<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/info-security/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #info security</title><description>Cloud 9 Advisers - News #info security</description><link>https://www.cloud9advisers.com/News/tag/info-security</link><lastBuildDate>Wed, 25 Feb 2026 18:45:25 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Key security Concepts, 1]]></title><link>https://www.cloud9advisers.com/News/post/key-security-concepts-1</link><description><![CDATA[A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; Key ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jbJe4SA1Q_qeeBdh4gJftQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kn84HiEaSvuEvI3Jf0Lq_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LTQQzcB5R-izLAEoD7QYew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Confidentiality. Integrity. Availability.</span><br></h1></div>
<div data-element-id="elm_SFTsRTD1gvcObz1xf2likA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width: 596.35px !important ; height: 519px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } @media (max-width: 767px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Security%20-%20Three%20of%20Three%20-1-.svg" width="596.35" height="519" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; </span><span style="color:inherit;">Key&nbsp;</span><span style="color:inherit;">concepts for Cybersecurity is starting with a framework. There are plenty of pre-built frameworks available to guide you based on your industry, like NIST, PCI, HIPAA, ISO and more. But before you go there, and maybe before you even pick one, you should start with the Three Rules or Three. The first set starts with Confidentiality, Availability, and Integrity. This is the fine balancing act for Cybersecurity, also known as the “bedrock principle for Cybersecurity.” There’s no such thing as perfect security, you can’t spend all resources on all three areas - so focusing on your specific business needs, and identifying which of these are most important to your business and the separate business units helps properly align Cybersecurity solutions with business outcomes.</span></div></div></div>
</div><div data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If your an accounting firm integrity of data might be most important to you. If your an e-commerce company, then availability is critical. If you're in healthcare, confidentiality may be paramount. Start with the overall needs of the business as a whole, then drill down to the specific needs of each department or business unit. Striking the balance is also important from department to department.&nbsp;</p></div>
</div><div data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cybersecurity"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 May 2024 05:42:00 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Thrive Networks]]></title><link>https://www.cloud9advisers.com/News/post/Healthcare-Company-Set-Free</link><description><![CDATA[Cloud 9 Advisers Supplier Spotlight: Thrive Networks CHALLENGE Password security and Multi-Factor Authentication are two of the best lines of defense fo ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_qsR8A58CTwau-JYVrqttwA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_t4DoM0R9RLeMpcGsxj8Xlg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__5uW2EmqTjuNb5MM2c25XQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_4YzAcxkGTPCjbfk2A42Idw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4YzAcxkGTPCjbfk2A42Idw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><div><span style="color:inherit;">Thrive Networks' Cybersecurity&nbsp;</span><span style="color:inherit;">Forensic Team&nbsp;</span>quickly releases&nbsp;</div></span>leading Healthcare company&nbsp; from&nbsp;cryptolocker threat<span style="color:inherit;"><br></span></h2></div>
<div data-element-id="elm_2ytMlq4-V0hgTrCrny7ppg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_2ytMlq4-V0hgTrCrny7ppg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/infosecmonitoring.jpeg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_CVFhyfsnClp3vBVmGjWmCA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CVFhyfsnClp3vBVmGjWmCA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers Supplier Spotlight: <span style="font-weight:bold;">Thrive Networks</span></p></div>
</div><div data-element-id="elm_XMNbaDpMCsquBlWrw5H9Qg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_XMNbaDpMCsquBlWrw5H9Qg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/IT%20Thrive2.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_hT2c-joNBY8lOt4j06PTLw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_hT2c-joNBY8lOt4j06PTLw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_hT2c-joNBY8lOt4j06PTLw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_eg9LYYAiI5b2uHfSs_GQKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eg9LYYAiI5b2uHfSs_GQKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>CHALLENGE</div><p>Password security and Multi-Factor Authentication are two of the best lines of defense for users to protect themselves against bad actors. After a weak default password without Multi-Factor Authentication (MFA) allowed a hacker to gain access to the company’s network, a large healthcare provider’s data was encrypted and inaccessible; which halted their operations for nearly twenty-four hours across multiple locations. Ransomware was discovered by the Thrive team on upwards of twenty of the company’s servers.</p><p><br></p><div>SOLUTION</div><p>Thrive’s Cybersecurity Forensic Analysts team took quick action to source the bad actor and work towards remediation. Utilizing best-of-breed tools, they were able to identify the IP addresses in which the attack was originating and effectively block them from the network. Simultaneously, the Thrive team was able to configure restoration on the servers and perform back up measures. Within twenty-four hours of the original incident the critical servers were restored, and the remaining were all operational within four days.</p><p><br></p><div>RESULT</div><p>The immediate results of the remediation of the servers were that the healthcare provider became operational once again and able to serve their patients. After the event was resolved the organization enlisted Thrive to perform a Security Health Assessment across their environment. Thrive’s cybersecurity team was able to identify vulnerable target areas in the company’s infrastructure and architect customized solutions. All of these being actionable items, the organization has been able to further leverage Thrive’s services to strengthen their security framework to prevent future incidents.</p><p><br></p><div>Thrive’s NextGen Managed Services provide customers with a technology advantage on all aspects of digital infrastructure, including strategy, application performance, cloud, cybersecurity, networking, disaster recovery, and more. Thrive’s Cybersecurity Services leverage best-in-class security platforms from multiple security vendors to deliver a holistic end-user NextGen solution that helps prevent against both network-based and social-based attacks.&nbsp;</div></div>
</div><div data-element-id="elm_WhHG0Q2EL506IgB3tEGesw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_WhHG0Q2EL506IgB3tEGesw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_t64rH5f6Xu5izA9WRPtkNA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t64rH5f6Xu5izA9WRPtkNA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-weight:bold;">How can Cloud 9 Advisers help your business?</span></div><p><span style="color:inherit;"><br></span></p><div>Thrive is a leading provider of next generation Managed IT and Cybersecurity services and is one of the top Managed Services vendors in the Cloud 9 Supplier Portfolio. Contact Cloud 9 today to see if Thrive is the right fit for your business. We'll identify your needs, wants, and desires, and match them up to find the vendor that fits your needs. Read on to find out more, or...</div></div>
</div><div data-element-id="elm_Z9bAYGxnTmytoXp-iKBkSQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Z9bAYGxnTmytoXp-iKBkSQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=Can Cloud 9 help me, please?" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Us</span></a></div>
</div><div data-element-id="elm_A8fOxWA9SPTMugdT918GUQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_A8fOxWA9SPTMugdT918GUQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_c7ZBQ_YUwYk4RUpo9288pQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_c7ZBQ_YUwYk4RUpo9288pQ"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become a complementary extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers. Cloud 9, together with our distributors, is made up of more than two-hundred and fifty staff, all devoted to helping you save time and money. Our curated Supplier Portfolio contains nearly two-hundred of the best service provider companies. We are one of the largest buyers of technology in the country. Through us, you’ll get the collective buying power of thousands of other clients. Consider us your informed buyers, strategic partners, and technology advisers. We are impartial, unbiased, and vendor-agnostic. We sit on your side of the table to help you find, evaluate, and negotiate with service provider companies. We’ll help you design the right solution and identify the best technologies. We’ll get pricing from multiple competing companies, then guide you through the evaluation and procurement process. Use our evaluation tools for documentation and due diligence. Plus, have our entire team at your disposal before, during, and after the acquisition of your new services, for as long as you’re in business.</span></p><p><span style="color:inherit;"><span><br></span></span></p><p style="text-align:center;"><span style="font-size:11pt;font-weight:700;">Technology Partners. Strategic Advisers.</span><span style="font-size:11pt;">&nbsp;</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:11pt;"><br></span></div></div>
</div></div><div data-element-id="elm_OVy-o5MUFTNYY5YZgtrEfw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_OVy-o5MUFTNYY5YZgtrEfw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=Can Cloud 9 help me, please?" title="email: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Us</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 23 Jan 2020 10:35:52 -0500</pubDate></item><item><title><![CDATA[China Tops List as Top Risk (duh!)]]></title><link>https://www.cloud9advisers.com/News/post/China-Tops-List-as-Top-Risk</link><description><![CDATA[It probably goes without saying, but China is a major risk for most US business and certainly anyone conduction any sort of business online. Read more and contact Cloud 9 to learn ways to protect your digital assets]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rVgB2_y6QFqaWlc7I3Es5w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fZQ618y0S0yVuwgeACBtZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mvhK6RVoT6WNKbwJ9O62dA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">China Tops List of U.S. Cybersecurity Agency’s Top Risks</span></h2></div>
<div data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:12.6px;">By William Turton |&nbsp;August 23, 2019 - see the full article at <a href="https://www.insurancejournal.com/news/national/2019/08/23/537801.htm?utm_source=Partner%2BAug%2B%2719%2BNewsletter&utm_campaign=Partner%2BNewsletters&utm_medium=email" title="InsuranceJournal.com" target="_blank">InsuranceJournal.com</a></span></span><br></p></div>
</div><div data-element-id="elm_wpQyrPryRuPCab8mdi4FTw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_wpQyrPryRuPCab8mdi4FTw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1501621185719-221c3312e3ba?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_-l1px7zed5YDyx5NhzqrHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-l1px7zed5YDyx5NhzqrHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;">Cybersecurity and Infrastructure Security Agency (CISA), a</span>&nbsp;newly created U.S. cybersecurity agency said Thursday that China represents the greatest strategic risk to the U.S., and as a result, the agency’s top operational priority is reducing the risks from Chinese compromises to the global supply chain, including emerging 5G technology. The statement was part of a report outlining CISA's strategic intent for the next five years. The agency is responsible for protecting America’s critical infrastructure, like election systems and power grids, from hackers and other cybersecurity threats.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div>Besides China, the agency’s other priorities include federal cybersecurity and reducing risks for industrial control systems.&nbsp;<span style="color:inherit;">Christopher Krebs, the agency’s director, said in a speech Thursday that his agency is the nation’s “risk adviser,” which doesn’t have its hands on the keyboards of computer networks but rather seeks to make other agencies and companies do a better job managing risks against cyberattacks.</span></div><div><br></div><div>The priorities reflect the work CISA has already been doing since the agency was established in November 2018, a time during which the Chinese manufacturer Huawei Technologies Co. was blacklisted by the Trump administration amid security concerns and Russian agents were indicted for seeking to manipulate the 2016 presidential election.</div><div><br></div><div>“When we think about Russia, they’re trying to disrupt the system,” Krebs said, at an event at Auburn University in Alabama. “And China is trying to manipulate the system, so that requires us to take different approaches.”</div><div><br></div><div>CISA is currently offering services to election equipment vendors to find potential vulnerabilities in its systems. CISA’s work also includes protecting state and local governments from ransomware attacks, like the one that hit 22 towns in Texas last week. “Ransomware is not going anywhere,” Krebs said. “It’s only getting worse.”</div><br><div><span style="color:inherit;"><p style="margin-bottom:20px;font-size:16px;">CISA sits within the Department of Homeland Security. Krebs, the agency’s first director, joined the DHS in 2017 and was nominated to lead the agency by President Donald Trump in 2018. Before that, he was the Director for Cybersecurity Policy on Microsoft Corp.’s U.S. Government Affairs team.</p></span></div></span></div></div>
</div><div data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Learn how Cloud 9 can help you protect your business</span></a></div>
</div><div data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_2haLWEezyEXAZAWFZIYwGw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_2haLWEezyEXAZAWFZIYwGw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers.&nbsp;</span></span><br></p><p><span style="color:inherit;"><span style="font-size:11pt;"><br></span></span></p><ul><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Time: </span>We manage everything by becoming an extension of your team and do the legwork for you.</span><br></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Money: </span>We save you big by getting the buying power of thousands of other clients.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Confidence: </span>We evaluate and negotiate to get you the best solution, best supplier, and the best price.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Clarity:</span> We find the right companies, distill the information, and clear the clutter.</span></li></ul><div><span style="font-size:11pt;"><br></span></div><div><span style="color:inherit;"><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 08 Oct 2019 04:02:04 -0500</pubDate></item></channel></rss>