<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/google/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #Google</title><description>Cloud 9 Advisers - News #Google</description><link>https://www.cloud9advisers.com/News/tag/google</link><lastBuildDate>Fri, 27 Feb 2026 19:29:12 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Rethinking Office Tech]]></title><link>https://www.cloud9advisers.com/News/post/rethinking-office-tech</link><description><![CDATA[Slash TCO, repurpose obsolete PCs, and deploy your first line of defense against cyber threats. 5 surprising, field-tested truths prove that smart IT isn't about budget—it's about mindset.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_8jDiCojmQCSMpweynwOP9Q" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_78qnSWVtTZyqnjmRSfBgGQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dDcy6a5uRYaRHssaMmY0ZQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_3fnIGCGOS6G70EBSvOl04w" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-align-center zpheading-align-mobile-center zpheading-align-tablet-center " data-editor="true"><span>Rethinking Your Office Tech: 5 Surprising Truths That Challenge Everything</span></h1></div>
<div data-element-id="elm_IedlHdAhSrqtY0HYIFJj4w" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center zptext-align-mobile-center zptext-align-tablet-center " data-editor="true"><p><span>Stop Bleeding Cash on Outdated Assumptions and Turn Your IT from a Cost Center into a Strategic Advantage</span></p></div>
</div><div data-element-id="elm_SzaeSMjpNZ33Y43hnwzZBQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SzaeSMjpNZ33Y43hnwzZBQ"] .zpimage-container figure img { width: 570px !important ; height: 477px !important ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Two%20roads.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_rWG_2Jat8vzZE8pjCOgWQQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span><span>The true cost of IT often lies beneath the surface of the sticker price.</span></span></p><p><span><span><br/></span></span></p><p><span><span><span><span style="font-style:italic;">About a seven minute read</span></span><br/></span></span></p></div>
</div><div data-element-id="elm_g-xPgcZqxfQm1EQl1Y2Wrg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_dZl08xtyYSUX0gMyXQ8fzg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_Xy_3xteORWp8h5qywo6Whw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Hidden Costs of Business IT</span></h2></div>
<div data-element-id="elm_AY34v0aEiAXcaorqAxCrBg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>For most business owners and IT leaders, Information Technology is a double-edged sword. It’s the essential engine of modern operations, but it often feels like a significant and unpredictable cost center. The common assumptions are pervasive: IT is an expensive but necessary evil, a constant source of security worries, and a complex beast that demands ever-increasing investment to manage and secure.</span></p><p><span><br/></span></p><p><span>But clinging to this conventional wisdom is a strategic failure. The most effective IT leaders today aren’t outspending their competition; they're </span><strong>out-thinking them</strong><span>. In an environment where every dollar and every minute counts, relying on outdated beliefs can quietly drain resources, expose your organization to unnecessary risk, and stifle efficiency.</span></p><p><span><br/></span></p><p><span>This article reveals five surprising, impactful, and counter-intuitive takeaways discovered from a deep dive into one company’s complete technology overhaul. These are not theoretical concepts but practical, </span><strong>field-tested truths</strong><span> that challenge the status quo. Individually, these truths are powerful; together, they form a cohesive strategy for migrating to a unified, secure, and cost-effective Google-based ecosystem. The insights that follow could save you a significant amount of money, simplify your operations, and dramatically reduce your business risk.</span></p></div><p></p></div>
</div><div data-element-id="elm_fOW9NvHEgUvofMuiKdqfAw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>1. Your 'Premium' Tablets Are Costing You a Fortune in Hidden Fees</span></h2></div>
<div data-element-id="elm_g5s5AYyhafQvvJWu5UtHCw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>When it comes to technology, the sticker price is rarely the full story. The concept of </span><strong>Total Cost of Ownership (TCO)</strong><span> reveals that the upfront hardware cost is often just the tip of the iceberg. This is especially true for mobile device fleets, where ongoing subscription fees for management and security can </span><strong>dwarf the initial purchase price</strong><span>.</span></p><p><span><br/></span></p><p><span>For a business that must meet HIPAA compliance, managing a fleet of Apple iPads is a prime example of these hidden costs. To properly secure and manage iPads in a regulated environment, you can’t just buy the hardware. You must also subscribe to a suite of specialized software, including a Mobile Device Management (MDM) platform, additional Apple-specific services, and endpoint security packages. The estimated monthly cost for these required subscriptions is between </span><strong>$11 and $15 per device per month</strong><span>.</span></p><p><span><br/></span></p><p><span>In stark contrast, </span><strong>Android Enterprise Ready (AER) tablets</strong><span> offer a fundamentally different cost structure. For an organization already using Google Workspace, the necessary management and security controls are built directly into the platform. This means the additional ongoing cost to manage a compliant fleet of AER tablets is </span><strong>effectively zero</strong><span>.</span></p><p><span><br/></span></p><p><span>The long-term financial impact is staggering. A 4-year TCO comparison for a fleet of 130 devices tells the whole story: over </span><strong>$149,000 for iPads</strong><span> versus approximately </span><strong>$58,000 for AER tablets</strong><span>. The savings are so profound that it can be cheaper to replace an entire fleet than to continue maintaining the current one. As one analysis noted, &quot;leasing a new Android tablet fleet would likely cost less per month than the required additional subscription fees, alone.&quot; This isn't just about choosing a different brand; it's about rejecting a model of premium hardware that locks you into a parasitic ecosystem of </span><strong>mandatory, recurring fees</strong><span>.</span></p></div><p></p></div>
</div><div data-element-id="elm_XI5TB4tvDxi7S5wbG6C_Jw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>2. That 'Obsolete' PC Fleet Isn't Obsolete—It's an Untapped Asset</span></h2></div>
<div data-element-id="elm_X8i7FLguJpeb69CaOLKjbQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>Most businesses face a familiar, expensive cycle: an aging fleet of computers running an operating system that is about to lose security support. With Windows 10 reaching its End-of-Life in October 2025, the default solution for many will be a costly and disruptive hardware refresh, replacing every machine.</span></p><p><span><br/></span></p><p><span>But what if that &quot;obsolete&quot; hardware wasn't a liability to be disposed of, but an </span><strong>asset waiting to be repurposed</strong><span>? An alternative, cost-effective strategy exists: converting compatible existing Windows machines to </span><strong>ChromeOS Flex</strong><span>.</span></p><p><span><br/></span></p><p><span>Again, in a Google Workspace environment especially, this approach offers a powerful trifecta of benefits, directly answering key business needs:</span></p><ul><li><p><strong>Drastic Cost Savings (Improve ROI):</strong><span> It reuses existing hardware, making the conversion cost </span><strong>&quot;Effectively $0&quot;</strong><span> per converted device. This eliminates a massive capital expenditure and extends the useful life of your current investments.</span></p></li><li><p><strong>Enhanced Security (Reduce Risk):</strong><span> It transforms older, at-risk Windows devices into secure, modern endpoints. ChromeOS is built with security at its core, featuring sandboxing, automatic updates, and verified boot to protect against modern threats.</span></p></li><li><p><strong>Simplified Management:</strong><span> ChromeOS Flex devices can be centrally managed through the Google Workspace Admin Console, dramatically reducing the burden on IT staff.</span></p></li></ul><p><span>This strategy is a game-changer for any business looking to maximize its hardware investments. Instead of a mandatory, budget-breaking refresh, you can simultaneously improve your security posture and delay a major capital outlay for years. This strategy decouples the hardware's physical viability from the software's planned obsolescence, turning a recurring capital crisis into a long-term, manageable asset.</span></p><p><span><br/></span></p><blockquote><p><span>These first two strategies—migrating tablets to Android and converting PCs to ChromeOS—are not isolated tactics but two halves of a single, powerful move to </span><strong>consolidate device management within the Google ecosystem, slashing both costs and complexity</strong><span>.</span></p></blockquote></div><p></p></div>
</div><div data-element-id="elm_3k0P6UhsswMFI4E5bUvQFg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>3. Your Biggest Security Risk Isn't a Super-Hacker; It's an Untrained Employee</span></h2></div>
<div data-element-id="elm_6_PvCgtLKq3iBnr6_uK8nA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>Businesses spend fortunes on firewalls, sophisticated security software, and complex network infrastructure to defend against cyber threats. Yet, the data reveals a starkly different reality about where the true vulnerability lies. Studies indicate that 70% to 90% of all data breaches start with a phishing email, and research shows that up to three-quarters of all breaches succeed due to the human element, combining both unintentional employee errors and successful malicious attacks like phishing that rely on an employee's click. The biggest threat isn't a shadowy super-hacker; it's a </span><strong>well-meaning employee clicking a single bad link</strong><span>.</span></p><p><span><br/></span></p><p><span>While technical defenses are crucial, they can be rendered useless by one moment of human error. This is why the most effective and affordable solution is often (and unfortunately) the most overlooked: </span><strong>Security Awareness Training (SAT)</strong><span>.</span></p><p><span><br/></span></p><p><span>For a surprisingly low cost—typically between </span><strong>$1 to $5 per user per month</strong><span>—an organization can transform its greatest liability into its first and most effective line of defense. A quality SAT program goes beyond simple lectures. It provides engaging, recurring training and, most importantly, includes </span><strong>phishing simulations</strong><span>. These controlled, simulated attacks test employees' resilience in a real-world context, helping them recognize and report threats before they can do damage.</span></p><p><span><br/></span></p><p><span>When you consider the potential cost of a data breach, investing in SAT is perhaps the </span><strong>highest-return investment</strong><span> a business can make in its cybersecurity. It's a simple, affordable strategy that directly addresses the root cause of the vast majority of security incidents.</span></p></div><p></p></div>
</div><div data-element-id="elm_-B21OQQCCUXZlCkYr0xPYQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>4. 'Enterprise-Grade' Isn't Always the Smartest Grade</span></h2></div>
<div data-element-id="elm_w20lgjtqOAH1KFLjrJuTIg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>n the world of IT, it's easy to assume that &quot;enterprise-grade&quot; means &quot;best.&quot; But the smartest strategy isn’t about buying the most expensive, highest-tier solution available; it’s about finding the </span><strong>right solution</strong><span> that affordably meets your organization's specific security and operational needs.</span></p><p><span><br/></span></p><p><span>Consider a behavioral and mental healthcare company that needed a compliant, business-class network across all 23 of its clinics. Their existing solution was comprised of well-known, high-end, robust network hardware, professionally managed, and was set to be the standard to expand to all the clinics. However, scaling it to all sites was going to be cost-prohibitive. Projections showed that expanding the current standard to all sites would reach approximately </span><strong>$9,000 in monthly recurring costs</strong><span>. In all fairness, that cost did include an OPEX / lease model for all the gear, too. As the company's own analysis stated, these &quot;costs are too great to deploy to all locations as required by HIPAA&quot;.</span></p><p><span><br/></span></p><p><span>The strategic pivot was to standardize on solid </span><strong>&quot;middle ground&quot;</strong><span>. The selected platform, well known for its affordability, simplicity, and ubiquity in the market, provides a full suite of networking options, delivers the essential security, robust performance, and simplified central management of the entire network stack, from gateway to APs. All the necessities required for a compliant healthcare environment, but without the extreme costs of high-end, best-of-breed, enterprise hardware and the high-end management services that go with it. The results were dramatic. The new, fully managed solution for all 23 sites was estimated to cost between </span><strong>$3,000 to $4,200 per month</strong><span>—less than half the projected cost of the previous model.</span></p><p><span><br/></span></p><p><span>This is a powerful lesson in </span><strong>right-sizing</strong><span>. The goal is to find the sweet spot where affordability, functionality, and compliance intersect. The lesson is that true 'business-class' performance is not defined by the price tag or brand prestige, but by its ability to </span><strong>affordably and reliably meet 100% of your compliance and operational requirements</strong><span>.</span></p></div><p></p></div>
</div><div data-element-id="elm_G09O8WGDKUIeV-GOvK3q1Q" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>5. That Camera on the Wall? It Might Be a Lifeline, Not Just a Security Guard</span></h2></div>
<div data-element-id="elm__ed5JHwa_JRkWPQi_bU1vg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>When you see a camera in an office, what comes to mind? For most, the answer is security, surveillance, or loss prevention. While these are valid use cases, and likely the most common, they only scratch the surface of what’s possible when technology is applied with </span><strong>creativity and purpose</strong><span>.</span></p><p><span><br/></span></p><p><span>A powerful, real-world example of this comes from a mental healtcare provider of Applied Behavior Analysis (ABA) therapy for individuals with autism. Across their clinics, they have deployed nearly 140 IP cameras. But these cameras are not for traditional surveillance; they are a </span><strong>mission-critical tool for clinical observation</strong><span>.</span></p><p><span><br/></span></p><p><span>This system allows their clinical specialists to remotely monitor therapy sessions and collaborate with onsite staff to adjust treatment strategies in real-time. What might be a simple security tool in one business has become an indispensable part of </span><strong>enhancing </strong><em><strong>and legitimately scaling</strong></em><strong> the quality of care</strong><span> in another. It’s a lifeline for communication and collaboration that directly impacts patient outcomes.</span></p><p><span><br/></span></p><p><span>This is an important takeaway for any business leader. It challenges us to </span><strong>think beyond the obvious</strong><span> and ask how the technology we already have—or can easily acquire—could be used to support our core mission. A simple tool, when applied with vision, can become a cornerstone of an organization's success.</span></p></div><p></p></div>
</div><div data-element-id="elm_2qdqpNm7WfI6r7RvfEiwoQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span><span>The Smartest IT Isn't About Spending More—It's About Thinking Differently</span></span></h2></div>
<div data-element-id="elm_bJ66uyASH5CeLwynlVMDFA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><p><span>The five truths revealed here share a powerful, unifying theme: a modern IT strategy is not a function of budget, but of </span><strong>mindset</strong><span>. It demands a shift away from defaulting to the “best in the business” hardware and toward challenging assumptions, hunting for hidden costs, empowering people, and deploying precisely the right solution for the job - “the best </span><em>for your</em><span> business”. By adopting this mindset, you can transform your IT from a costly burden into a strategic advantage that drives efficiency, reduces risk, and supports your core mission.</span></p><p><span><br/></span></p><p><span>As you move forward, ask yourself this one critical question: Which of these common IT 'truths' is your business still following, and what is the </span><strong>real cost of not challenging it</strong><span>?</span></p></div><p></p></div>
</div><div data-element-id="elm_yzwXo8123yIJU83WjpsjuQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_yzwXo8123yIJU83WjpsjuQ"] div.zpspacer { height:222px; } @media (max-width: 768px) { div[data-element-id="elm_yzwXo8123yIJU83WjpsjuQ"] div.zpspacer { height:calc(222px / 3); } } </style><div class="zpspacer " data-height="222"></div>
</div></div><div data-element-id="elm_jJjaxxOs94oM99RGC2dr8w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_vifbKNn9SSGq12ps_uhSvw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="javascript:;" target="_blank"><span class="zpbutton-content">What does this button do?</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 06 Oct 2025 17:35:38 -0500</pubDate></item><item><title><![CDATA[Google: an alternative]]></title><link>https://www.cloud9advisers.com/News/post/Google-an-alternative</link><description><![CDATA[Microsoft faces scrutiny after scathing report from DHS. Google says they have the answer.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_u-QY0OelTWGp4Es5KyYmFw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ovuYVeo1TOuWDC5fcZ48Ng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_c2y0JAAyTLerfOTvl5YgPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Google Raises Concern's about Microsoft Security: New Whitepaper shows</h1></div>
<div data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>The Department of Homeland Security’s Cyber Safety Review Board (CSRB) found that repeated security breaches against the federal government were due to a cascade of security failures at Microsoft, as well as a corporate culture that deprioritized cybersecurity.&nbsp;<br>Google proposes a safer alternative.</div></div></div>
</div><div data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width: 500px ; height: 644.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } @media (max-width: 767px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/Google-alternative.png" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Google-alternative.png" width="500" height="644.19" loading="lazy" size="medium"/></picture></a></figure></div>
</div><div data-element-id="elm_h357TC0quc1SuRJpz_me8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h357TC0quc1SuRJpz_me8w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-style:italic;"><a href="/Google-alternative.png" target="_blank" rel="" download="">View and download Google's whitepaper</a></span></p></div>
</div><div data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;">Following several high-profile cybersecurity incidents, Microsoft faces scrutiny. Google's new white paper, &quot;A More Secure Alternative,&quot; highlights its own security practices while referencing a Department of Homeland Security's Cyber Safety Review Board (CSRB) report that identified security failures and poor cybersecurity culture and focus within Microsoft. This report may influence customer decisions: Google or Microsoft?</span><br></div></div>
</div><div data-element-id="elm_56cGU861fzF3e56LbX-Khw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_56cGU861fzF3e56LbX-Khw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Scathing report from DHS</span></h2></div>
<div data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Microsoft's security vulnerabilities reached a critical point recently, exposing U.S. and U.K. government customers in a series of high-profile attacks. Notably, a 2023 incident by Storm-0558 compromised sensitive government accounts across 22 organizations, impacting over 500 individuals and tens of thousands of emails. This breach triggered a scathing report from the Department of Homeland Security's Cyber Safety Review Board (CSRB). The report exposed a chain reaction of security failures and a corporate culture that downplayed both enterprise security investments and rigorous risk management.</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Further amplifying concerns, a separate high-profile incident involved state-backed cyber actors known as Midnight Blizzard. This group successfully compromised Microsoft corporate email accounts, enabling them to steal email exchanges between Federal Civilian Executive Branch (FCEB) agencies and Microsoft. This critical breach prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue Emergency Directive ED 24-02.</span><span style="color:inherit;"><br></span></p></div>
</div><div data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What is the real target?</h2></div>
<div data-element-id="elm_cMJALKBXRETg9ykTfXr-fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cMJALKBXRETg9ykTfXr-fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It's pretty obvious now that government agencies are a prime target for cyberattacks due to their sensitive data and many other factors. Most agencies heavily rely on Microsoft products.&nbsp;</span><span style="color:inherit;">In a 2022 Google survey, 84% of all Washington, D.C. metro area employees use Microsoft products. Furthermore a broader survey from Omdia found 85% of all federal government employees use Microsoft.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Google Workspace has sizable market share in the business, education, and healthcare sectors -&nbsp;</span><span style="color:inherit;">largely due to its ease of use, simple and intuitive interface, comprehensive billing, and most importantly advanced cybersecurity protections built-in.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Does that mean bad actors are targeting customers of Microsoft or going after specific targets of interest? That remains to be seen but likely a little of both. If the target is interesting enough it doesn't matter what platform or systems are used.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Another important question might be: if the tables were turned, Google happened to have higher market share in government, would the &quot;scathing report&quot; be about them? Of course Google doesn't think so.&nbsp;</span></p></div>
</div><div data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Things to consider</h2></div>
<div data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>No one is suggesting you haul off and switch you entire business or government agency from Microsoft to Google (oh, wait... no, that is exactly what Google is hoping for!) but, it might be a good opportunity for a deeper inspection and even a thorough evaluation/comparison of the two. At the least to see what the other has to offer. At least the whitepaper is compelling enough for customers to probe for more.&nbsp;</p><p><br></p><p>Considering such a decision is so big and impactful for everyone involved, consider outside help. A technology adviser or IT consultant can guide you through the process and introduce you to the right experts and partners.&nbsp;</p></div>
</div><div data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Not all is lost</h2></div>
<div data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Google is certainly an option, and a pretty good one at that. Microsoft has made announcements addressing some of the concerns outlined in the report. They are making efforts to change the behavior and culture within Microsoft ranks. A recent Dark Reading article reports that a</span><span style="color:inherit;">t least a portion of executive compensation will be tied to meeting security goals.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Our advice always has been and remains: get the right partner in place. Having the right Microsoft&nbsp;<span style="font-style:italic;font-weight:bold;">or</span>&nbsp;Google partner will have profound impact on your experience with either platform. Consider Cloud 9 your partner finder! That's all we do - connect our clients with the right partners, vendors, suppliers and service providers for Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 Jun 2024 16:13:10 -0500</pubDate></item><item><title><![CDATA[WTH Microsoft?]]></title><link>https://www.cloud9advisers.com/News/post/WTH-Microsoft</link><description><![CDATA[We're all used to having Windows updates being a complete crap show, but Outlook? Office!? What's going on here?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_0BuGeouBQSGywpaWcJtp4A" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_x4zBPO2YR3-wTji2WX1jVw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_7k5WV8bOTquNXWw79Q88iA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_2Ws1ux0uTU673-BFyp8ZEA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2Ws1ux0uTU673-BFyp8ZEA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">WTH is happening with Office 365?</span></h2></div>
<div data-element-id="elm_OIUjRxB1RnSJqEATC0iX-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OIUjRxB1RnSJqEATC0iX-g"].zpelem-text { border-radius:1px; margin-inline-end:50px; margin-inline-start:50px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Okay, so Windows 10 updates have had issues, shall we say, for years. But, really, Microsoft, you're going to roll out the same kinds of problems for your services now, too?</span><br></p></div>
</div><div data-element-id="elm_rjkCyXmume62qcK38DhQ3Q" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_rjkCyXmume62qcK38DhQ3Q"].zprow{ border-radius:1px; } </style><div data-element-id="elm_YlIbYs0gVlppSCrH2X3HcA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_YlIbYs0gVlppSCrH2X3HcA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nXf6MQX-HUYCt_uwiXGcOQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_nXf6MQX-HUYCt_uwiXGcOQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/55e0dd464d53ae14f6da8c7dda79367f103cd9ed55536c48732f78d79e49c15fbe_1280.jpg" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_tK2qODghPDA1-Yx-qa2xbw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_tK2qODghPDA1-Yx-qa2xbw"].zprow{ border-radius:1px; } </style><div data-element-id="elm_h1FV4vQHqXxBRXYUAYXb0w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_h1FV4vQHqXxBRXYUAYXb0w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_nAzuIqZ--Mw38DzfPq0HmQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nAzuIqZ--Mw38DzfPq0HmQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div> By Steven J. Vaughan-Nichols </div>
<p>from our friends at&nbsp;<a href="https://www.computerworld.com/article/3584446/wth-is-happening-with-office-365.html?upd=1603394007850" title="Computerworld, original article" target="_blank" rel="">Computerworld</a>&nbsp; &nbsp;<br></p></div>
</div><div data-element-id="elm_2NjkMatBVKlkBFrxF0UyHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2NjkMatBVKlkBFrxF0UyHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:16px;">I'm used to having Windows updates being a complete crap show, but Outlook? Office!? What's going on here?</p><p style="margin-bottom:16px;">Every few months I take a swing at yet another&nbsp;<a href="https://www.computerworld.com/article/3532092/come-on-microsoft-is-it-really-that-hard-to-update-windows-10-right.html">disastrous Windows update</a>&nbsp;or&nbsp;<a href="https://www.computerworld.com/article/3406846/wtf-microsoft.html">patch</a>. I really don't want to. But, darn it, when it comes to fixing Windows 10 or adding a new feature, Microsoft is the gang that can't shoot straight. Until recently, I thought it was doing a great job with Software-as-a-Service (SaaS) offerings such as Office 365 and Outlook.</p><p style="margin-bottom:16px;">So much for that idea.</p><p><span style="color:inherit;"></span></p><p style="margin-bottom:16px;">Starting last June, Microsoft's services plunged downhill. First,&nbsp;<a href="https://www.computerworld.com/article/3567355/outlook-woes-i-have-no-email-and-i-must-scream.html">Outlook just stopped working</a>&nbsp;for many users. Then, in July,&nbsp;<a href="https://www.computerworld.com/article/3567096/outlook-went-down-for-four-hours-wednesday-what-happened.html">all Outlook clients and services came to an abrupt halt</a>.</p><p style="margin-bottom:16px;">Come on, Microsoft. This is e-mail 101. How hard can it be? If I could do it back in the 1980s when I was a NASA e-mail administrator, when connecting disparate e-mail systems was equal parts hacking and black magic, you can certainly keep fundamental e-mail clients running in the ‘20s.</p><p style="margin-bottom:16px;">At least, I thought you could. I mean, while Outlook is my least favorite e-mail client (<a href="https://wiki.gnome.org/Apps/Evolution" rel="nofollow">Evolution</a>&nbsp;on Linux happens to be my fave), you've only had, what, 23 years since you released it as part of Exchange Server 5 in 1997 to get it right?</p><p style="margin-bottom:16px;"><span style="color:inherit;"></span></p><p style="margin-bottom:16px;">I mean, sure, there are weird corner cases where things can go wrong, but this is your e-mail system coming to a smoking collapse. How can you keep blundering like this?</p><p style="margin-bottom:16px;"><span style="color:inherit;"><a href="https://www.csoonline.com/article/3585389/reduce-complexity-with-a-built-in-platform-experience.html" rel="nofollow" target="_blank"></a></span></p><p style="margin-bottom:16px;">But as it turned out, there was worse -- far worse--to come. Microsoft and all its Office 365 and Outlook users got a nasty September surprise.</p><p style="margin-bottom:16px;">Starting on Sept. 28 and lasting through the next day, Microsoft users around the world found they couldn't sign into Microsoft and other programs that use Azure Active Directory (Azure AD) for authentication. Can you say, &quot;Whoops?&quot; Sure, you can. Can you repeat all the other things users had to say about this revolting development? You can, but this is a PG-rated publication.</p><p style="margin-bottom:16px;">Microsoft quickly figured out what was wrong--a beta service update made it into Azure AD backend services, and everything went haywire. So, the company &quot;fixed&quot; it using an automated rollback…, which failed. Six hours later, the services were finally up again.</p><p style="margin-bottom:16px;">But wait, there’s more. This was followed by yet another Exchange/Outlook issue, which knocked out European and Indian Office 365/Microsoft 365 customers. By now, you'd think Microsoft would have a handle on what was what.</p><p style="margin-bottom:16px;"><span style="color:inherit;"></span></p><p style="margin-bottom:16px;">Nope.</p><p style="margin-bottom:16px;">On Oct. 7,&nbsp;<a href="https://www.zdnet.com/article/microsoft-office-365-outlook-down-again/" target="_blank">Microsoft once more saw its services go crashing down</a>. This time, it was Microsoft's Office 365 services and Outlook users throughout the U.S. For this go-around, the trouble lingered through the next day.</p><p style="margin-bottom:16px;">What happened? Microsoft said this time that if customers were using resources that operated between regions on Azure network infrastructure they would run into these problems. How do you know, when using Office 365, whether you're working on, say, a document residing in a US East availability zone, while your application's running in on Pacific time?</p><p style="margin-bottom:16px;">Short answer: You don't.</p><p style="margin-bottom:16px;">This time the problem was a “deliberate change (that) was applied to [Wide Area Networking] WAN resources causing connectivity latency or failures between regions.&quot; To fix it, the Azure team rolled things back to a healthy configuration. This time, thank God for small miracles, it worked.</p><p style="margin-bottom:16px;">The common theme here is one I keep harping on in when writing about Windows 10's woes. Microsoft isn't doing enough work to make sure its fixes and upgrades don't break systems. Quality assurance needs to be job one.</p><p style="margin-bottom:16px;">Microsoft had been doing better at the cloud. As I've said before, the cloud, not the Windows desktop, is where it’ll be making money in the years to come. If it can get its &nbsp;act together again.</p><p style="margin-bottom:16px;">Microsoft’s corporate vice president of the Enterprise Client &amp; Mobility (ECM) team, Brad Anderson, recently said: &nbsp;&quot;You think about what enterprises commercial organizations use to collaborate and to be productive. It’s Office 365,&nbsp;<a href="https://www.computerworld.com/article/3584350/microsofts-brad-anderson-on-apple-in-the-enterprise.html">Microsoft 365 that is the language of business.</a>“</p><p style="margin-bottom:16px;"><span style="color:inherit;"></span></p><p style="margin-bottom:16px;">That's all nice and good to hear. But if your users can't count on getting their work done, the only language Microsoft will hear, as customers flee to&nbsp;<a href="https://www.computerworld.com/article/3584835/g-suite-is-now-workspace-as-google-adds-pricing-tier-feature-updates.html">Google Workplace</a>, is a string of obscenities.</p></div>
</div></div><div data-element-id="elm_x8kVdXrR1l77temVdQAM3w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_x8kVdXrR1l77temVdQAM3w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_DGSqh5aIEYA-UrTJPHncHA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_DGSqh5aIEYA-UrTJPHncHA"] div.zpspacer { height:201px; } @media (max-width: 768px) { div[data-element-id="elm_DGSqh5aIEYA-UrTJPHncHA"] div.zpspacer { height:calc(201px / 3); } } </style><div class="zpspacer " data-height="201"></div>
</div><div data-element-id="elm_rY1-hnfNvTGRy9bDOTeCKA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_rY1-hnfNvTGRy9bDOTeCKA"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin-block-start:157px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t.png" size="small" data-lightbox="true" style="width:1600px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p style="text-align:center;">Strategic Partners. Technology Advisers.</p><p><br></p><p>Cloud 9 provides Vendor Selection &amp; Management services. We don't sell anything and we don't charge our clients. Our <a href="/suppliers" title="Supplier Portfolio" target="_blank" rel="">Supplier Portfolio</a> has over 250 technology vendors, suppliers, and service provider companies with solutions covering every facet of <a href="/solutions" title="Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;" target="_blank" rel="">Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;</a></p></div>
</div></div><div data-element-id="elm_zIg1yMYkGcb2ZvCnSaWrMw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_zIg1yMYkGcb2ZvCnSaWrMw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" rel="noreferrer noopener"><span class="zpbutton-content">Book an appointment with your Strategic Adviser now!</span></a></div>
</div></div></div><div data-element-id="elm_k1-rEttQkmcyQ7nhJLtvQA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_k1-rEttQkmcyQ7nhJLtvQA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_v6lm_N-eW7Gl-15XVTYK-Q" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_v6lm_N-eW7Gl-15XVTYK-Q"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t.png" size="small" alt="Cloud 9 Advisers" data-lightbox="true" style="height:76px;width:152px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Microsoft is still the de facto standard, but if you need professional help, Cloud 9 is here to help find you the perfect Microsoft partner. Or, if you're fed up with the regular outages and loss of productivity to your staff, we can help you find the right partner to make the &quot;big switch&quot; (it's a lot easier than you may think).&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Cloud 9 provides Vendor Selection and Vendor Management services. We don't sell anything and we don't charge our clients. Our&nbsp;<a href="https://sitebuilder-662896043.zohositescontent.com/suppliers" target="_blank" rel="">Supplier Portfolio</a>&nbsp;has over 250 technology vendors, suppliers, and service provider companies with solutions covering every facet of Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_LXyF700CpuEAK1nJ82NnVg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_LXyF700CpuEAK1nJ82NnVg"].zpelem-button{ border-radius:1px; margin-block-start:47px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="https://appts.cloud9advisers.com/#/customer/booknow" target="_blank" rel="noreferrer noopener"><span class="zpbutton-content">Book an appointment with your Strategic Adviser now!</span></a></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 22 Oct 2020 14:57:31 -0500</pubDate></item></channel></rss>