Redefining Connectivity in the Digital Age

02/07/2025 1:17 PM By Chuck F - Comment(s)
Explores how our Advanced Networking practice led 2024 transformation with customer-centric advanced solutions. AI, ML, and cybersecurity integrated with SD-WAN and SASE optimized networks, meeting evolving business needs.

Google: an alternative

06/17/2024 4:13 PM By Chuck F - Comment(s)
Microsoft faces scrutiny after scathing report from DHS. Google says they have the answer.

Key security Concepts, 1

05/13/2024 5:42 AM By Chuck F - Comment(s)
A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.  Key concepts for Cybersecurity is starting with a framework. There are plenty of pre-built frameworks available to guide you based on your industry,...

How to truly go Passwordless

04/26/2024 5:08 PM By Chuck F - Comment(s)
Patented AI technology provides the strongest end-to-end identity verification authentication and continuous risk management for human and machine identities

Gone Phishin'

12/04/2023 11:53 AM By Chuck F - Comment(s)
How do you make sure they get it? Any Security Awareness Training (SAT) program worth it's salt should have phishing simulation built it. This article breaks down the benefits, from measuring your employees' security awareness to creating a robust culture of security within your organization

The new SATs

11/03/2023 3:20 PM By Chuck F - Comment(s)
A well orchestrated Security Awareness Training (SAT) program for every single person in your company is perhaps the single most important cybersecurity tool, feature, element, solution, or service one could implement.

Remediation vs. Response

10/26/2023 8:50 AM By Chuck F - Comment(s)
There is an important and distinct difference between response and remediation. As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!

EDR, XDR, and MDR

10/17/2023 5:49 PM By Chuck F - Comment(s)
Back in the old days the name of the cybersecurity game was prevention - if you had a strong perimeter, then you're good! That thought process has shifted rather dramatically, because we know they'll get it regardless.

SD-WAN and SASE

06/15/2023 9:40 AM By Chuck F - Comment(s)
SDWAN, SASE, cybersecurity, dual-link aggregation... There is so much to try to keep straight. Cloud 9 boils it down in simple terms. Learn more about why these "techs" might be right for your business.

Under Constant Attack

07/21/2021 2:59 PM By Chuck F - Comment(s)
Most companies only have basic firewall protection, generally hardware-based and maybe a few others may conduct regular scans of their environment. Really no different than your home having a basic lock and maybe a deadbolt.

Prevent Ransomware with MFA

07/14/2021 9:55 AM By Chuck F - Comment(s)
Ransomware sucks. Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Let your IT team focus on driving business objectives, instead of solving end-user identity needs and issues.

Never Trust and Always Verify

03/16/2021 5:11 PM By Chuck F - Comment(s)
Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something.

New WFH Workforce protections

02/12/2021 12:20 PM By Chuck F - Comment(s)
There may be some light at the end of this pandemic tunnel… Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.

ALERT: SolarWinds & FireEye

12/28/2020 12:23 PM By Chuck F - Comment(s)
Unfortunately, Cyber Attacks don’t take time off to celebrate with family and friends. Are you concerned your business has been affected by the SolarWinds hack? If so, get help right away.

Wuhan Virus Phishing Attacks

04/15/2020 7:51 PM By Chuck F - Comment(s)
I just got an e-mail from the WHO asking for a donation to help fight coronavirus. It looked good. It sounded good. It was a fake. Asking for a donation in Bitcoin set off my alarm. We may get sick, but phishing, the art of conning people via email or texts, is as healthy as ever.

Supplier Spotlight: Vigilant Technology Solutions

02/19/2020 12:13 PM By Chuck F - Comment(s)
Contact Cloud 9 to learn how Vigilant helps avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!

Supplier Spotlight: Vigilant

02/19/2020 12:11 PM By Chuck F - Comment(s)
Contact Cloud 9 to learn how Vigilant helps avoid catastrophe by giving you full network visibility to see threats 98-days sooner than the industry average!

Supplier Spotlight: Aryaka

02/12/2020 12:20 PM By Chuck F - Comment(s)
Today, most organizations are concluding that SD-WAN is the best way to add the controls necessary for the digital age. But, do you build your own SD-WAN or buy it as a managed service?

Supplier Spotlight: CloudGenix

02/11/2020 9:45 AM By Chuck F - Comment(s)
An ESG survey of 600 senior IT decision makers showing that 76% of respondents had already deployed multi-cloud environments, and as many as 67% were already using SaaS-delivered business applications. How do you keep it secure?

Supplier Spotlight: Open Systems

02/10/2020 5:07 PM By Chuck F - Comment(s)
Enterprise WAN and security doesn’t have to devolve into an impossible game of Whac-a-Mole. SASE services can help. Strategically framed and tactically applied, they can restore a sense of order. Contact Cloud 9 to learn more about Open Systems.
Next

Tags