA" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_LYOF6Q7ZYqWpvwSjmdVwMA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/50e3d2464c50b108f5d084609629367b1638d6e3514c704c722d7fd09f4ac35e_1280.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_pWnrF324eYFCTjmuYQpFsA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pWnrF324eYFCTjmuYQpFsA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-weight:700;">By&nbsp;<a rel="author" href="https://www.csoonline.com/author/Roger-A.-Grimes/" id="4fc323b3-5506-43ac-9490-30610eaba998">Roger A. Grimes</a>,&nbsp;<span style="font-weight:normal;">Columnist,&nbsp;</span><span style="font-weight:normal;">CSO</span><span style="font-weight:normal;">&nbsp;</span><span style="font-weight:normal;">|</span><span style="font-weight:normal;">&nbsp;</span><span style="font-weight:normal;">OCT 17, 2019 3:00 AM PDT&nbsp; &nbsp;see the original article at <a href="https://www.csoonline.com/article/3446019/10-risk-factors-no-one-talks-about.html?upd=1572445327584" title="CSOonline.com" target="_blank">CSOonline.com</a></span></p></div>
</div><div data-element-id="elm_YBRIjDK0VpSuhvESMJYsnA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YBRIjDK0VpSuhvESMJYsnA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>The traditional risk management factors you are all taught include the staid process of categorizing potential threats and risks, evaluating their likelihood of occurrence, and estimating the damage that would result from them if not mitigated. The costs of the potential mitigations and controls are measured against the potential damage. Mitigations are put in place if they are cheaper and better to implement than allowing the risks and threats to occur.</div><div><br></div><div>You have all fretted about the difficulty of calculating both the likelihood of an event and its potential damages. They have always been more like a best guess than an insurance actuarial table. How can anyone estimate the chances that a sophisticated ransomware, DDoS or insider attack will occur to their organization in a given year or what assets it might be able to take out with any accuracy? Can anyone prove that likelihood is 20% versus 60% in a given year?</div><p><br></p><div>We all struggle with those large estimation issues, but there are a ton of other factors that impact risk management. Here are ten that are rarely discussed openly.</div><div><br></div></div>
</div><div data-element-id="elm_f_pvM-Ri6QNZWFTEZVeekQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_f_pvM-Ri6QNZWFTEZVeekQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Fighting over “might happen” risk</span></h2></div>
<div data-element-id="elm_r-CLxdHjsLQfoPjzB6VTOg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_r-CLxdHjsLQfoPjzB6VTOg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Every risk assessment is a fight between something that might happen and doing nothing, especially if it hasn’t happened before. Many people believe it’s cheaper to do nothing, and those who fight to do something might be seen as wasting money. “Why waste the money? That’s never going to happen!”</div><p><br></p><div>Few people get in trouble for following the status quo and doing what has always been done. It’s far harder to push to be proactive, especially when large sums of money are involved, than to just wait for the damage to happen and address it then.</div><p><br></p><div>The story I like to use is 9/11 and air travel safety. It’s not like air travel safety experts didn’t already know before 9/11/01 that a hijacker could take over a cockpit using a boxcutter or smuggle explosives onto a plane. These risks had been known for decades. Imagine the public outcry if passengers were made to throw out their water bottles and get full body scans before 9/11 happened. It would have outraged the public and the airlines would have proactively tried to get rid of the security measures.</div><p><br></p><div>After 9/11, we happily take off our shoes, throw away our water bottles, and subject ourselves to full-body scans. Getting real money to fight possible risks is much harder to do than to get the money after the damage has happened. It takes real bravery every time a risk assessor warns about a problem that has never ever happened. They are the unsung heroes.</div><p><br></p></div>
</div><div data-element-id="elm_55de-AifxZ-9DbE1v_aCQg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_55de-AifxZ-9DbE1v_aCQg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Political risk</span></h2></div>
<div data-element-id="elm_bkA7bRIhgPxVHxoZ0s-n8A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bkA7bRIhgPxVHxoZ0s-n8A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Proactive risk-taking leads to the next unknown risk component: political risk. Every time proactive heroes argue for something that never happens, they lose a little bit of their political capital. The only time they win is when the thing they were proactive about happens. If they are successful and convince the company to put controls and mitigations in place so the bad thing never happens, well, it never happens.</span><br></p><p><span style="color:inherit;"><br></span></p><div>It’s a self-defeating prophecy. When they win, no one ever knows because they successfully argued for the controls. So, each time the thing they worried about never happens, they are seen as “crying wolf.” They lose political capital.</div><p><br></p><div>Anyone who has fought one of these risk management battles can tell you they don’t want to take on too many of them. Each one taken burns their reputation a bit (or a lot). So, proactive warriors calculate which battles they want to fight. Over time, seasoned warriors pick fewer battles. They have to. It’s survival of the fittest. Many of them are just waiting for the day when a really bad thing happens that they didn’t fight to prevent hurts the organization and they become scapegoats.</div><div><br></div></div>
</div><div data-element-id="elm_jLJzyJ3WxlPuS2bpZS6gMg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jLJzyJ3WxlPuS2bpZS6gMg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. &quot;We say it’s done, but not really&quot; risk</span></h2></div>
<div data-element-id="elm_o2A0Uvx5yprQZ7iOMutmwg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_o2A0Uvx5yprQZ7iOMutmwg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Many of the controls and mitigations we say we have done aren’t really done…at least not at 100%. Many people in the process understand it’s not really done. The most common examples are patching and backups. Most companies I know say they are 99% to 100% patched. In my over 30-year career of checking on the patch status of millions of devices, I’ve never found one that was truly fully patched. Yet, every company I’ve audited told me they were fully patched or nearly so.</div><p><br></p><div>The same is true of backups. The current ransomware epidemic has laid bare that most organizations don’t do good backups. Despite most organizations and their auditors checking off for years that critical backups are both done and are regularly tested, it just takes one big ransomware hit to show how radically different the truth is.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div>Everyone in risk management knows this. How can a person who is in charge of backups ever test everything when they aren’t given the time and resources to do so? To test if a backup and restore would work, you would have to do a test restore of many different systems, all at once, into a separate environment where it would have to work (even though all the resources are pointing in the original environment). That takes a huge commitment of people, time, and other resources, and most organizations don’t give the responsible person any of that for the task.</div><div><br></div></span></div></div>
</div><div data-element-id="elm_gEdeqIu57iZH30KFuVv9yw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gEdeqIu57iZH30KFuVv9yw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><div>4. Institutionalized risk: “It’s always been done that way”</div></span></h2></div>
<div data-element-id="elm_q-HAFuaP0WjwiEXfY_yZog" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_q-HAFuaP0WjwiEXfY_yZog"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>It’s hard to argue against “that’s the way we’ve always done it,” especially when no attacks against the weakness have occurred for decades. For example, I frequently come across organizations that allow passwords to be six-characters long and never changed. Sometimes it’s that way because the PC network passwords have to be the same as the passwords connecting to some archaic “big iron” system that the company depends on. Everyone might know that six-character, non-changing passwords are not a good idea, but it’s never caused any problems.</div><p><br></p><div>Good luck arguing that everything needs to be upgraded to support longer and more complex passwords, possibly spending millions of dollars, The institutional “wisdom” is against you, and most of those people have been there way longer than you.</div></div>
</div><div data-element-id="elm_587t-wBnYfbPBz7zFQ7Otw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_587t-wBnYfbPBz7zFQ7Otw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Operational interruption risk</span></h2></div>
<div data-element-id="elm_hRujAgSePBurMekPuLZlpw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hRujAgSePBurMekPuLZlpw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Every control and mitigation you implement might cause an operational issue. It might even disrupt operations. You are far more likely to get fired for accidentally disrupting operations than for proactively preventing some theoretical risk. For every control and mitigation that you push, you worry about the potential operational interruption it will cause.</div><p><br></p><div>The more radical the control, the more likely it is to mitigate every bit of the risk of the threat it is fighting, but the more suspicious you are that it can do so without operational interruption. If mitigating risks without causing operational interruption were easy, everyone would be doing it.</div></div>
</div><div data-element-id="elm_7P0Vvpm_iJynjkny6rjQaw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7P0Vvpm_iJynjkny6rjQaw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">6. Employee dissatisfaction risk</span></h2></div>
<div data-element-id="elm_6yDT2RVVGFaZcG4DWQWcoQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6yDT2RVVGFaZcG4DWQWcoQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>No risk manager wants to make employees angry. If you want to do so, implement any control that restricts where they can go on the internet and what they can do on their computer. End users are responsible for 70% to 90% of all malicious data breaches (through phishing and social engineering). You cannot trust end users’ instincts to protect the organization.</div><p><br></p><div>Yet the mere mention of restrictions on what end users can do, such allowing only pre-approved programs to run or restricting where and what they can do on the internet, is met by hostility from most employees. The labor market is tight. Every company is struggling to get good employees, who don’t want to be told they can’t do whatever they want to do on “their” computer. You lock it down too much and they might go work somewhere else.</div><p><br></p></div>
</div><div data-element-id="elm_qPwjmhPTyTxmaho80m2Jjg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qPwjmhPTyTxmaho80m2Jjg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">7. Customer dissatisfaction risk</span></h2></div>
<div data-element-id="elm_j-5BhFKake6jj7TlG2nV9Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_j-5BhFKake6jj7TlG2nV9Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>No one wants to implement a policy or procedure that turns customers off. Upset customers become other companies’ happy customers. For example, credit card companies are far more concerned with accidentally denying a legitimate customer a legitimate transaction than in stopping fraud. They care about fraud, but it’s at a level they feel is long-term sustainable. The subcontractors and companies that make credit card transactions more accurate sell their services to the credit card companies on how well they don’t deny legitimate transactions. Customers wrongly denied twice in a year will use someone else’s credit card.</div><p><br></p><div>It’s also why you don’t need to use a PIN with a chipped card in the US. The rest of the world requires both the chip and a PIN, and this is a more secure option by far. How did it get that way? Because PIN and chip cards came to the US relatively recently, and merchants and customers were just getting used to swiping cards. Requiring people to insert the card so that the chip was read correctly was going to make a small percentage of transactions fail and upset some customers.</div><div><br></div></div>
</div><div data-element-id="elm_ZHKFxHm23knXG-eVHbIf2Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZHKFxHm23knXG-eVHbIf2Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">8. Cutting edge risk</span></h2></div>
<div data-element-id="elm_56YeCbVxAfAg_REt7MP-IQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_56YeCbVxAfAg_REt7MP-IQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>People on the cutting edge often get cut. No one wants to be on the pointy tip of the spear. Early adopters are rarely rewarded for being early. They often become the lessons learned that make it easier for the herd to adopt improved tactics.</div><p><br></p><div><div>Two years ago, the US National Institute of Standards and Technology (NIST) said that its long-standing password policy of requiring long and complex passwords that are frequently changed caused more hacking than it prevented. Its new Digital Identity Guidelines, <a href="https://pages.nist.gov/800-63-3/sp800-63-3.html" title="NIST Special Publication 800-63-3">NIST Special Publication 800-63-3</a>, says passwords can be short, non-complex, and never have forced password changes unless you know the passwords have been compromised. It was a complete 180-degree turn from the previous advice that was accepted as dogma.</div></div><p><br></p><div>Since then, no compliance guideline or regulatory law has been updated to say that following the new advice is recommended or legal. I haven’t seen or heard of any companies moving to the new policies. That’s probably a good thing, because if you changed your policy and got hacked because of it, even if NIST said it was the right thing to do, fingers will be pointed at you asking why you did it. It’s much safer to wait for the herd to move to the new password policies and they are proven right or wrong.</div><div><br></div></div>
</div><div data-element-id="elm_Q4OmtjVhf6Af8C-1UXST2Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Q4OmtjVhf6Af8C-1UXST2Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">9. Time lag risk</span></h2></div>
<div data-element-id="elm_Ku2atl6j3uEQk_Ifo3YK0g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ku2atl6j3uEQk_Ifo3YK0g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">You are almost always fighting some risk that has already happened to other people (or to your organization). You wait to see what tricks the hackers have up their sleeves and then create mitigations and controls to fight those new risks. Having to first wait to see what the hackers are doing makes a time lag from when the new malicious behavior is spotted until you can assess the new technique, think of new controls, and push them out. In a wait-and-see game, you are always behind.</span><br></p><p><span style="color:inherit;"><br></span></p></div>
</div><div data-element-id="elm_Ws5FRi3Zl3u9_WENUkn-qg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ws5FRi3Zl3u9_WENUkn-qg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">10. &quot;Can’t do everything right&quot; risk</span></h2></div>
<div data-element-id="elm_kT0G2-ZkxZuRbpvcS3lobw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kT0G2-ZkxZuRbpvcS3lobw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Last year more than 16,555 new public vulnerabilities were announced. More than 100 million unique malware programs are known. Every type of hacker from nation-states to financial thieves to script kiddies are trying to break into your organization. It’s a lot to worry about. You have no way to defend against it all unless someone gives you an unlimited amount of money, time and resources. The best you can do is guess (see #1 above) what are the most important risks and try to stop them.</div><p><br></p><div>These are not new components of risk assessment. They have always been there, and they are what you are all thinking about when assessing risk and thinking of controls. It all points to the fact that risk assessment and risk management are far harder to do than it seems, especially on paper or from formal theory in a book. When you consider all the things the average computer security person has to worry about and contemplate, it’s amazing that we can actually get it right most of the time.</div><p><br></p><div>Now go out there and continue to fight the good fight!</div><p><br></p></div>
</div><div data-element-id="elm_qOqlUcPPS_qe7aMXc9DtfA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_qOqlUcPPS_qe7aMXc9DtfA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cybersecurity"><span class="zpbutton-content">Learn more about CyberSecurity and Cloud 9 Advisers</span></a></div>
</div><div data-element-id="elm_peamuDvJWBkDV0gwQ-nlSQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_peamuDvJWBkDV0gwQ-nlSQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_qO2_SHxDuHqMbm8K52kyAw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_qO2_SHxDuHqMbm8K52kyAw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="_blank" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers. When it comes to cyber security there is far too much to consider. Cloud 9, together with our distributors, is made up of more than two-hundred and fifty experts, engineers and staff, all devoted to helping you save time and money and make choices easier. Our curated Supplier Portfolio contains nearly two-hundred of the best service provider companies. We are one of the largest buyers of technology in the country. Through us, you’ll get the collective buying power of thousands of other clients. Consider us your professional technology shoppers and babysitters. We are impartial, unbiased, and supplier-neutral. We sit on your side of the table to help you find, evaluate, and negotiate with service provider companies. We’ll help you design the right solution and identify the best technologies. We’ll get pricing from multiple competing companies, then guide you through the evaluation and procurement process. Use our evaluation tools for documentation and due diligence. Plus, have our entire team at your disposal before, during, and after the acquisition of your new services. We'll be by your side for as long as you’re in business.</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span><span style="font-size:11pt;">&nbsp;</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:11pt;"><br></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 30 Oct 2019 10:24:06 -0500</pubDate></item><item><title><![CDATA[China Tops List as Top Risk (duh!)]]></title><link>https://www.cloud9advisers.com/News/post/China-Tops-List-as-Top-Risk</link><description><![CDATA[It probably goes without saying, but China is a major risk for most US business and certainly anyone conduction any sort of business online. Read more and contact Cloud 9 to learn ways to protect your digital assets]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rVgB2_y6QFqaWlc7I3Es5w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fZQ618y0S0yVuwgeACBtZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mvhK6RVoT6WNKbwJ9O62dA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">China Tops List of U.S. Cybersecurity Agency’s Top Risks</span></h2></div>
<div data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:12.6px;">By William Turton |&nbsp;August 23, 2019 - see the full article at <a href="https://www.insurancejournal.com/news/national/2019/08/23/537801.htm?utm_source=Partner%2BAug%2B%2719%2BNewsletter&utm_campaign=Partner%2BNewsletters&utm_medium=email" title="InsuranceJournal.com" target="_blank">InsuranceJournal.com</a></span></span><br></p></div>
</div><div data-element-id="elm_wpQyrPryRuPCab8mdi4FTw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_wpQyrPryRuPCab8mdi4FTw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1501621185719-221c3312e3ba?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_-l1px7zed5YDyx5NhzqrHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-l1px7zed5YDyx5NhzqrHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;">Cybersecurity and Infrastructure Security Agency (CISA), a</span>&nbsp;newly created U.S. cybersecurity agency said Thursday that China represents the greatest strategic risk to the U.S., and as a result, the agency’s top operational priority is reducing the risks from Chinese compromises to the global supply chain, including emerging 5G technology. The statement was part of a report outlining CISA's strategic intent for the next five years. The agency is responsible for protecting America’s critical infrastructure, like election systems and power grids, from hackers and other cybersecurity threats.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div>Besides China, the agency’s other priorities include federal cybersecurity and reducing risks for industrial control systems.&nbsp;<span style="color:inherit;">Christopher Krebs, the agency’s director, said in a speech Thursday that his agency is the nation’s “risk adviser,” which doesn’t have its hands on the keyboards of computer networks but rather seeks to make other agencies and companies do a better job managing risks against cyberattacks.</span></div><div><br></div><div>The priorities reflect the work CISA has already been doing since the agency was established in November 2018, a time during which the Chinese manufacturer Huawei Technologies Co. was blacklisted by the Trump administration amid security concerns and Russian agents were indicted for seeking to manipulate the 2016 presidential election.</div><div><br></div><div>“When we think about Russia, they’re trying to disrupt the system,” Krebs said, at an event at Auburn University in Alabama. “And China is trying to manipulate the system, so that requires us to take different approaches.”</div><div><br></div><div>CISA is currently offering services to election equipment vendors to find potential vulnerabilities in its systems. CISA’s work also includes protecting state and local governments from ransomware attacks, like the one that hit 22 towns in Texas last week. “Ransomware is not going anywhere,” Krebs said. “It’s only getting worse.”</div><br><div><span style="color:inherit;"><p style="margin-bottom:20px;font-size:16px;">CISA sits within the Department of Homeland Security. Krebs, the agency’s first director, joined the DHS in 2017 and was nominated to lead the agency by President Donald Trump in 2018. Before that, he was the Director for Cybersecurity Policy on Microsoft Corp.’s U.S. Government Affairs team.</p></span></div></span></div></div>
</div><div data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Learn how Cloud 9 can help you protect your business</span></a></div>
</div><div data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_2haLWEezyEXAZAWFZIYwGw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_2haLWEezyEXAZAWFZIYwGw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers.&nbsp;</span></span><br></p><p><span style="color:inherit;"><span style="font-size:11pt;"><br></span></span></p><ul><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Time: </span>We manage everything by becoming an extension of your team and do the legwork for you.</span><br></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Money: </span>We save you big by getting the buying power of thousands of other clients.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Confidence: </span>We evaluate and negotiate to get you the best solution, best supplier, and the best price.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Clarity:</span> We find the right companies, distill the information, and clear the clutter.</span></li></ul><div><span style="font-size:11pt;"><br></span></div><div><span style="color:inherit;"><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 08 Oct 2019 04:02:04 -0500</pubDate></item><item><title><![CDATA[5 things keeping Chief Information Security Officers (CISO) up at night...]]></title><link>https://www.cloud9advisers.com/News/post/5-things-keeping-CISOs-up-at-night</link><description><![CDATA[Survey says!&nbsp; 1. The building comes alive (IoT) 2. Cloud gives cover for bad actors 3. Supply chains deliver the good, bad, and ugly 4. Professional ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ocKlu1NORemtUi7TX5a4pg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VPaA8qmGQ9OdgvObuKxrFA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_4TnupbauS1WjUzBnB055YA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_lNiM3LeqQiCyYd21SFr9Zg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="font-size:36px;">Counting Threats: 5 Things that Keep CISOs Up at Night</span><div style="font-size:14px;"><div style="width:442.328px;"></div></div></h2></div>
<div data-element-id="elm_iGv6qCheXLBdsSLbSTBvdg" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.channelfutures.com/mssp-insider/counting-threats-5-things-that-keep-cisos-up-at-night?NL=NL-017&amp;Issue=NL-017_20190109_NL-017_80&amp;sfvc4enews=42&amp;cl=article_1&amp;utm_rid=CPNET000013827234&amp;utm_campaign=9836&amp;utm_medium=email&amp;elq2=c8dd851aeed846a8ac4a1d0440155fbc" target="_blank" title="5 things keeping CISOs up at night - Channel Futures" rel="nofollow"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/losingsleep.jpg" size="original"/></picture></a></figure></div>
</div><div data-element-id="elm_C5DZe-_QQyKW_tzwx3xT7A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;font-size:18px;">Survey says!&nbsp;</p><p style="text-align:left;font-size:18px;">1. The building comes alive (IoT)</p><p style="text-align:left;font-size:18px;">2. Cloud gives cover for bad actors</p><p style="text-align:left;font-size:18px;">3. Supply chains deliver the good, bad, and ugly</p><p style="text-align:left;font-size:18px;">4. Professional Services and 3rd-party weak links</p><p style="text-align:left;font-size:18px;">5. Data growth and alert&nbsp;fatigue&nbsp;</p><p style="text-align:left;font-size:18px;">read more from Pam Baker on <a href="https://www.channelfutures.com/mssp-insider/counting-threats-5-things-that-keep-cisos-up-at-night?NL=NL-017&Issue=NL-017_20190109_NL-017_80&sfvc4enews=42&cl=article_1&utm_rid=CPNET000013827234&utm_campaign=9836&utm_medium=email&elq2=c8dd851aeed846a8ac4a1d0440155fbc" title="Channel Futures.com" target="_blank" rel="nofollow">Channel Futures</a><a href="https://www.channelfutures.com/mssp-insider/counting-threats-5-things-that-keep-cisos-up-at-night?NL=NL-017&Issue=NL-017_20190109_NL-017_80&sfvc4enews=42&cl=article_1&utm_rid=CPNET000013827234&utm_campaign=9836&utm_medium=email&elq2=c8dd851aeed846a8ac4a1d0440155fbc" title="Channel Futures.com" target="_blank" rel="nofollow">.com</a></p><p style="text-align:left;"><span style="color:inherit;"></span></p><div style="text-align:left;"><br></div></div>
</div><div data-element-id="elm_X4GJ-KaITayF-NQXwV4WZQ" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-sm zpbutton-style-roundcorner " href="/engagement" target="_blank" rel="nofollow"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 09 Jan 2019 09:20:19 -0500</pubDate></item><item><title><![CDATA[CyberSecurity Basics]]></title><link>https://www.cloud9advisers.com/News/post/cybersecurity-basics</link><description><![CDATA[The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp; Vulnerability Scannin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ssfqJdnYTPqaI4KdiXha5g==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VuBZ60mUQAW5kxDvBEjbvA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eWNoaWioQjCbE-D3VmBUNw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZXOzB36hQqKKOOp30fMHJw==" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">The Basics of Cyber Security, What&nbsp;<span style="font-style:italic;">every</span>&nbsp;business should do</h2></div>
<div data-element-id="elm_v3UJN5KXS_6VeAJJXXZX_g==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span>The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp;</span></span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Vulnerability Scanning</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Doesn’t actually fix anything, but...</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Shows “bad spots’”</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Good services will show a plan of remediation</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">If subject to compliance (HIPPA, PCI, etc) recurring V.Scans are required </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Do it </span><span style="font-size:11pt;font-style:italic;">at least </span><span style="font-size:11pt;">&nbsp;annually, quarterly is common for many businesses, monthly “managed” services best, but more costly</span></p></li></ul></ul><p style="margin-left:72pt;"><span style="font-size:11pt;">Think of it as a home inspection. </span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Penetration Testing</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Different than a V.Scan but related</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Considered “white-hat” or “ethical” hacking</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Attempts to actually hack into your network</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Should come after a V.Scan and initial remediations steps to test efficacy </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Most Pen Tests will deliver a detailed, lengthy report of findings and remediation suggestions</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Usually done annually. Should at least be done every couple/few years. </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Endpoint Security</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Mobile Security; </span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">increasingly important and often overlooked window in to the network </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">proprietary and cloud apps. </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">corporate or employee owned mobile devices (BYOD) </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Anti-Virus</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Firewall, go with a Next Gen FW (NGFW). Best would be a managed Firewall solution. Depending on your situation also look into a cloud firewall solution.&nbsp;</span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Employee Education</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Email phishing; train employees to recognize bad, phishing emails by using mock emails </span></p></li></ul></ul><p><span style="color:inherit;"><span><br></span></span></p><p><span style="font-size:11pt;">Contact us at </span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">Cloud 9 Advisers</a></span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">. </a>We are impartial, independent, and provider-neutral, consultants of Communications, Collaboration, Connectivity, and Cloud technologies. We guide our clients through the morass of options, solutions, and providers. Sign up for our Consulting &amp; Buying Program and get the real story on CyberSecurity and the best methodology for your business.</span><span style="font-size:11pt;">Find out who the best providers are and who to avoid. Get real-world advice, recommendations, and unbiased solution design.&nbsp;</span></p><p><span style="color:inherit;"><br><span style="font-size:11pt;">Through the Program, you’ll have access to our distributor team of provider-neutral SME-Subject Matter Experts and Services Engineers. We’ll help you get pricing and bids from multiple, competing companies through our distributor portfolio of nearly 200 vetted and approved service providers. Use our evaluation tools to show decision makers the entire process, reasoning, and recommendations and complete due diligence for the project. We’ll help manage the entire procurement process (and keep all those pesky sales-guys off your back!). Visit </span><span style="font-size:11pt;"><a href="/" title="www.Cloud9Advisers.com">www.Cloud9Advisers.com</a></span><span style="font-size:11pt;"> for more information</span></span><br></p></div>
</div><div data-element-id="elm_lPPlgC14BcKXAxO2d18kvg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-sm zpbutton-style-roundcorner " href="/engagement" target="_blank"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 29 Sep 2018 12:27:49 -0500</pubDate></item></channel></rss>