<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/microsoft-365/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #Microsoft 365</title><description>Cloud 9 Advisers - News #Microsoft 365</description><link>https://www.cloud9advisers.com/News/tag/microsoft-365</link><lastBuildDate>Wed, 25 Feb 2026 18:38:56 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Microsoft Down!]]></title><link>https://www.cloud9advisers.com/News/post/microsoft-down</link><description><![CDATA[Microsoft and CrowdStrike work diligently to fully resolve the fallout from a major global outage.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XafpBElLSpitO7YGzmgpYQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_l99SyjRyTmuFUDuG4G9cJQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_niqhMDmxTTWCCN_Tb_HOKA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_GeCW9qJ1SKGSRRaB2d1XyQ"].zpelem-heading { border-radius:1px; } } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">CrowdStrike Issues Cause Global Microsoft Outages</span></h1></div>
<div data-element-id="elm_60lHHB66gTWq2L_TQuDiEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_60lHHB66gTWq2L_TQuDiEA"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_60lHHB66gTWq2L_TQuDiEA"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_60lHHB66gTWq2L_TQuDiEA"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-center " data-editor="true"><p>Elon Musk suggests this could be the biggest IT failure ever. Is he right?</p></div>
</div><div data-element-id="elm_qcSQPv09bUxAA7kvLehPDg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"] .zpimage-container figure img { width: 770px !important ; height: 431px !important ; } } [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"] .zpimage-container figure figcaption .zpimage-caption-content { font-size:8px; } [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"].zpelem-image { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"].zpelem-image { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_qcSQPv09bUxAA7kvLehPDg"].zpelem-image { border-radius:1px; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/CSoutage.png" size="original" alt="image credit https://www.moneycontrol.com/" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content">image credit https://www.moneycontrol.com/</span></figcaption></figure></div>
</div><div data-element-id="elm_LBudQumpwYSjKyfliYLWqA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_LBudQumpwYSjKyfliYLWqA"].zprow{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_LBudQumpwYSjKyfliYLWqA"].zprow{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_LBudQumpwYSjKyfliYLWqA"].zprow{ border-radius:1px; } } </style><div data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_M7CDg3dTDog0vhB5zuSc4A"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_SnM2qM1qEhpMDhzhEPN71Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-style:italic;font-size:10px;">Note:&nbsp;</span><span style="font-size:10px;font-style:italic;">We are not reporters, regardless we thought this story important enough to share. We've pieced together this article from a few other (hopefully) reputable stories, sources, and reports. We'll try to keep things updated appropriately</span></p></div>
</div></div><div data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_9KElIJYBlZ3xk_i3Pvcbsg"].zpelem-col{ border-radius:1px; } } </style><div data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_IFZP_ASCEdSWAgAfolcWQA"].zpelem-heading { border-radius:1px; } } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true"><span style="color:inherit;">Microsoft's Global Outage Linked to CrowdStrike:</span></h2></div>
<div data-element-id="elm_Hu57XV6UssS5POeNr6miGw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Hu57XV6UssS5POeNr6miGw"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_Hu57XV6UssS5POeNr6miGw"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_Hu57XV6UssS5POeNr6miGw"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>In an unexpected turn of events, Microsoft's global outage has been traced back to a disruption caused by CrowdStrike. This incident has rippled across the globe hitting numerous industries, affecting countless users, and raising significant concerns about security and operational resilience. Here's a comprehensive look at the situation, drawing insights from multiple sources to provide a detailed understanding.</div></div></div>
</div><div data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_x6cfefB5IATG9kUnZ4vv1A"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>The Outage and Its Immediate Impact</div></div></h3></div>
<div data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_7WJiFpWTDgRJuA6UiPFn4Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Starting Thursday evening July 18, 2024 and coming to a head on Friday, Microsoft experienced a significant global outage, affecting services such as Office 365, Azure, and Teams - but seemingly and mostly attributed to Microsoft Windows. This disruption impacted businesses worldwide, halting operations and causing widespread frustration among users and consumers alike. According to Wired, the root cause of the outage was identified as an issue linked to CrowdStrike's security software, which is integrated into Microsoft's infrastructure for enhanced cybersecurity measures</span><br></p></div>
</div><div data-element-id="elm_Bm2zocJTMbLKE2npELQWJg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Bm2zocJTMbLKE2npELQWJg"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_Bm2zocJTMbLKE2npELQWJg"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_Bm2zocJTMbLKE2npELQWJg"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><a href="https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/">https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/</a><br></p></div>
</div><div data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_0qNuDQUDzRa6O7PZx4W7hg"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>What Happened?</div></div></h3></div>
<div data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_seHpJNfGdwdN7PIqmnLG0g"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Initial investigations revealed that a recent update to CrowdStrike's Falcon platform inadvertently triggered a cascade of failures within Microsoft's systems. This apparently routine update, meant to enhance security features, instead led to serious&nbsp;</span><span style="color:inherit;">unexpected&nbsp;</span><span style="color:inherit;">system incompatibilities and undesired behavior. The BBC reports that the issue was severe enough to cause cascading failures across Microsoft's global network, demonstrating the interconnected nature of modern IT ecosystems</span></p></div>
</div><div data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_-r4N35lVXwzn5BZUeXam2Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><a href="https://www.bbc.com/news/live/cnk4jdwp49et">https://www.bbc.com/news/live/cnk4jdwp49et</a><br></div>
</div><div data-element-id="elm_IJQRcbDil9QEoaDZX33KZg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJQRcbDil9QEoaDZX33KZg"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_IJQRcbDil9QEoaDZX33KZg"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_IJQRcbDil9QEoaDZX33KZg"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Response and Mitigation</div></div></h3></div>
<div data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_BXVsKg5T8717KZwwrnXw_Q"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Microsoft's response to the outage was swift but challenging. The company's IT teams worked around the clock to isolate the issue and restore services. As detailed by Reuters, Frontier and many other smaller and major airline were significantly affected by the outage. Airline operations around the world were disrupted, highlighting the broad impact of Microsoft's downtime on various sectors.</div><div><br></div><div>To address the problem, Microsoft collaborated closely with CrowdStrike to roll back the problematic update and implement fixes. This process involved complex troubleshooting and coordination to ensure that services could be safely restored without further disruptions&nbsp;</div><div><br></div><div>According to&nbsp;<a href="https://admin.microsoft.com/servicestatus">https://admin.microsoft.com/servicestatus</a>&nbsp;as of now Microsoft reports &quot;We're all good&quot;.&nbsp;</div></div></div>
</div><div data-element-id="elm_NsBGBABLup8ypuhonD2Sxg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"] .zpimage-container figure img { width: 540px ; height: 140.06px ; } } [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"].zpelem-image { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"].zpelem-image { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_NsBGBABLup8ypuhonD2Sxg"].zpelem-image { border-radius:1px; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/MSallgood.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_8bCIp-H2mzpgPCFnC4yo2Q"].zpelem-heading { border-radius:1px; } } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Implications for Businesses</div></div></h3></div>
<div data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_u5yWWDqOl3U2d2V8JDc53w"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>This incident underscores the critical importance of robust operational and cybersecurity measures and the need for careful management of third-party integrations. It's so often the little things being overlooked that get us in the end.&nbsp;</div><div><br></div><div>Businesses that rely heavily on cloud services and interconnected IT solutions must consider the potential risks associated with such dependencies. The Microsoft-CrowdStrike outage serves as a stark reminder that even the biggest and best trusted providers can pose risks if not managed correctly.</div></div></div>
</div></div><div data-element-id="elm_sLXzkLwatAgV2xQp6agnLw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-3 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_sLXzkLwatAgV2xQp6agnLw"].zpelem-col{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_sLXzkLwatAgV2xQp6agnLw"].zpelem-col{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_sLXzkLwatAgV2xQp6agnLw"].zpelem-col{ border-radius:1px; } } </style></div>
</div><div data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q"].zpelem-heading { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q"].zpelem-heading { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_vGkTb_FgW2kK39GrJM3s-Q"].zpelem-heading { border-radius:1px; } } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><div>Moving Forward</div></div></h2></div>
<div data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_2L6YFLDTXlZWqHGHgTtrtQ"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>As Microsoft and CrowdStrike work to fully resolve the fallout from this outage, businesses should take this opportunity to reassess their own IT strategies and preparedness. Ensuring that your organization is resilient against similar disruptions is crucial in today's interconnected digital landscape.</p><p><br></p><p>For more information on the current status of Microsoft's services, please visit the <a rel="noreferrer" href="https://admin.microsoft.com/servicestatus">Microsoft Service Status page</a></p></div></div>
</div><div data-element-id="elm_pX_15XsjtltqS4d18clU_g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_pX_15XsjtltqS4d18clU_g"].zpelem-divider{ border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_pX_15XsjtltqS4d18clU_g"].zpelem-divider{ border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_pX_15XsjtltqS4d18clU_g"].zpelem-divider{ border-radius:1px; } } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA"].zpelem-text { border-radius:1px; } @media (max-width: 767px) { [data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA"].zpelem-text { border-radius:1px; } } @media all and (min-width: 768px) and (max-width:991px){ [data-element-id="elm_nfw4wtCk8rGL9QhEllPrVA"].zpelem-text { border-radius:1px; } } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>At Cloud 9 Advisers, we specialize in helping businesses navigate the complex landscape of IT solutions. Our extensive portfolio of top-tier technology providers ensures that you find the right partners to build a resilient and secure IT infrastructure. Whether you're looking to enhance your cybersecurity posture, streamline your operations, or ensure business continuity, our expert advisers are here to guide you every step of the way.</div><div><br></div><div>Don't let unexpected disruptions catch you off guard. Contact Cloud 9 Advisers today and discover how we can help your business stay ahead in the ever-evolving digital world.</div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 19 Jul 2024 09:31:16 -0500</pubDate></item><item><title><![CDATA[Google: an alternative]]></title><link>https://www.cloud9advisers.com/News/post/Google-an-alternative</link><description><![CDATA[Microsoft faces scrutiny after scathing report from DHS. Google says they have the answer.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_u-QY0OelTWGp4Es5KyYmFw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ovuYVeo1TOuWDC5fcZ48Ng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_c2y0JAAyTLerfOTvl5YgPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Google Raises Concern's about Microsoft Security: New Whitepaper shows</h1></div>
<div data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>The Department of Homeland Security’s Cyber Safety Review Board (CSRB) found that repeated security breaches against the federal government were due to a cascade of security failures at Microsoft, as well as a corporate culture that deprioritized cybersecurity.&nbsp;<br>Google proposes a safer alternative.</div></div></div>
</div><div data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width: 500px ; height: 644.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } @media (max-width: 767px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/Google-alternative.png" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Google-alternative.png" width="500" height="644.19" loading="lazy" size="medium"/></picture></a></figure></div>
</div><div data-element-id="elm_h357TC0quc1SuRJpz_me8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h357TC0quc1SuRJpz_me8w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-style:italic;"><a href="/Google-alternative.png" target="_blank" rel="" download="">View and download Google's whitepaper</a></span></p></div>
</div><div data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;">Following several high-profile cybersecurity incidents, Microsoft faces scrutiny. Google's new white paper, &quot;A More Secure Alternative,&quot; highlights its own security practices while referencing a Department of Homeland Security's Cyber Safety Review Board (CSRB) report that identified security failures and poor cybersecurity culture and focus within Microsoft. This report may influence customer decisions: Google or Microsoft?</span><br></div></div>
</div><div data-element-id="elm_56cGU861fzF3e56LbX-Khw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_56cGU861fzF3e56LbX-Khw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Scathing report from DHS</span></h2></div>
<div data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Microsoft's security vulnerabilities reached a critical point recently, exposing U.S. and U.K. government customers in a series of high-profile attacks. Notably, a 2023 incident by Storm-0558 compromised sensitive government accounts across 22 organizations, impacting over 500 individuals and tens of thousands of emails. This breach triggered a scathing report from the Department of Homeland Security's Cyber Safety Review Board (CSRB). The report exposed a chain reaction of security failures and a corporate culture that downplayed both enterprise security investments and rigorous risk management.</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Further amplifying concerns, a separate high-profile incident involved state-backed cyber actors known as Midnight Blizzard. This group successfully compromised Microsoft corporate email accounts, enabling them to steal email exchanges between Federal Civilian Executive Branch (FCEB) agencies and Microsoft. This critical breach prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue Emergency Directive ED 24-02.</span><span style="color:inherit;"><br></span></p></div>
</div><div data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What is the real target?</h2></div>
<div data-element-id="elm_cMJALKBXRETg9ykTfXr-fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cMJALKBXRETg9ykTfXr-fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It's pretty obvious now that government agencies are a prime target for cyberattacks due to their sensitive data and many other factors. Most agencies heavily rely on Microsoft products.&nbsp;</span><span style="color:inherit;">In a 2022 Google survey, 84% of all Washington, D.C. metro area employees use Microsoft products. Furthermore a broader survey from Omdia found 85% of all federal government employees use Microsoft.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Google Workspace has sizable market share in the business, education, and healthcare sectors -&nbsp;</span><span style="color:inherit;">largely due to its ease of use, simple and intuitive interface, comprehensive billing, and most importantly advanced cybersecurity protections built-in.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Does that mean bad actors are targeting customers of Microsoft or going after specific targets of interest? That remains to be seen but likely a little of both. If the target is interesting enough it doesn't matter what platform or systems are used.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Another important question might be: if the tables were turned, Google happened to have higher market share in government, would the &quot;scathing report&quot; be about them? Of course Google doesn't think so.&nbsp;</span></p></div>
</div><div data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Things to consider</h2></div>
<div data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>No one is suggesting you haul off and switch you entire business or government agency from Microsoft to Google (oh, wait... no, that is exactly what Google is hoping for!) but, it might be a good opportunity for a deeper inspection and even a thorough evaluation/comparison of the two. At the least to see what the other has to offer. At least the whitepaper is compelling enough for customers to probe for more.&nbsp;</p><p><br></p><p>Considering such a decision is so big and impactful for everyone involved, consider outside help. A technology adviser or IT consultant can guide you through the process and introduce you to the right experts and partners.&nbsp;</p></div>
</div><div data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Not all is lost</h2></div>
<div data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Google is certainly an option, and a pretty good one at that. Microsoft has made announcements addressing some of the concerns outlined in the report. They are making efforts to change the behavior and culture within Microsoft ranks. A recent Dark Reading article reports that a</span><span style="color:inherit;">t least a portion of executive compensation will be tied to meeting security goals.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Our advice always has been and remains: get the right partner in place. Having the right Microsoft&nbsp;<span style="font-style:italic;font-weight:bold;">or</span>&nbsp;Google partner will have profound impact on your experience with either platform. Consider Cloud 9 your partner finder! That's all we do - connect our clients with the right partners, vendors, suppliers and service providers for Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 Jun 2024 16:13:10 -0500</pubDate></item><item><title><![CDATA[Remote Staff Optimization]]></title><link>https://www.cloud9advisers.com/News/post/remote-staff-optimization</link><description><![CDATA[We made it through that mess! There's a little bit lingering but at least we're over the hump. It does, however, beg the question, what now?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_pomPfw7-TpmO8Zg7gws3rg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8H7Q8wTtQV-80GJi8TGzuw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_kZxkLjCuQ82PxGsec3LR9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Y7LkMneySbuG_2v2v5AnjA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Y7LkMneySbuG_2v2v5AnjA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Remote Staff Optimization</h1></div>
<div data-element-id="elm_XG0PgOzMDOeLtcyfoAS2iA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_XG0PgOzMDOeLtcyfoAS2iA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ET-JZ2sWTigR8IJ2xXrjaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ET-JZ2sWTigR8IJ2xXrjaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_p3uV36hF4ec8UeccaeCwhA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_p3uV36hF4ec8UeccaeCwhA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">As a business leader, here's what you need to know</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We made it through that mess! There's a little bit lingering but at least we're over the hump.&nbsp; It does, however, beg the question, what now? Work at home declarations from the CDC and other government agencies have now become the new normal for so many of us. Many surveys from different sources have suggested that even though offices are open, over 65% of employees that have the option, say they would prefer and plan on staying at home or only a partial return to the office.&nbsp;</span><br></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">So how can you as a business owner keep staff productive and efficient and a work-at-home team that still performs at a high level?&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We've created a step-by-step process to help.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Six Steps to Enable &amp; Optimize Your Remote Workers:</span></p><ol><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">High-Speed Internet</span><span style="font-size:12pt;"> - The first thing you need to do as a business owner is to survey your employees to see what kind of broadband they are using at home. To run business voice and video calls, they're going to need plenty of throughputs. A good standard that should provide enough horsepower is 50 Mb down, 5 Mb upload speed.<br><br></span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Move Your Phone System to the Cloud</span><span style="font-size:12pt;"> - Here are the key features of UCaaS that will enable your work-at-home employees by leveraging the benefits of unified communications in the Cloud:&nbsp;</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Video Conferencing&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Mobile App&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Collaboration&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">CRM Integration<br><br></span></p></li></ul><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Move Your Desktop Workspace to the Cloud - </span><span style="font-size:12pt;">With Active Directory, you can ensure certain file-sharing rules within your own Local Area Network. Two promising technologies address these features and move them all to the Cloud while maintaining centralized control over access permissions.&nbsp;</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Workspace as a Service&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Desktop as a Service<br><br></span></p></li></ul><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Move Your Contact Center to the Cloud - </span><span style="font-size:12pt;">Does your business have a contact center or help desk in-office? Having a Cloud Contact Center solution allows your employees to support your clients while working from home.<br><br></span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Identify &amp; Provide Necessary Devices - </span><span style="font-size:12pt;">Don't let Coronavirus hold your company back; make sure that your employees have the technology they need:</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Mobile or soft phone</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Desktop or lap top computer<br><br></span></p></li></ul><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Remote File Share - </span><span style="font-size:12pt;">When you send your workers home, they must be able to share, collaborate on, and store files in the Cloud. The most popular cloud file storage providers are:&nbsp;</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Microsoft 365 (OneDrive)&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Google Workspace (Google Drive)&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Dropbox&nbsp;</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Box.com</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">and others like Zoho One</span></p></li></ul></ol><p style="margin-bottom:10pt;"><span style="font-size:12pt;">If you'd like assistance with optimizing your current work-at-home strategy or need help putting a plan in place, contact us and we'll set you up with one of our trusted advisers and a team of experts. Between them and our vendor-neutral engineering team we’ll find the perfect vendors, carriers, and service providers that will solve problems fast. For more information reach out to us now.</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div></div><div data-element-id="elm_filruWSHhE9o6-zWhzvNjw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_filruWSHhE9o6-zWhzvNjw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_XI43SGP0RKeKUx3Xf4WXjw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_XI43SGP0RKeKUx3Xf4WXjw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us -&amp;gt; book appointment"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 16 Jul 2021 11:43:20 -0500</pubDate></item><item><title><![CDATA[M365 needs backup!]]></title><link>https://www.cloud9advisers.com/News/post/m365-needs-backup</link><description><![CDATA[It's your data. It's your responsibility. Microsoft’s own documentation recommends that customers M365/O365 seek third-party backup solutions and/or services for whenever possible. There is no actual backup in place for M365/O365 and no self-service option for recovery.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__oJAGeAHSmaCA641mv1_uQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_4xCwuxEyQx6geQJ1sY4dTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_jLhKBcAfTJ-c_iSWpcNRSg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_qwgx7aF3QJuNIvurCqYH4g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qwgx7aF3QJuNIvurCqYH4g"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Third-Party Microsoft 365 Backup is Critical</span></h1></div>
<div data-element-id="elm_wtqJg3Z9gOilDRcLw6dNNQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_wtqJg3Z9gOilDRcLw6dNNQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Microsoft-365.jpg" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_9fx-CmXN5lVOWsSBBypRfg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_9fx-CmXN5lVOWsSBBypRfg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_nYpbQ7_ah7IiRBVDhMyikw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nYpbQ7_ah7IiRBVDhMyikw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_mw55Gc6ZWzYTxHSLSSwhsQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mw55Gc6ZWzYTxHSLSSwhsQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why would I need to backup my users' Microsoft Cloud data?</span></h2></div>
<div data-element-id="elm_3aYc3_sOTG0Yef4V_pg_yA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3aYc3_sOTG0Yef4V_pg_yA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>There is a lot of conflicting and confusing information out on the net about the subject of backing up Microsoft 365 (formerly Microsoft Office 365). In this case we are looking directly at the source. Microsoft’s own documentation, in the Service Availability section of its Services Agreements, recommends that customers seek out third-party backup solutions and/or services whenever possible. There is no actual backup in place for M365/O365 (Exchange Online/Emails, SharePoint, OneDrive) and no self-service option for recovery.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div><ul><li>Maintain ownership and control of data stored in Microsoft 365 - its your data, you are responsible for it, not Microsoft. Their responsibility is only to ensure that the service is operational and data is accessible.</li><li>Extend retention and recovery - Microsoft has limited, short-term data loss recovery, but no “point-in-time” recovery options, making recovery difficult in and of itself.&nbsp;</li><li>Compliance (if applicable): many regulatory bodies, like HIPAA for example, require third-party backup,&nbsp;<br></li><li>Employee turnover - don’t keep paying for licenses of users that have left the company, just keep the backup!&nbsp;<br></li><li>Single File recovery - Files are only linked to version histories, so if one file is deleted there is no way to go back and retrieve an earlier version – everything is gone. Whereas a backup offers multiple recovery points.</li></ul></div><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">While there may be a few more options for retention and recovery for SharePoint within </span>Microsoft<span style="color:inherit;">&nbsp;itself, as SharePoint grows, this can be a very costly proposition. Plus, too many administrators find the simplicity, low cost, and admin (and end-user) friendliness of cloud-to-cloud backup solutions--designed specifically for M365 backup plans-- just too good to pass up. Many of the most popular solutions can be found as a fully-managed service for </span>surprisingly<span style="color:inherit;">&nbsp;low monthly per user rates--like $4 to $6, and even lower at scale!</span></p><p><span style="color:inherit;"><br></span></p><div>For more info on several service providers that offer excellent and inexpensive M365/O365 backup options book an appointment with us now.&nbsp;</div><p><br></p></div>
</div></div><div data-element-id="elm_RTYmbqrCuNcw5lKFIF21UQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_RTYmbqrCuNcw5lKFIF21UQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_1mwA--4lZeTfOWie0wjAQw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_1mwA--4lZeTfOWie0wjAQw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_y_CsuOfGSBePFCmat36hcg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y_CsuOfGSBePFCmat36hcg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy the right technology solutions and not “get sold” on the wrong ones. We work with you to rationalize and reduce technology spending without sacrificing technology itself and employ sound digital transformation principles and strategies.</div><p style="text-align:left;"><br></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We facilitate decisions by diagnosing problems then prescribing the right procedures and “medication”.&nbsp;</div><p style="text-align:left;"><br></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p style="text-align:left;"><br></p><div>To learn more about the wonderful world of Microsoft contact us today and book an appointment. We'll introduce you the best Microsoft Partners and Integrators and get you squared away.&nbsp;</div></div>
</div><div data-element-id="elm_MrThPLJ0RD6apHpvogogTw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_MrThPLJ0RD6apHpvogogTw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 22 Feb 2021 16:33:02 -0500</pubDate></item><item><title><![CDATA[Cloud Adoption: One Big Hurdle ]]></title><link>https://www.cloud9advisers.com/News/post/cloud-adoption</link><description><![CDATA[Connectivity is the hidden risk in cloud adoption. We examine why unpredictable networks (downtime, jitter, and packet loss) can destroy the ROI of SaaS and UCaaS, and detail the strategic steps small businesses must take to secure a reliable connection strategy.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ngJ6qpARZhPs3vJakmuvsg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pJmnsLlnufz9qpiDPEyOMg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_8Tjx1EioRXqHRh1I9U3ddA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_vCmjHUeRX9CAPIKtfAdvVw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h1
 class="zpheading zpheading-style-none zpheading-align-left zpheading-align-mobile-left zpheading-align-tablet-left " data-editor="true"><span>Cloud Adoption: The Connectivity Challenge is Your Small Business’s Greatest Hidden Risk</span></h1></div>
<div data-element-id="elm_E4hjl5fgReCdupFE6X8CTA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_E4hjl5fgReCdupFE6X8CTA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_E4hjl5fgReCdupFE6X8CTA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_E3dgyAhhbIjrBfvjnbO7UQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span>Unreliable connectivity—defined by unpredictable downtime, jitter, and packet loss—can completely undermine the productivity gains and financial investment in every cloud service your business uses.</span></p></div>
</div><div data-element-id="elm_-7-9JbLhTy6mnhb-92CGMw" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_-7-9JbLhTy6mnhb-92CGMw"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_-7-9JbLhTy6mnhb-92CGMw"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_FKB7vpoDBfOpLNCcTqc3Lw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column="false"><style type="text/css"></style><div data-element-id="elm_wtXJV-irX5iMOreKTbQ19A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_UrWnha9B3ch0dyin7EUUgA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p></p><div><h3>Cloud Adoption: The Connectivity Challenge is Your Small Business’s Greatest Hidden Risk</h3><p>For the modern small business, &quot;the cloud&quot; is less about complex compute and storage in hyperscale environments like AWS and Azure, and more about the indispensable <strong>software services</strong> you use every hour of every day:</p><ul><li><p><strong>SaaS (Software as a Service):</strong> Microsoft 365, Salesforce, QuickBooks Online, and specialized industry applications.</p></li><li><p><strong>UCaaS (Unified Communications as a Service):</strong> Your cloud-hosted VoIP phone systems, video conferencing, and team collaboration platforms.</p></li><li><p><strong>DRaaS (Disaster Recovery as a Service):</strong> Your critical data backups and continuity solutions.</p></li></ul><p><br/></p><p>These services represent your entire operational reality. Yet, every single one of them relies on a single, fragile foundation: <strong>your internet connection</strong>.</p><p><br/></p><p>The true challenge of cloud adoption isn't the software itself; it's the unpredictable nature of the connectivity between your office, your remote workers, and the cloud provider. One major challenge is connectivity, and its volatility can completely undermine the productivity gains and financial investment in every single service you adopt.</p><h3><br/></h3><h3>The Hidden Cost of &quot;Unhealthy&quot; Uptime</h3><p>When business leaders think of network issues, they typically think of a catastrophic <strong>outage</strong>—the line goes dead, and work stops. While disruptive, this is a clean, visible problem.</p><p><br/></p><p>The far more insidious and expensive problem is the <strong>&quot;unhealthy&quot; uptime</strong>. This is when your connection is technically &quot;up&quot; but is functionally unusable for critical cloud applications. This lack of reliability stems from four core technical issues:</p><ol><li><p><strong>High Latency:</strong> The delay before a transfer of data begins following an instruction for its transfer. In simple terms, the lag that makes your cloud-hosted accounting software feel slow and sluggish.</p></li><li><p><strong>Jitter:</strong> The variation in the time delay between when a signal is sent and when it is received. This is the killer for real-time services like VoIP and video conferencing, causing dropped words and echoing.</p></li><li><p><strong>Packet Loss:</strong> Data packets fail to reach their destination and must be re-sent, creating gaps in service. This results in dropped calls, frozen video streams, and slow file saves in your SaaS applications.</p></li><li><p><strong>Asymmetric Speeds (Upload Bottleneck):</strong> Connections using Coax, usually from you typical local Cable internet provider, typically offer dramatically faster download speeds than upload speeds (asymmetric). Since modern cloud use—including phone calls, video conferencing, data backup, and saving large files to cloud storage (like SharePoint/OneDrive)—requires <em>upload</em> capacity, this bottleneck creates severe congestion and frustration.</p></li></ol><p><br/></p><p>While a nationwide survey may cite an average of a few hours of total downtime per month, that same data often reveals dozens of hours of <strong>unhealthy uptime</strong>—where employees are technically connected but experiencing frustration, lag, and decreased productivity. This is a non-stop drain on efficiency and staff morale.</p><h3><br/></h3><h3>Why Small Businesses are Uniquely Vulnerable</h3><p>Small and mid-sized businesses (SMBs) are disproportionately affected by poor connectivity because of common infrastructure choices:</p><h4><br/></h4><h4>1. Over-reliance on Single ISP Links</h4><p>Many small businesses rely on a single, often residential-grade or lower-tier commercial <strong>Internet Service Provider (ISP)</strong> link. When that single connection fails, everything stops. Even fiber connections are not immune to issues like fiber cuts, power outages at the local node, or ISP equipment failures. The lack of true geographic or provider redundancy means the entire business is running on a single point of failure.</p><h4><br/></h4><h4>2. The Unpredictability of Shared Infrastructure</h4><p>The infrastructure used by most mass-market ISPs is <strong>shared</strong>. This means your available bandwidth, latency, and performance are often dictated by what your neighbors or other businesses are doing at any given moment. During peak usage hours, service quality degrades, making high-priority tasks like a team video conference or a large file upload frustratingly slow.</p><h4><br/></h4><h4>3. VoIP/UCaaS Requires Enterprise-Grade Quality</h4><p>Voice over Internet Protocol (VoIP) and Unified Communications as a Service (UCaaS) are business-critical, but they are unforgiving. Unlike email, which can tolerate high latency, UCaaS requires a consistent, low-latency, low-jitter connection. Running your phone system over an &quot;unhealthy&quot; network guarantees poor call quality, which erodes professionalism and frustrates clients. Small businesses must prioritize <strong>Quality of Service (QoS)</strong> management, which is often complex and impossible to implement effectively on basic ISP links.</p><h3><br/></h3><h3>Building a Bulletproof Connectivity Strategy</h3><p>Solving the connectivity challenge is not about overpaying for bandwidth; it's about engineering <strong>resilience and performance</strong> into your network foundation. This requires a shift from a reactive mindset to a strategic one.</p><h4><br/></h4><h4>1. Embrace Diversity and Redundancy</h4><p>The absolute first step is eliminating the single point of failure. This means establishing true network redundancy by adopting a <strong>Multi-ISP Strategy</strong>. This is about getting diverse connections—two different physical lines from <strong>two different carriers</strong> that enter the building at two different points. This protects you from common failures like local fiber cuts or a single ISP's regional outage. Technologies like 5G wireless backup can provide excellent resilience for smaller offices when wired options are limited.</p><h4><br/></h4><h4>2. Deploy SD-WAN for Traffic Intelligence</h4><p>Simply having two connections is not enough; you need a brain to manage them. <strong>Software-Defined Wide Area Networking (SD-WAN)</strong> is that brain. SD-WAN intelligently monitors the performance metrics of all available links (latency, jitter, and packet loss) in real-time.</p><ul><li><p><strong>Automatic Prioritization:</strong> SD-WAN automatically routes critical traffic (like VoIP and video) over the best-performing link, even if the primary link is experiencing a period of &quot;unhealthy&quot; uptime.</p></li><li><p><strong>Failover and Load Balancing:</strong> It enables seamless, millisecond-level failover between links and allows you to load balance non-critical traffic, ensuring you utilize the full capacity of your bandwidth portfolio. SD-WAN is essential insurance against the unpredictable nature of the internet.</p></li></ul><h4><br/></h4><h4>3. Assess Requirements, Not Just Bandwidth</h4><p>Before signing any contract, businesses must calculate their true needs based on application requirements. You must move beyond the simple &quot;speed&quot; number (Mbps) and assess the technical requirements for applications like your ERP, VoIP, and video conferencing. A strategic partner can help you define <strong>service level agreements (SLAs)</strong> that hold providers accountable not just for uptime, but for specific performance metrics like latency and packet loss.</p><h3><br/></h3><h3>Create a Sure Foundation</h3><p>The digital transformation driven by the cloud has empowered small businesses with tools previously available only to large enterprises. However, this shift has also transferred the risk of connectivity directly to the business owner. Without a reliable network foundation, the benefits of SaaS, UCaaS, and all other cloud investments will never be fully realized.</p><p><br/></p><p>The key to de-risking your cloud adoption is understanding that your connectivity strategy must be as robust as the services you are adopting. It requires impartial evaluation, a clear understanding of the risks posed by &quot;unhealthy&quot; uptime, and access to a portfolio of solutions beyond the standard ISP offering.</p><p><strong><br/></strong></p><p><strong>Technology. Driven. Outcomes.</strong></p><h3><br/></h3><h3>Next Step</h3><p>If your business is plagued by dropped calls, slow cloud applications, or general frustration due to network unpredictability, it's time to build a resilient connection strategy.</p><p><br/></p><p>If you are ready to identify and evaluate the best connectivity solutions and providers—including SD-WAN, multi-ISP redundancy, and specialized high-performance options—to create a bulletproof connection strategy, <strong>get in touch</strong> to explore your options.</p></div><p></p></div>
</div><div data-element-id="elm_hwEgO-78Wu_8yp21-RHe2g" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-left zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/sdwan"><span class="zpbutton-content">SDWAN Help</span></a></div>
</div></div><div data-element-id="elm_iXMyV1mS4gIRGfody1Nnbg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style></div>
</div><div data-element-id="elm_ZoOReEQZ3u4N6yv0s8zTbA" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_ZoOReEQZ3u4N6yv0s8zTbA"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_ZoOReEQZ3u4N6yv0s8zTbA"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_hDT4VB80umJz6l5jp-ezRg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-right zptext-align-mobile-left zptext-align-tablet-left " data-editor="true"><p><span style="font-weight:bold;">Related Articles:</span></p><p></p><div><p style="margin-bottom:5px;"><a href="https://www.cloud9advisers.com/News/post/bulletproof-internet-with-sdwan">Bulletproof internet with SDWAN<br/></a><a href="https://www.cloud9advisers.com/News/post/redefining-connectivity-in-the-digital-age">Redefining Connectivity in the Digital Age</a></p></div><br/><p></p></div>
</div><div data-element-id="elm_Mq9GypxIdqNz-dM-BhYy6A" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-right zpbutton-align-mobile-center zpbutton-align-tablet-center"><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="javascript:;"><span class="zpbutton-content">Button</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 29 Nov 2018 17:20:42 -0500</pubDate></item></channel></rss>