<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/incident-response/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #incident response</title><description>Cloud 9 Advisers - News #incident response</description><link>https://www.cloud9advisers.com/News/tag/incident-response</link><lastBuildDate>Wed, 25 Feb 2026 18:42:16 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Remediation vs. Response]]></title><link>https://www.cloud9advisers.com/News/post/remediation-vs.-response</link><description><![CDATA[There is an important and distinct difference between response and remediation. As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_cheik6V2T6aOfsTEHK0wNQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_jZueJQo7Q1CLC1HaUDRKFA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__4woVd79SlalIwDRzmrpDw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qLYvG2NLRaqSHApkLqw7rw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">What about the &quot;big R&quot;, Remediation?&nbsp;</span></h2></div>
<div data-element-id="elm_znLwfAtw-OissOaq-e921g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width: 1110px ; height: 622.22px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:723px ; height:405.28px ; } } @media (max-width: 767px) { [data-element-id="elm_znLwfAtw-OissOaq-e921g"] .zpimage-container figure img { width:415px ; height:232.63px ; } } [data-element-id="elm_znLwfAtw-OissOaq-e921g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/remediation.jpg" width="415" height="232.63" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_PGFQaF13ojZaKwBgJqohnQ"].zprow{ border-radius:1px; } </style><div data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_4sHUvkt_PY84Uo60UWDN1w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_w3MqvZAc0jahS4CtGs7nNg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">There's a pretty big difference</h2></div>
<div data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_UIlLtG2tX-VnKGM4TUIUzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We wanted to expand a little more on a previous article about EDR, XDR, and MDR. As many of you already know, the “r” is for response: Endpoint Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Extended Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. Managed Detection and </span><span style="font-size:12pt;font-style:italic;">Response</span><span style="font-size:12pt;">. But, for some reason there seems to be little confusion on what response actually means and what it does.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">As with many things these days there are plenty of opinions. And like other things along that train of thought, they all stink. Except this one, of course!&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">There is an important and distinct difference between response and remediation:</span></p></div>
</div><div data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wYfTUKQehoA6ZgS5MZQe5w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Response </span><span style="font-size:12pt;">is “a reaction to something”. Response in cybersecurity is focused on containing and mitigating the immediate threat. While we’re thumbing through the dictionary, mitigation is “the action of reducing the severity, seriousness, or painfulness of something”</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Remediation</span><span style="font-size:12pt;">, or </span><span style="font-size:12pt;font-style:italic;">to remedy</span><span style="font-size:12pt;"> on the other hand is, simply put, “to set right”. So to remediate a security incident is to </span><span style="font-size:12pt;font-style:italic;">fix it.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Pretty big difference.</span></p></div>
</div><div data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CPD3m9HXGVM5nORWNzdWOQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Response and remediation are both important parts of any cybersecurity strategy and incident response (IR) plan. However, as shown, there is a key difference between the two.&nbsp; It is important to be able to quickly detect and then respond to an incident. But we would like to highlught that not all _DRs&nbsp; are created equal, and you should never assume that the solution or service you have in place automatically includes remediation. Having a plan in place for remediating security incidents quickly and effectively is also critical and in most cases, not necessarily included.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">In the context of EDR, XDR, and MDR, both response and remediation are important capabilities. EDR, XDR, and MDR solutions can all help organizations to respond to security incidents quickly and effectively. However, remediation is typically more of a manual process that involves fixing the underlying vulnerability and other problems that caused the incident in the first place.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Some EDR, XDR, and MDR solutions may provide automated remediation capabilities for certain types of threats. For example, an EDR solution might be able to automatically remove malware from an infected endpoint. However, for more complex vulnerabilities, remediation may need to be performed manually.</span></p></div>
</div><div data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FL-NlIVRUCjAo8NsAW4q-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Remediation can be performed by either the organization itself or by the security solution provider. It often depends not only on the solution/software, but also on the service selected and service provider you get it from.</span></p><p><span style="color:inherit;"></span></p><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">EDR solutions typically provide tools to help organizations remediate threats </span><span style="font-size:12pt;font-style:italic;">on their own</span><span style="font-size:12pt;">. Most out-of-the-box solutions won’t </span><span style="font-size:12pt;font-style:italic;">remedy </span><span style="font-size:12pt;">a security threat.&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">XDR solutions can automate </span><span style="font-size:12pt;font-style:italic;">some </span><span style="font-size:12pt;">remediation tasks, such as quarantining infected endpoints or blocking malicious traffic.</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">MDR providers typically provide full remediation services, including removing malware, patching vulnerabilities, and restoring data from backups.</span></p></li></ul></div>
</div><div data-element-id="elm_kp8auAOOcgDvmlJrBaGddg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kp8auAOOcgDvmlJrBaGddg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">It is important to note that the specific capabilities of EDR, XDR, and MDR solutions vary widely. When choosing a solution, it is important to consider the specific needs of your organization and to ensure that the solution you choose provides the necessary response and/or remediation capabilities.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Which organization is responsible for remediation (either you or the service provider( will depend on the specific solution, or rather </span><span style="font-size:12pt;font-style:italic;">service</span><span style="font-size:12pt;">, in place. For example, some EDR solutions provide the option to have the security solution provider perform remediation on behalf of the organization.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Here are some examples of how remediation might be used in each of the three solutions:</span></p><blockquote style="margin:0px 0px 0px 40px;border:none;padding:0px;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">EDR:</span><span style="font-size:12pt;"> An EDR solution might be used to remediate a malware infection by removing the malware from the infected endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">XDR:</span><span style="font-size:12pt;"> An XDR solution might be used to remediate a ransomware attack by automating the process of restoring data from backups and isolating the infected endpoints from the network.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">MDR:</span><span style="font-size:12pt;"> An MDR provider might be used to remediate a data breach by investigating the incident, identifying the affected systems, and taking steps to prevent the breach from happening again.</span></p></blockquote><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Overall, remediation is an important part of any cybersecurity strategy, and it is important to have a plan in place for remediating security incidents quickly and effectively. EDR, XDR, and MDR can all help organizations to detect and respond and get organizations on the right path to remediate threats and incidents effectively. But understand that most solutions are not a complete remediation plan or strategy.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Again, response is to react, mitigate is to reduce, remediate is to fix.</span></p></div>
</div></div><div data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_OMWRRp9XVgEjLCUcV70tPQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_0yYDaVyKvYqst7bOvpVMTA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pY_3c7Em2RMS5OEgBcFR5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Security Readiness</h2></div>
<div data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ulm0phTgcDpgVpXBRMArBQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>You've done a great job so far, put all the right pieces in place, and now you need to be able to prove it. Or, you think your nicely buttoned up, but wouldn't mind a second pair of eyes.</p><p><br></p><p>Our comprehensive, customized Cybersecurity Readiness Report will give you 50 to 150 pages of dos, don'ts, best practices, and the latest strategies and innovations on your security preparedness. You'll get confirmation on some things, plenty of food for thought, and maybe even uncover some gaps you weren't aware of.&nbsp;</p></div>
</div><div data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_9XhL8-kTQOMplOEC5rDe4g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://appts.cloud9advisers.com/#/customer/3844308000002924034" target="_blank" title="Cyber Readiness Survey"><span class="zpbutton-content">Schedule your Report</span></a></div>
</div></div></div><div data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_pJxxZm0ilVGoO02qjlCbQw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Cloud 9 Advisers</h2></div>
<div data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_q4VDg-QRTV-6nQzeI1RUeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>As a leading technology advisory firm with a security-first focus, Cloud 9 stands ready to help you unravel the complex web of noise and &quot;FUD&quot; you'll hear out in the cybersecurity marketplace. Cybersecurity should never be only about the latest products and solutions or the fear uncertainty, and doubt (FUB) often found in the marketplace. Cybersecurity isn't an IT problem, it is a business problem</p></div>
</div><div data-element-id="elm_piqTGcrcTUOWqN9lhBW3SA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 26 Oct 2023 08:50:16 -0500</pubDate></item><item><title><![CDATA[CyberSecurity Basics]]></title><link>https://www.cloud9advisers.com/News/post/cybersecurity-basics</link><description><![CDATA[The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp; Vulnerability Scannin ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ssfqJdnYTPqaI4KdiXha5g==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_VuBZ60mUQAW5kxDvBEjbvA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eWNoaWioQjCbE-D3VmBUNw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZXOzB36hQqKKOOp30fMHJw==" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">The Basics of Cyber Security, What&nbsp;<span style="font-style:italic;">every</span>&nbsp;business should do</h2></div>
<div data-element-id="elm_v3UJN5KXS_6VeAJJXXZX_g==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span>The following is a quick, simple list of must-dos to help businesses of all sizes protect themselves against cyber threats.&nbsp;</span></span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Vulnerability Scanning</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Doesn’t actually fix anything, but...</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Shows “bad spots’”</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Good services will show a plan of remediation</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">If subject to compliance (HIPPA, PCI, etc) recurring V.Scans are required </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Do it </span><span style="font-size:11pt;font-style:italic;">at least </span><span style="font-size:11pt;">&nbsp;annually, quarterly is common for many businesses, monthly “managed” services best, but more costly</span></p></li></ul></ul><p style="margin-left:72pt;"><span style="font-size:11pt;">Think of it as a home inspection. </span></p><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Penetration Testing</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Different than a V.Scan but related</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Considered “white-hat” or “ethical” hacking</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Attempts to actually hack into your network</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Should come after a V.Scan and initial remediations steps to test efficacy </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Most Pen Tests will deliver a detailed, lengthy report of findings and remediation suggestions</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Usually done annually. Should at least be done every couple/few years. </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Endpoint Security</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Mobile Security; </span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">increasingly important and often overlooked window in to the network </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">proprietary and cloud apps. </span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">corporate or employee owned mobile devices (BYOD) </span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Anti-Virus</span></p></li><li style="font-size:11pt;"><p><span style="font-size:11pt;">Firewall, go with a Next Gen FW (NGFW). Best would be a managed Firewall solution. Depending on your situation also look into a cloud firewall solution.&nbsp;</span></p></li></ul><li style="font-size:11pt;"><p><span style="font-size:11pt;font-weight:bold;">Employee Education</span></p></li><ul><li style="font-size:11pt;"><p><span style="font-size:11pt;">Email phishing; train employees to recognize bad, phishing emails by using mock emails </span></p></li></ul></ul><p><span style="color:inherit;"><span><br></span></span></p><p><span style="font-size:11pt;">Contact us at </span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">Cloud 9 Advisers</a></span><span style="font-size:11pt;"><a href="/" title="Cloud 9 Advisers ">. </a>We are impartial, independent, and provider-neutral, consultants of Communications, Collaboration, Connectivity, and Cloud technologies. We guide our clients through the morass of options, solutions, and providers. Sign up for our Consulting &amp; Buying Program and get the real story on CyberSecurity and the best methodology for your business.</span><span style="font-size:11pt;">Find out who the best providers are and who to avoid. Get real-world advice, recommendations, and unbiased solution design.&nbsp;</span></p><p><span style="color:inherit;"><br><span style="font-size:11pt;">Through the Program, you’ll have access to our distributor team of provider-neutral SME-Subject Matter Experts and Services Engineers. We’ll help you get pricing and bids from multiple, competing companies through our distributor portfolio of nearly 200 vetted and approved service providers. Use our evaluation tools to show decision makers the entire process, reasoning, and recommendations and complete due diligence for the project. We’ll help manage the entire procurement process (and keep all those pesky sales-guys off your back!). Visit </span><span style="font-size:11pt;"><a href="/" title="www.Cloud9Advisers.com">www.Cloud9Advisers.com</a></span><span style="font-size:11pt;"> for more information</span></span><br></p></div>
</div><div data-element-id="elm_lPPlgC14BcKXAxO2d18kvg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-sm zpbutton-style-roundcorner " href="/engagement" target="_blank"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 29 Sep 2018 12:27:49 -0500</pubDate></item><item><title><![CDATA[Cyber Security - What is the cost?]]></title><link>https://www.cloud9advisers.com/News/post/cyber-security-what-is-the-cost</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cloud9advisers.com/files/image- work in real world 2.jpg"/>what is the real cost of a cybersecurity breach? Are you too small to worry about these things? Are you willing to bet your business on your Firewall and the IT group managing it?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_QBHuJXfaSU2N6lTO3DKwDA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1_7v-2uRT0GJrVBMqCKTbA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_30He43UiQkCeS2yxIdDPSw==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_w0U9xwvbR8G5HlhF7Y6EJQ==" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>The costs associated with security breaches are going up, jumping 29 percent in recent years to more than $4 million per incident, according to Ponemon’s annual bench marking report. In addition, when it comes to the impacts of breaches – such as cost per record lost – Ponemon says the gap is widening between organizations that are unprepared and those that have added policies and processes like incident response plans, encryption, and employee training.</div><p><br></p><div>To calculate the average cost of a data breach, Ponemon collects both the direct and indirect expenses as well as opportunity costs incurred by the organization as follows:</div><ul><li><span style="font-weight:700;">Direct cost</span> – the direct expense outlay to accomplish a given activity, such as engaging forensic experts, outsourcing hotline support and providing free credit monitoring subscriptions and discounts for future products and services.<br></li><li><span style="font-weight:700;">Indirect cost</span> – the amount of time, effort and other organizational resources spent in the aftermath of a breach, such as in-house investigations and communications. This category also includes the extrapolated value of customer loss resulting from turnover.<br></li><li><span style="font-weight:700;">Opportunity cost </span>– the cost of lost business opportunities resulting from negative reputation effects after the breach has been reported to victims and publicly revealed to the media.<br></li></ul><p>A recent report from Deloitte says the costs of a cybersecurity breach could be higher than most data shows as the costs can rack up for many years after the initial incident. The firm identified 14 cyberattack impact factors, including seven it claims are hiding beneath the surface and account for 95 percent of the financial impact. (see chart below).<br></p></div>
</div><div data-element-id="elm_EohnBovmbHX4hQpxlo2AwA" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/14%20impacts%20of%20cyberattack.png" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_9KItdo1-cR6utLWqbfh90A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div>Small business owners need to take caution as well. One may think; "I'm too small to be a target". Security by obscurity is not a good policy. One may think: "I've got a firewall and a good IT company".&nbsp;<span style="color:inherit;">Are you willing to bet your business on that?&nbsp;</span>Cyber Security is a specialized field and many "generalist" IT and MSP organizations today simply do not have the expertise needed to properly and adequately protect your hard earned investment and customers. There are numerous cost-effective, methods, practices, and managed services that will significantly reduce your exposure and augment what your IT company is already doing.</div><p><br></p><div>Contact us at Cloud 9 Advisers to learn about better ways to protect your business. Through our Consulting &amp; Buying Program, our consulting services are free to you. We are provider-neutral, independent, and unbiased consultants of technology, telecom, cloud, <span style="font-style:italic;">and </span>security services.</div></div>
</div><div data-element-id="elm_HHOJ_jSGTpiyagB3K_W2CQ==" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 23 Jul 2018 13:50:54 -0500</pubDate></item></channel></rss>