<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/ids/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #IDS</title><description>Cloud 9 Advisers - News #IDS</description><link>https://www.cloud9advisers.com/News/tag/ids</link><lastBuildDate>Fri, 27 Feb 2026 13:59:47 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[CyberSecurity Basics]]></title><link>https://www.cloud9advisers.com/News/post/cybersecurity-basics</link><description><![CDATA[The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp; Vulnerability Scannin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ssfqJdnYTPqaI4KdiXha5g==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VuBZ60mUQAW5kxDvBEjbvA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eWNoaWioQjCbE-D3VmBUNw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZXOzB36hQqKKOOp30fMHJw==" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">The Basics of Cyber Security, What&nbsp;<span style="font-style:italic;">every</span>&nbsp;business should do</h2></div>
<div data-element-id="elm_v3UJN5KXS_6VeAJJXXZX_g==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span>The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp;</span></span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Vulnerability Scanning</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Doesn’t actually fix anything, but...</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Shows “bad spots’”</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Good services will show a plan of remediation</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">If subject to compliance (HIPPA, PCI, etc) recurring V.Scans are required </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Do it </span><span style="font-size:11pt;font-style:italic;">at least </span><span style="font-size:11pt;">&nbsp;annually, quarterly is common for many businesses, monthly “managed” services best, but more costly</span></p></li></ul></ul><p style="margin-left:72pt;"><span style="font-size:11pt;">Think of it as a home inspection. </span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Penetration Testing</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Different than a V.Scan but related</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Considered “white-hat” or “ethical” hacking</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Attempts to actually hack into your network</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Should come after a V.Scan and initial remediations steps to test efficacy </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Most Pen Tests will deliver a detailed, lengthy report of findings and remediation suggestions</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Usually done annually. Should at least be done every couple/few years. </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Endpoint Security</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Mobile Security; </span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">increasingly important and often overlooked window in to the network </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">proprietary and cloud apps. </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">corporate or employee owned mobile devices (BYOD) </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Anti-Virus</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Firewall, go with a Next Gen FW (NGFW). Best would be a managed Firewall solution. Depending on your situation also look into a cloud firewall solution.&nbsp;</span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Employee Education</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Email phishing; train employees to recognize bad, phishing emails by using mock emails </span></p></li></ul></ul><p><span style="color:inherit;"><span><br></span></span></p><p><span style="font-size:11pt;">Contact us at </span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">Cloud 9 Advisers</a></span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">. </a>We are impartial, independent, and provider-neutral, consultants of Communications, Collaboration, Connectivity, and Cloud technologies. We guide our clients through the morass of options, solutions, and providers. Sign up for our Consulting &amp; Buying Program and get the real story on CyberSecurity and the best methodology for your business.</span><span style="font-size:11pt;">Find out who the best providers are and who to avoid. Get real-world advice, recommendations, and unbiased solution design.&nbsp;</span></p><p><span style="color:inherit;"><br><span style="font-size:11pt;">Through the Program, you’ll have access to our distributor team of provider-neutral SME-Subject Matter Experts and Services Engineers. We’ll help you get pricing and bids from multiple, competing companies through our distributor portfolio of nearly 200 vetted and approved service providers. Use our evaluation tools to show decision makers the entire process, reasoning, and recommendations and complete due diligence for the project. We’ll help manage the entire procurement process (and keep all those pesky sales-guys off your back!). Visit </span><span style="font-size:11pt;"><a href="/" title="www.Cloud9Advisers.com">www.Cloud9Advisers.com</a></span><span style="font-size:11pt;"> for more information</span></span><br></p></div>
</div><div data-element-id="elm_lPPlgC14BcKXAxO2d18kvg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-sm zpbutton-style-roundcorner " href="/engagement" target="_blank"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 29 Sep 2018 12:27:49 -0500</pubDate></item><item><title><![CDATA[Cyber Security - What is the cost?]]></title><link>https://www.cloud9advisers.com/News/post/cyber-security-what-is-the-cost</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/files/image- work in real world 2.jpg"/>what is the real cost of a cybersecurity breach? Are you too small to worry about these things? Are you willing to bet your business on your Firewall and the IT group managing it?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QBHuJXfaSU2N6lTO3DKwDA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1_7v-2uRT0GJrVBMqCKTbA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_30He43UiQkCeS2yxIdDPSw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_w0U9xwvbR8G5HlhF7Y6EJQ==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>The costs associated with security breaches are going up, jumping 29 percent in recent years to more than $4 million per incident, according to Ponemon’s annual bench marking report. In addition, when it comes to the impacts of breaches – such as cost per record lost – Ponemon says the gap is widening between organizations that are unprepared and those that have added policies and processes like incident response plans, encryption, and employee training.</div><p><br></p><div>To calculate the average cost of a data breach, Ponemon collects both the direct and indirect expenses as well as opportunity costs incurred by the organization as follows:</div><ul><li><span style="font-weight:700;">Direct cost</span> – the direct expense outlay to accomplish a given activity, such as engaging forensic experts, outsourcing hotline support and providing free credit monitoring subscriptions and discounts for future products and services.<br></li><li><span style="font-weight:700;">Indirect cost</span> – the amount of time, effort and other organizational resources spent in the aftermath of a breach, such as in-house investigations and communications. This category also includes the extrapolated value of customer loss resulting from turnover.<br></li><li><span style="font-weight:700;">Opportunity cost </span>– the cost of lost business opportunities resulting from negative reputation effects after the breach has been reported to victims and publicly revealed to the media.<br></li></ul><p>A recent report from Deloitte says the costs of a cybersecurity breach could be higher than most data shows as the costs can rack up for many years after the initial incident. The firm identified 14 cyberattack impact factors, including seven it claims are hiding beneath the surface and account for 95 percent of the financial impact. (see chart below).<br></p></div>
</div><div data-element-id="elm_EohnBovmbHX4hQpxlo2AwA" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/14%20impacts%20of%20cyberattack.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_9KItdo1-cR6utLWqbfh90A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>Small business owners need to take caution as well. One may think; "I'm too small to be a target". Security by obscurity is not a good policy. One may think: "I've got a firewall and a good IT company".&nbsp;<span style="color:inherit;">Are you willing to bet your business on that?&nbsp;</span>Cyber Security is a specialized field and many "generalist" IT and MSP organizations today simply do not have the expertise needed to properly and adequately protect your hard earned investment and customers. There are numerous cost-effective, methods, practices, and managed services that will significantly reduce your exposure and augment what your IT company is already doing.</div><p><br></p><div>Contact us at Cloud 9 Advisers to learn about better ways to protect your business. Through our Consulting &amp; Buying Program, our consulting services are free to you. We are provider-neutral, independent, and unbiased consultants of technology, telecom, cloud, <span style="font-style:italic;">and </span>security services.</div></div>
</div><div data-element-id="elm_HHOJ_jSGTpiyagB3K_W2CQ==" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 23 Jul 2018 13:50:54 -0500</pubDate></item></channel></rss>