<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/security/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #security</title><description>Cloud 9 Advisers - News #security</description><link>https://www.cloud9advisers.com/News/tag/security</link><lastBuildDate>Sat, 28 Feb 2026 01:40:37 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Google: an alternative]]></title><link>https://www.cloud9advisers.com/News/post/Google-an-alternative</link><description><![CDATA[Microsoft faces scrutiny after scathing report from DHS. Google says they have the answer.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_u-QY0OelTWGp4Es5KyYmFw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ovuYVeo1TOuWDC5fcZ48Ng" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_c2y0JAAyTLerfOTvl5YgPQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ryOOEMMxSB2YnE4kexSKHw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Google Raises Concern's about Microsoft Security: New Whitepaper shows</h1></div>
<div data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V-wCJ9jDRYSCN4dMviZWzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div>The Department of Homeland Security’s Cyber Safety Review Board (CSRB) found that repeated security breaches against the federal government were due to a cascade of security failures at Microsoft, as well as a corporate culture that deprioritized cybersecurity.&nbsp;<br>Google proposes a safer alternative.</div></div></div>
</div><div data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width: 500px ; height: 644.19px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } @media (max-width: 767px) { [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"] .zpimage-container figure img { width:500px ; height:644.19px ; } } [data-element-id="elm_WfwYsgawqMb5b6LsvZ_ukA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/Google-alternative.png" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Google-alternative.png" width="500" height="644.19" loading="lazy" size="medium"/></picture></a></figure></div>
</div><div data-element-id="elm_h357TC0quc1SuRJpz_me8w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_h357TC0quc1SuRJpz_me8w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-style:italic;"><a href="/Google-alternative.png" target="_blank" rel="" download="">View and download Google's whitepaper</a></span></p></div>
</div><div data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_nhzYNJzuKlF1vKoJ0VHZYg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_dxQDNJLGlOeIqRovLpSFNQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jz4YBHWbEewE_pgmvw-RIw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><span style="color:inherit;">Following several high-profile cybersecurity incidents, Microsoft faces scrutiny. Google's new white paper, &quot;A More Secure Alternative,&quot; highlights its own security practices while referencing a Department of Homeland Security's Cyber Safety Review Board (CSRB) report that identified security failures and poor cybersecurity culture and focus within Microsoft. This report may influence customer decisions: Google or Microsoft?</span><br></div></div>
</div><div data-element-id="elm_56cGU861fzF3e56LbX-Khw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_56cGU861fzF3e56LbX-Khw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Scathing report from DHS</span></h2></div>
<div data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nYxwLwsw_aAcuVYWxZcozQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Microsoft's security vulnerabilities reached a critical point recently, exposing U.S. and U.K. government customers in a series of high-profile attacks. Notably, a 2023 incident by Storm-0558 compromised sensitive government accounts across 22 organizations, impacting over 500 individuals and tens of thousands of emails. This breach triggered a scathing report from the Department of Homeland Security's Cyber Safety Review Board (CSRB). The report exposed a chain reaction of security failures and a corporate culture that downplayed both enterprise security investments and rigorous risk management.</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Further amplifying concerns, a separate high-profile incident involved state-backed cyber actors known as Midnight Blizzard. This group successfully compromised Microsoft corporate email accounts, enabling them to steal email exchanges between Federal Civilian Executive Branch (FCEB) agencies and Microsoft. This critical breach prompted the Cybersecurity and Infrastructure Security Agency (CISA) to issue Emergency Directive ED 24-02.</span><span style="color:inherit;"><br></span></p></div>
</div><div data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9hIyhKf8S6fnAw4VdXdc1Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What is the real target?</h2></div>
<div data-element-id="elm_cMJALKBXRETg9ykTfXr-fw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cMJALKBXRETg9ykTfXr-fw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">It's pretty obvious now that government agencies are a prime target for cyberattacks due to their sensitive data and many other factors. Most agencies heavily rely on Microsoft products.&nbsp;</span><span style="color:inherit;">In a 2022 Google survey, 84% of all Washington, D.C. metro area employees use Microsoft products. Furthermore a broader survey from Omdia found 85% of all federal government employees use Microsoft.</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Google Workspace has sizable market share in the business, education, and healthcare sectors -&nbsp;</span><span style="color:inherit;">largely due to its ease of use, simple and intuitive interface, comprehensive billing, and most importantly advanced cybersecurity protections built-in.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Does that mean bad actors are targeting customers of Microsoft or going after specific targets of interest? That remains to be seen but likely a little of both. If the target is interesting enough it doesn't matter what platform or systems are used.&nbsp;</span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Another important question might be: if the tables were turned, Google happened to have higher market share in government, would the &quot;scathing report&quot; be about them? Of course Google doesn't think so.&nbsp;</span></p></div>
</div><div data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ZTp96G2cbgRnWPlG7qivJA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Things to consider</h2></div>
<div data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__a2f0a4B0V5jsys1HlL8RQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>No one is suggesting you haul off and switch you entire business or government agency from Microsoft to Google (oh, wait... no, that is exactly what Google is hoping for!) but, it might be a good opportunity for a deeper inspection and even a thorough evaluation/comparison of the two. At the least to see what the other has to offer. At least the whitepaper is compelling enough for customers to probe for more.&nbsp;</p><p><br></p><p>Considering such a decision is so big and impactful for everyone involved, consider outside help. A technology adviser or IT consultant can guide you through the process and introduce you to the right experts and partners.&nbsp;</p></div>
</div><div data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tNFWR6qzz0OTikR0n4fhuw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Not all is lost</h2></div>
<div data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1zxIA4_HucmU0pK1ImCFJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Google is certainly an option, and a pretty good one at that. Microsoft has made announcements addressing some of the concerns outlined in the report. They are making efforts to change the behavior and culture within Microsoft ranks. A recent Dark Reading article reports that a</span><span style="color:inherit;">t least a portion of executive compensation will be tied to meeting security goals.&nbsp;</span><br></p></div>
</div></div><div data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_2dEVl9wZlOfk2CYGetsclQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_S9nU6SDRSiSZJfD2HD_3Sg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div><div data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_G6Xcpe5SPdt-N-uFxYciiQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_S-XtmrxKEr2JyNb1whXBJQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Our advice always has been and remains: get the right partner in place. Having the right Microsoft&nbsp;<span style="font-style:italic;font-weight:bold;">or</span>&nbsp;Google partner will have profound impact on your experience with either platform. Consider Cloud 9 your partner finder! That's all we do - connect our clients with the right partners, vendors, suppliers and service providers for Cybersecurity, Communications, Connectivity, and Cloud.&nbsp;</p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 17 Jun 2024 16:13:10 -0500</pubDate></item><item><title><![CDATA[Key security Concepts, 1]]></title><link>https://www.cloud9advisers.com/News/post/key-security-concepts-1</link><description><![CDATA[A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; Key ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_jbJe4SA1Q_qeeBdh4gJftQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kn84HiEaSvuEvI3Jf0Lq_Q" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LTQQzcB5R-izLAEoD7QYew" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_xZ4RVIY-SiOuLhBNJi3zYg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Confidentiality. Integrity. Availability.</span><br></h1></div>
<div data-element-id="elm_SFTsRTD1gvcObz1xf2likA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width: 596.35px !important ; height: 519px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } @media (max-width: 767px) { [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"] .zpimage-container figure img { width:596.35px ; height:519px ; } } [data-element-id="elm_SFTsRTD1gvcObz1xf2likA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Security%20-%20Three%20of%20Three%20-1-.svg" width="596.35" height="519" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vq6o0PLjT8iiytTJaLwNEA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><span style="color:inherit;">A cybersecurity framework is a set of practices, policies, and procedures that help an organization to create an effective security program.&nbsp; </span><span style="color:inherit;">Key&nbsp;</span><span style="color:inherit;">concepts for Cybersecurity is starting with a framework. There are plenty of pre-built frameworks available to guide you based on your industry, like NIST, PCI, HIPAA, ISO and more. But before you go there, and maybe before you even pick one, you should start with the Three Rules or Three. The first set starts with Confidentiality, Availability, and Integrity. This is the fine balancing act for Cybersecurity, also known as the “bedrock principle for Cybersecurity.” There’s no such thing as perfect security, you can’t spend all resources on all three areas - so focusing on your specific business needs, and identifying which of these are most important to your business and the separate business units helps properly align Cybersecurity solutions with business outcomes.</span></div></div></div>
</div><div data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bJjyTVv7SSUchbztXC2Mdg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>If your an accounting firm integrity of data might be most important to you. If your an e-commerce company, then availability is critical. If you're in healthcare, confidentiality may be paramount. Start with the overall needs of the business as a whole, then drill down to the specific needs of each department or business unit. Striking the balance is also important from department to department.&nbsp;</p></div>
</div><div data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8Hb7wbUbTVGvKPUdqBStGQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/cybersecurity"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 May 2024 05:42:00 -0500</pubDate></item><item><title><![CDATA[Under Constant Attack]]></title><link>https://www.cloud9advisers.com/News/post/under-constant-attack</link><description><![CDATA[Most companies only have basic firewall protection, generally hardware-based and maybe a few others may conduct regular scans of their environment. Really no different than your home having a basic lock and maybe a deadbolt.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_PeBlM-B7QBSoRizcLxfeFg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bVe8xmGiRf2NMBIZ-WIqQw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_RkvKXUFZSsSuqpus-rrQQw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IJhu5s4OSu-WhUxJzptDAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Constant attacks require constant Security<br></h2></div>
<div data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGCsf9_QQSqoCd-C8PQKtQ"].zpelem-text { border-radius:1px; padding:100px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>We’re in an environment where our systems are constantly under attack. They're under attack from all sorts of diverse players who are trying to take advantage of the private proprietary information that is available.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Companies are really focused on compliance ensuring that they are protecting their business value from these types of attacks. Every executive has an obligation to ensure that they are compliant with security.&nbsp;<br></div><p><br></p><div>What are most companies doing for security?&nbsp;</div><p><br></p><div>Most companies only have basic firewall protection, your basic intrusion prevention (not necessarily intrusion detection), generally just hardware-based. A few others may do just a little more; they may conduct regular scans of their environment. This is really no different than your home having a basic lock and maybe a deadbolt. There is no alarm system like you might have in a home to see and be alerted when intrusions are happening. Being alerted of intrusion is critical in business so that more immediate actions can be taken. Often enough, attacks can be sly and stealthy. Recent studies show that malicious code is embedded on business systems for more than 250 days before it is ever used to promote an actual attack. The reason being so that attackers know their code is also well planted in several layers of business backups as well as active systems.&nbsp;</div><p><br></p><div>How have today’s complex attacks changed systems and the approach to security?&nbsp;</div><p><br></p><div>The attacks are becoming more sophisticated, automated,&nbsp; and voluminous, so we no longer have the time nor capability to react in a manual way. We actually have to have machine learning and other artificial intelligence technologies to adapt and scan the environment much more rapidly looking for these constant intrusions malicious code, and breeches. These technologies work in tandem with professional cybersecurity teams and Security Operations Centers (SOCs) to constantly manage, monitor, and alert. The trick with alerts is dramatically reducing false positives. Too many alerts are just as futile as too few.&nbsp;</div><div><br></div><div>How much does a cyber attack cost?&nbsp;</div><p><br></p><p>Recent US cyber crime studies show an average measurement of damage from a breach: a 46 day long average resolution at an average of $21k per day, plus regulatory fines, and major customer fallout. These attacks can be highly damaging to any business. Cyber insurance can only go so far and cover so much. Claims can also be denied for a host of often confusing reasons, leaving the business to fit the bill. These newer types of cyber insurance policies have many requirements and stipulations, and with a sense of irony, those requirements are very much cybersecurity technology many of which are security technology related.<br></p><p><br></p><div>Contact us today and let’s evaluate your business security posture.</div></div>
</div><div data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_V_pS7vRFMwv4ksSL0MwbfQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">About Cloud 9</h2></div>
<div data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Gf5rwbhOiBsyYeCiU86xLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Cloud 9 Advisers is a client-only, client-focused agency and consulting group offering vendor selection and management services to help you solve IT and general technology problems fast. We'll walk you through the identification, research, evaluation, and comparison process, provide board-ready documentation and due diligence, and provide oversight of solution implementation on any of our 250+ vendors, carriers, and service providers.&nbsp;</p><p><br></p><p>Our teams of vendor-neutral security focused engineers will help you slice through the marketing fluff and&nbsp; industry jargon so you know what you're buying. We'll help you make smart IT investments quickly and confidently. Reach out to us today!</p></div>
</div><div data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-ynmqeVSS66pw0SgNPNkFg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us page"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 21 Jul 2021 14:59:22 -0500</pubDate></item><item><title><![CDATA[Prevent Ransomware with MFA]]></title><link>https://www.cloud9advisers.com/News/post/prevent-ransomware-with-mfa</link><description><![CDATA[Ransomware sucks. Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Let your IT team focus on driving business objectives, instead of solving end-user identity needs and issues.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yeyNloZvQVKhDt09nuLYrA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dvoy5wZ-THK8Rl2Fqo-VCA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_4Z1tnjhjQxOBei_hnBcdNA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_siTp3FGrSkaQ1SejftAhtw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_siTp3FGrSkaQ1SejftAhtw"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Ransomware is a real and growing problem</span></h1></div>
<div data-element-id="elm_vjor8-lEOHCbcK1nNYvs9w" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_vjor8-lEOHCbcK1nNYvs9w"].zprow{ border-radius:1px; } </style><div data-element-id="elm_Jfida0c1l_Agl9amuEr0GQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_Jfida0c1l_Agl9amuEr0GQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_HWxkU9To7zy3MeJUzEzuGg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HWxkU9To7zy3MeJUzEzuGg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Anyone remember the pipeline incident waaaaay back in May? Many leaders realize it and some have elected to investigate and subscribe to cybersecurity/ransomware insurance. However, before any insurance company will cover you, they need to have assurances. They each have their own checklist of requirements. Those requirements are, as you may have guessed, cybersecurity technology related (in addition to people, policies, and procedures). Undoubtedly, MFA is on every one of those checklists. Two-Factor Authentication (2FA) is also a variant of MFA.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Multi-Factor Authentication is an important identity management and access control measure requiring users to verify their identity even after the proper credentials have been entered. This extra verification is done through a second device or other method, typically via smartphone, after attempting to login to company apps and resources.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">There are quite a few options and ways to implement MFA and other identity &amp; access management (IAM). Rather than having IT try and figure out the best solution, software, and methods to set up MFA properly on your own, consider a seasoned expert service provider (and let IT continue to do what they do best).&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Such services are sometimes referred to as IDaaS, Identity as a Service, and these services can manage user identities across simple, and the most complex, interconnected environments protecting critical data and applications no matter where they reside– public, private, hyper cloud, hosted, on-premises; here or on the other side of the world.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Identity as a Service (IDaaS) is ideal for organizations wrestling with making network access easy for staff, without compromising security. Let</span><span style="font-size:12pt;">&nbsp;your IT team focus on driving business objectives, instead of solving end-user identity needs and issues.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;"><br></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:bold;">Why IDaaS?</span></p><p style="margin-bottom:10pt;"><span style="color:inherit;font-size:16px;">As ransomware and cyberthreats increase in prevalence and sophistication identity and access control, as a part of an overall security program, have become even more important within IT landscapes to preserve the sanctity of business data and applications.</span><span style="font-size:12pt;font-weight:bold;"><br></span></p><div><ul><li>Verify&nbsp;users are who they claim to be</li><li>Grant users access to only the apps, files, and resources they need at the right time<br></li><li>Ensure users have access across complex enterprise environments<br></li><li>Reduce dependence on security knowledge of individual users<br></li><li>Reduce risk of external threats<br></li><li>Simplify and centralize security<br></li><li>Reduce the number of password-related IT issues</li><li>Free up IT to focus on critical business initiatives</li></ul></div><p style="margin-bottom:10pt;"><span style="font-size:12pt;"><br></span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">What MFA, 2FA, or other IAM methods are employed for your business?</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">What challenges did you face?</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Are your users satisfied with the ease of access, or do they simply put up with it?</span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div></div><div data-element-id="elm_1s7ZZfs8_ML9Cu-gxF56oA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_1s7ZZfs8_ML9Cu-gxF56oA"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_XotNJKNlQvy595s6b4lOLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XotNJKNlQvy595s6b4lOLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Get connected with the right vendors. Get help evaluating those vendors and solutions so you can get the best MFA or other Identity &amp; Access Management (IAM) service, fast. Cloud 9 is the only 100%, vendor-neutral, cybersecurity expert that has the resources and portfolio of security vendors and service providers to get your problems solved quickly and confidently.&nbsp;</p></div>
</div><div data-element-id="elm_V3hxsagjSKWMfArkgmFZrQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_V3hxsagjSKWMfArkgmFZrQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us -&amp;gt; book appointment"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 14 Jul 2021 09:55:52 -0500</pubDate></item><item><title><![CDATA[Never Trust and Always Verify]]></title><link>https://www.cloud9advisers.com/News/post/never-trust-and-always-verify</link><description><![CDATA[Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_TAHtRM7MTwyz93DQF4vulQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_EK0C27GDQIeK-T7DwhG40g" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_1wDa-H2ITMKidvNyBIDVAg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6xmd7dxZROuVXa4jR6sTrg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Zero Trust Picking up Steam in the Enterprise</h2></div>
<div data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_MurS2mZbgH6qIQkLiZMx9g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/ZeroTrustSecurity.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_3MYoUag1of7CYIZHqfMTrA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_3MYoUag1of7CYIZHqfMTrA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_KX-DnESpwPeszGZSn0xybQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_KX-DnESpwPeszGZSn0xybQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_gmq_CGqL3txZQszRpkTkTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gmq_CGqL3txZQszRpkTkTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:16px;">Never Trust and Always Verify. Hmm, doesn't sound very productive in most business situations, but if you're talking about technology and security, I think we might be on to something. </p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">&quot;The traditional perimeter-based security model is dead. It has been overtaken by an era of cloud, mobility, and BYOD that requires a new approach to network access control.&quot;</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">The Zero Trust Network Access (ZTNA) model is a new method of access control that considers all network connections untrusted. This is a shift from the traditional concept of an inside/outside network where only some connections were considered trusted. The ZTNA model requires organizations to consider all traffic as potential threats, which means security controls must be in place at every stage of the attack lifecycle and beyond the firewall layer into your environment.</span><br></p><p style="font-size:16px;"><br></p><p style="font-size:16px;"><span style="color:inherit;">Never Trust and Always Verify</span>&nbsp;is the general premise behind Zero Trust Network Access (ZTNA). A strong proponent for the replacement of traditional remote access like Virtual Private Networking (VPN), where a secure tunnel straight into the corporate network is created and anything that goes through that tunnel is presumed &quot;safe&quot; and &quot;trusted&quot;. There are a number of &quot;faith-based&quot; assumptions that take place when using&nbsp; VPN. One big one being the remote device creating the tunnel is <span style="font-style:italic;">still</span>&nbsp;a trusted device. ZTNA takes a different approach: nothing is trusted and everything must be verified. This might seem laborious, but the user experience is minimally affected and security benefits are significant.</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">ZTNA is starting to turn heads with IT for its protection of applications, data, and networks, easier control, and innate simplicity allowing access to remote staff, suppliers, and contractors. Some providers offer client and clientless versions for far greater flexibility and no need to constantly update Active Directory just to let a supplier in for two hours worth of work. And even provided secure access to users' personal devices without the typically required &quot;big brother'&quot;intrusions.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">The real power of ZTNA comes when its combined with the power of a Secure Access Service Edge (SASE) solution. These two put together forms a full security barrier and flexible perimeter thoroughly protecting endpoints and users.&nbsp;</p><p style="font-size:16px;"><br></p><p style="font-size:16px;">Using disparate/separate SASE and ZTNA platforms can certainly be done, but should only be done so by the most adept and experience security professionals. The management interface and integration of these separated systems is highly complex. Many solutions exist&nbsp; that combine both SASE and ZTNA together with a single management interface. Some providers also offer a completely managed solutions as well.&nbsp;</p><p style="font-size:16px;"><br></p><p><span style="color:inherit;"></span></p><p style="font-size:16px;">Regardless there is a lot to consider. Contact us and we'll get you in contact with a Strategic Tech Expert to wal you through all of the options and find out who the best vendors are for your business</p></div>
</div></div><div data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_PcKNyCs_ulmjRBw_z99Axw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_iS6O_iNXLx1VEelRIBau9w" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_iS6O_iNXLx1VEelRIBau9w"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ" data-element-type="imageheadingtext" class="zpelement zpelem-imageheadingtext "><style> [data-element-id="elm_XnQzp6JOozkRcfrmluvmQQ"].zpelem-imageheadingtext{ border-radius:1px; } </style><div data-size-tablet="size-original" data-size-mobile="size-original" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimageheadingtext-container zpimage-with-text-container zpimage-align-right zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/C9-Logo1.t-all.png" data-src="/C9-Logo1.t-all.png" size="medium" data-lightbox="true" style="height:140px;width:271.85px;"/></picture></span></figure><div class="zpimage-headingtext-container"><h3 class="zpimage-heading zpimage-text-align-left " data-editor="true">About Cloud 9 Advisers</h3><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy great technology. We work with you to rationalize and reduce technology spending without sacrificing the technology itself and employ sound digital transformation principles and strategies.</div><p><span style="color:inherit;"><br></span></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We diagnose problems, prescribe solutions, and facilitate decisions.</div><p><span style="color:inherit;"><br></span></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>To learn more contact us today and book an appointment.</div><p><span style="color:inherit;"><br></span></p><div><br></div></div>
</div></div></div><div data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_80PupHh1TDWfZ5tzNRuEVw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 16 Mar 2021 17:11:26 -0500</pubDate></item><item><title><![CDATA[Legit Business Work]]></title><link>https://www.cloud9advisers.com/News/post/legit-business-work</link><description><![CDATA[How much of your corporate mobile data plan is going to legitimate business-related work? If you have a way to go back and look, good idea to do a quick review of usage and overages. You may be surprised with the results.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_YF773QzhRd6rpHg9T8-hcw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_YH1SRa2_S12eOXC5Bk2WKw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_B08icC68Qs6kjTPQ4ilxpg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_FtKjY438THaZjD_4bEi17A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FtKjY438THaZjD_4bEi17A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">How much of your corporate mobile data plan is going to legitimate business-related work?</span></h2></div>
<div data-element-id="elm_EVEcP0HRLvgpfUdyoVv7_g" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_EVEcP0HRLvgpfUdyoVv7_g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/corp%20mobile%20plans.jpg" size="original" alt="Cloud 9 will find you the right vendors to reduce your corporate mobile spend" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Y2-JlA7fx4SjR8ViijdZ3A" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_Y2-JlA7fx4SjR8ViijdZ3A"].zprow{ border-radius:1px; } </style><div data-element-id="elm_mVn6xGixpdlDybwl_azcqg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_mVn6xGixpdlDybwl_azcqg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_BnSJIpbyFTkHC1o9W0CG3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BnSJIpbyFTkHC1o9W0CG3w"].zpelem-text { border-radius:1px; margin-block-start:76px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;">How much of your corporate mobile data plan is going to legitimate business-related work?</span></div><div><br></div><div>If you have a way to go back and look, especially over this past year, it might be a good idea to do a quick assessment/review of usage and overages. You may be surprised with the results. It would be next to impossible to garner any real-world usage data out of any mobile bill itself but there are plenty of services and solutions that can provide deep insights.&nbsp;</div><div><br></div><div>In some cases you may find that usage is very low, in which case you'd want to adjust and trim plans so you're not paying for something that staff isn't using. On the other hand you may find that your bill has regular overage penalties, where you'll certain want better data.&nbsp;</div><div><br></div><div>I'm not suggesting you bring the hammer down on staff and lock things down. Everyone has it rough theses days. There needs to be some leeway.&nbsp; Regardless, it is good data to have so that when changes do need to happen you're prepared and ready to gradually change policies as needed. It is also especially helpful to spot abuse and blatant disregard for corporate policies. Many companies are looking for ways to control and reduce costs. Mobility is an excellent place to start.&nbsp;<br></div><p><span style="color:inherit;"><br></span></p><div>I’m sure most enterprises have some sort of MDM in place (Mobile Device Mgmt.), but that is only half the battle.&nbsp;</div><div><br></div><div>Cloud-based, mobile firewalls services not only encrypt mobile data end-to-end and completely secure everything, but they also give companies a complete view of usage and granular control.&nbsp;</div><p><span style="color:inherit;"><br></span></p><div>Some of our clients have employed a mobile firewall service from companies in our portfolio and have managed to significantly cut mobile data overages and adjust usage at the app level. As a result they cut costs 20-30% by better controlling usage (oh, and improving security)!</div><p><span style="color:inherit;"><br></span></p><div>Cloud 9 is here to help you find the best solution from the best vendors. Our Mobility and IoT team will help you get your corporate mobile costs under control. How can we help you?&nbsp;</div><div><br></div></div>
</div></div><div data-element-id="elm_zQ9YQr8ueH7WtWiXvIfhHQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_zQ9YQr8ueH7WtWiXvIfhHQ"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_SsZWvyrvbQY6s66fBLoyDw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_SsZWvyrvbQY6s66fBLoyDw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_pu34Ky8nR2aNfUEFO75YoQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pu34Ky8nR2aNfUEFO75YoQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-right " data-editor="true"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help decision-makers buy the right technology solutions and not “get sold” on the wrong ones. We work with you to rationalize and reduce technology spending without sacrificing technology itself and employ sound digital transformation principles and strategies.</div><p><br></p><div>We do not sell solutions, we help you buy the right solutions. We are not a vendor, we help you find the right vendors. We facilitate decisions by diagnosing problems then prescribing the right procedures and “medication”.&nbsp;</div><p><br></p><div>We are impartial, unbiased, and vendor-neutral technology practitioners with expertise in four critical segments: Cybersecurity, Communications, Connectivity, and Cloud. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We’ll help you quickly identify, research, evaluate, and compare appropriate solutions and vendors; eliminating months of labor trying to do it on your own. We’ll help you make confident decisions quickly.&nbsp;</div><p><br></p><div>To learn more contact us today and book an appointment</div></div>
</div><div data-element-id="elm_WOFpXgBaQtKqOCGuib1nfg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_WOFpXgBaQtKqOCGuib1nfg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 Mar 2021 11:57:46 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Effortless]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-effortless</link><description><![CDATA[It's probably not surprising that remote workers outperform office workers in several key areas. Studies have shown that people working remotely are more productive, better at collaborating, and more present than their office-bound counterparts.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_hX79q_rgTZCLdSl7Rl8VaA" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_hX79q_rgTZCLdSl7Rl8VaA"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_diTBL4y1Q5uDHq4BNWGTyw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lqyJAmL8RL-UkuFcv6XuqQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_lqyJAmL8RL-UkuFcv6XuqQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_4jKo4SxCQgi6x3VW2iGm2g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4jKo4SxCQgi6x3VW2iGm2g"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">How DaaS Addresses the Dark Side of Working from Home</span></span></h1></div>
<div data-element-id="elm_p4gGl1hLZ2N3bXwRnHDVVw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_p4gGl1hLZ2N3bXwRnHDVVw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1532357707421-6b6905c3d8da?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_q-aGRlq5RrCncv55d3c4pg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_q-aGRlq5RrCncv55d3c4pg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight: <span style="font-weight:bold;"><a href="https://www.effortlessoffice.com/" title="Effortless Office" target="_blank">Effortless Office</a></span></span></p></div>
</div><div data-element-id="elm_Exg4jYbACwQrPj9JKnjC6Q" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Exg4jYbACwQrPj9JKnjC6Q"].zpelem-image { border-radius:1px; margin-block-start:66px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://www.effortlessoffice.com/" target="_blank" title="https://www.effortlessoffice.com/" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/Cloud%20Effortless-Logo.png" size="medium" style="width:1500px;padding:0px;margin:0px;"/></picture></a></figure></div>
</div><div data-element-id="elm_HUP3lJRRCMkKfHVqb_TeNw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HUP3lJRRCMkKfHVqb_TeNw"].zpelem-text { border-radius:1px; margin-block-start:69px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="font-size:18px;font-weight:bold;">work effortlessly</span></p></div>
</div><div data-element-id="elm_hcipVK4K5GLZnpnxDgV3tw" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_hcipVK4K5GLZnpnxDgV3tw"].zprow{ border-radius:1px; margin-block-start:82px; } </style><div data-element-id="elm_WRTew-vykvC_JNPa_f7pwg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_WRTew-vykvC_JNPa_f7pwg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_kYhv3eiuzRiTwYCjOasOJA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kYhv3eiuzRiTwYCjOasOJA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">How DaaS Addresses the Dark Side of WFH</span><br></h2></div>
<div data-element-id="elm_Hy2i3V8SS1PmjU5LBZpe_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Hy2i3V8SS1PmjU5LBZpe_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">It's probably not surprising that remote workers outperform office workers in several key areas. Studies have shown that people working remotely are more productive, better at collaborating, and more present than their office-bound counterparts. In fact, 65% of workers say working remotely would boost their productivity. This is doubly true with the amount of time some workers spend just getting to and from the office. According to a report by Apartment List, the number of people who travel more than 90 minutes to work each way has increased by more than 31% since 2005. In contrast, the number of Americans who work from home has increased by 76% in the same period of time.</span></p><div style="font-size:20px;font-style:inherit;font-weight:inherit;"><br></div><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">TJ Galati, CIO and thought leader who virtualized his entire company and workforce with the Effortless Suite, told Effortless, &quot;There are many benefits to utilizing a remote workforce that companies are just starting to figure out. A few of my favorites are:</span></p><ul><li style="font-style:inherit;font-weight:inherit;text-align:left;"><p><span style="font-size:15px;">Less cost. (Rent, desks, ergo keyboards, coffee, etc.)</span></p></li><li style="font-style:inherit;font-weight:inherit;text-align:left;"><p><span style="font-size:15px;">Better quality of life for employees. (No commute, time with family, flex time, etc.)</span></p></li><li style="margin-bottom:8px;font-style:inherit;font-weight:inherit;text-align:left;"><p><span style="font-size:15px;">Bigger employee pool. (Instead of finding the best local person, now you find just the best person.)&quot;</span></p></li></ul><div style="font-size:20px;font-style:inherit;font-weight:inherit;"><br></div><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">Enabling remote work is &quot;truly transformative for companies who have not yet ventured to think that way,&quot; said Galati. There is, however, a dark side to working from home. You've probably seen the YouTube video where a serious BBC video interview is interrupted by a silly child walking into the room followed by a baby in a walker. But children interrupting video conferences is on the lighter side of some of the issues that can come up for remote workers. Problems related to security, internet connectivity, and general communications often arise. This is where Desktop as a Service (DaaS) is an ideal solution when it comes to supporting remote workers. Here are some of the pain points of remote workers, and how DaaS relieves them:</span></p><div style="font-size:20px;font-style:inherit;font-weight:inherit;"><br></div><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-style:inherit;font-weight:700;font-size:15px;">Security Woes</span></p><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">There are a number of ways that remote workers have the potential to create security vulnerabilities:</span></p><ul><li style="font-style:inherit;font-weight:inherit;text-align:left;"><p><span style="font-size:15px;">Unsecured devices left open in the home or in public spaces</span></p></li><li style="font-style:inherit;font-weight:inherit;text-align:left;"><p><span style="font-size:15px;">Lack of endpoint security</span></p></li><li style="margin-bottom:8px;font-style:inherit;font-weight:inherit;text-align:left;"><p><span style="font-size:15px;">Sensitive data physically leaving the company premises</span></p></li></ul><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">With DaaS, the desktop and its assets are kept in the cloud, away from any vulnerable endpoints. Devices used by remote workers merely become access points for the desktop, rather than the desktop itself.</span></p><div style="font-size:20px;font-style:inherit;font-weight:inherit;"><br></div><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-style:inherit;font-weight:700;font-size:15px;">Internet Issues</span></p><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">Even the most well-equipped remote worker can run into problems with internet connectivity, whether it be a slow connection or one that is unreliable. Remote workers without access to cloud-based solutions like DaaS are left without IT support when they need it most. A good DaaS provider offers round-the-clock support, so if things go wrong, your remote workers aren't left without a connection.</span></p><div style="font-size:20px;font-style:inherit;font-weight:inherit;"><br></div><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-style:inherit;font-weight:700;font-size:15px;">Communication</span></p><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">This may seem like a given, but it's important that remote workers have proper communication channels set up in order to do their jobs. DaaS allows workers to retain the full functionality of their work computers no matter where they go, and on any device. Remote employees can access all the communication, conferencing, and collaboration tools they need, as long as they have an internet connection.</span></p><p style="font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;"><br></span></p><p><span style="color:inherit;"></span></p><p style="margin-bottom:8px;font-size:20px;font-style:inherit;font-weight:inherit;"><span style="font-size:15px;">If your remote staff is experiencing the darker side of working from home, or worse, unable to do so because you lack the technical means, Effortless can help. With Effortless Desktop, your staff can be powered by a remote desktop that is secure, lightning-fast, and accessible from any device with an internet connection. If you're ready to build the perfect desktop and access it on any device, contact Effortless. We'll help you solve any issues being faced by your remote employees.</span></p></div>
</div></div><div data-element-id="elm_vIXxlsTwx9ggxdzG5SbfKw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vIXxlsTwx9ggxdzG5SbfKw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_cSEtcy-PiIfvn6tnGI48Mg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_cSEtcy-PiIfvn6tnGI48Mg"] div.zpspacer { height:251px; } @media (max-width: 768px) { div[data-element-id="elm_cSEtcy-PiIfvn6tnGI48Mg"] div.zpspacer { height:calc(251px / 3); } } </style><div class="zpspacer " data-height="251"></div>
</div><div data-element-id="elm_0UKEBxS8ea5hZN5shJIVWA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_0UKEBxS8ea5hZN5shJIVWA"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><div style="vertical-align:top;font-weight:inherit;font-style:inherit;font-size:16px;"><div style="font-weight:inherit;font-style:inherit;"><p style="font-weight:inherit;font-style:inherit;">Effortless is an industry-leading cloud solution service provider offering an all-in-one, fully supported ecosystem of complementary products and services that allow businesses of all sizes to utilize a single supplier for their overall IT environment. The EffortlessSuite™ covers everything your business needs to operate within the cloud: virtual desktops, disaster recovery, virtual servers, cybersecurity, compliance, managed WiFi, file sharing, firewalls, infrastructure, email, business intelligence, and helpdesk – all with an “as-a-service” model. Additionally, Effortless offers managed professional services for infrastructure design, implementation, and support to ensure a seamless transition to your business’ new cloud environment.</p></div></div><p><span style="color:inherit;"></span></p><div style="vertical-align:top;font-weight:inherit;font-style:inherit;font-size:16px;width:350px;"><div><ul></ul><div><br></div></div><div>Contact Cloud 9 to learn more about Effortless and see if they are right for your business. Also ask us about our other DaaS providers for comparison.&nbsp;</div></div></div>
</div></div><div data-element-id="elm_DBs1oTUvzEn21KWTEuXurQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_DBs1oTUvzEn21KWTEuXurQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=email us" title="consulting@Cloud9Advisers.com"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div><div data-element-id="elm__TEwjL4LSWvS8lj8hgjAcA" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm__TEwjL4LSWvS8lj8hgjAcA"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_T2aQIQq45DVjDNHbc5rBnQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_T2aQIQq45DVjDNHbc5rBnQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="font-size:15px;">If you would like to know more about the broader benefits that DaaS offers in, contact us at&nbsp;<span style="color:inherit;">Cloud 9 to learn more about Effortless and see if they are right for your business. We have a number of other DaaS service providers to look at and compare as well.&nbsp;</span></span></div></div>
</div><div data-element-id="elm_lu9bcZm4RsiCCNXWW3yjTQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_lu9bcZm4RsiCCNXWW3yjTQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=email us" title="consulting@Cloud9Advisers.com"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 21 Apr 2020 19:10:51 -0500</pubDate></item><item><title><![CDATA[Wuhan Virus Phishing Attacks]]></title><link>https://www.cloud9advisers.com/News/post/wuhan-virus-phishing-attacks</link><description><![CDATA[I just got an e-mail from the WHO asking for a donation to help fight coronavirus. It looked good. It sounded good. It was a fake. Asking for a donation in Bitcoin set off my alarm. We may get sick, but phishing, the art of conning people via email or texts, is as healthy as ever.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_nEHdzGikQo-YjjAEbrK9ww" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_9ZedyRO4Sd-RTf7fqCwvlg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_9ZedyRO4Sd-RTf7fqCwvlg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_FAkggxIPSpCmePxw4wAhaQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_LVEuWmU8SiCN4t2wt5ohEg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LVEuWmU8SiCN4t2wt5ohEg"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">How to protect yourself from coronavirus phishing threats</span></h1></div>
<div data-element-id="elm_tru_er2VGTTcxl5G1lVKfg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_tru_er2VGTTcxl5G1lVKfg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Wuhan-virus-phishing-attacks.jpg" size="fit" alt="Andreus / Getty Images / Clker-Free-Vector-Images I just got an e-mail from the World Health Organization (WHO) asking for a" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_LYoRRuPHROauMmHceJDxNg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LYoRRuPHROauMmHceJDxNg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div>The worst disease of the century brings out the worst in people as phishing attacks increase to unprecedented levels. Here's how to spot and avoid COVID-19 phishing attacks.&nbsp; &nbsp;By:&nbsp; Steven J. Vaughan-Nichols. see the article <a href="https://www.idginsiderpro.com/article/3535411/how-to-protect-yourself-from-coronavirus-phishing-threats.html?utm_source=Adestra&utm_medium=email&utm_content=Title%3A%20How%20to%20protect%20yourself%20from%20coronavirus%20phishing%20threats&utm_campaign=IDG%20Insider&utm_term=Editorial%20-%20IDG%20Insider&utm_date=20200415213806" title="here" target="_blank">here</a></div></div>
</div><div data-element-id="elm_A0GPgra78MKSrG7DmIwzLQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_A0GPgra78MKSrG7DmIwzLQ"].zprow{ border-radius:1px; margin-block-start:135px; } </style><div data-element-id="elm_k9E0E23F1ho9Xiz7zr50VQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_k9E0E23F1ho9Xiz7zr50VQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_9uBFa23-_pwkFwDeXkiF3w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9uBFa23-_pwkFwDeXkiF3w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>I just got an e-mail from the World Health Organization (WHO) asking for a donation to help fight coronavirus. It looked good. It sounded good. It was a fake. Asking for a donation in Bitcoin set off my alarm. Anytime, anyone asks you for Bitcoin in an email they're trying to scam you. We may get sick, but phishing, the art of conning people via email or texts, is as healthy as ever.</div><p><br></p><div>&quot;In addition to identifying generic phishing attempts, there are also ways of spotting coronavirus-specific phishing messages.&quot;</div><p><span style="color:inherit;"><br></span></p><div>So, as we face the deadly threat of coronavirus, you should know that there's no situation so awful that someone won’t take advantage and make it even worse by using it to steal from people. According to network security firm Barracuda Networks, there's been a steady rise in the number of COVID-19-related email attacks since January. But, in March, Barracuda researchers say they've seen a recent spike, 667%, in Coronavirus phishing messages.</div><p><br></p><div>To be exact, from March 1 to 23, researchers detected 467,825 spear phishing email attacks, and 9,116 of those detections were related to COVID-19, representing about 2 percent of attacks. That doesn't sound like much, but in February, 1,188 coronavirus-related email attacks were detected and only 137 were detected in January.</div><p><br></p><div>Phishing thrives on fear. &quot;Although the overall number of these attacks is still low compared to other threats, the threat is growing quickly,&quot; Barracuda said in a statement.</div><p><br></p><div>Paul Walsh, CEO of Metacert, which makes a web browser extension that warns you of dubious websites, agreed. &quot;For malicious people, preying on collective fear and misinformation is nothing new. Mentioning national headlines can lend a veneer of credibility to scams. We've seen this tactic time and again, so it's no surprise that COVID-19 themed social media and email campaigns have been popping up online.&quot;</div><p><br></p><p>Simultaneously, cybersecurity company Check Point announced that crooks are registering malicious coronavirus-themed websites. Since January 2020, there are over 4,000 new sites containing words like “corona” or “covid.” Check Point estimates these new Coronavirus-themed domains are 50 percent likely to be dangerous. I’m surprised the percentage isn’t higher.<br></p><p><br></p><div>That said, they're not all bad sites. Rob Ragan, principal researcher at Bishop Fox, a security firm specializing in offensive security testing, said, &quot;[Although] thousands of new domains are being registered to opportunistically garner COVID attention online. A lot of them are legit, a lot are trying to make money from selling merchandise or supplies.&quot; That said, many of these &quot;are fraud or phishing sites.&quot;</div><p><br></p><div>Another security firm, RiskIQ, found no fewer than 317,000 new dubious websites were created with coronavirus-related keywords during the two-weeks between March 9 and 13. And, it's not slowing down any. RiskIQ is providing a constantly updated list of suspicious coronavirus sites. The company is spotting tens of thousands of new dubious sites every day.</div><p><br></p><div>Does that sound paranoid? It's not. As the saying goes, &quot;You're not paranoid if they really are out to get you.&quot;</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">COVID-19 phishing basics</span></div></div><div>Most, but not all, phishing messages tell a story. Anytime you get an email, text, or instant message (IM) with any of the following traits, be very careful.</div><p><br></p><div>First, don't trust any message that looks like it's from a company you already do business, which tells you your account has had suspicious activity, needs an updated credit-card number or has had unauthorized login attempts. All that may be true, but if the message then asks you to login in via a website within the message to resolve the issue, odds are you're being scammed. Other variations of this include presenting you with a demand you click on a link to make an immediate payment, get a refund, or offer you free stuff.</div><p><br></p><div>You should also never follow up on an email asking for your personal information. No honest email is going to ask for your Social Security number or login information. Never, ever respond to such an email with your personal data.</div><p><br></p><div>Some phishing messages will appear real because they sound like it's from someone or some company that already knows facts about you. That's because with numerous corporate data hacks, such as 2017's Equifax breach, most of us already have much of our personal data out there on the dark web.</div><p><br></p><div>For example, many extortion messages will tell you that they have incriminating video or information about you and &quot;prove&quot; it by showing you an old password. They didn't get it by hacking your computer. They got it from one of those many data breaches.&nbsp;</div><p><br></p><div>And, let's not forget, if you're on Facebook or the like, it's not hard at all to find out where you went to school, that your dog's name is Spot, and what your favorite flavor of ice cream is. Remember, a message that looks questionable probably is, just because it contains a random fact or two about you, doesn't mean it's trustworthy.</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">Spotting phishing messages</span></div></div><p>The easiest way to spot phishing messages is if they start with &quot;Dear user” or “Dear [your email address].&quot; Real business emails either skip a salutation or address you by your first and last names or by your business name. Any &quot;dear user&quot; message is from a loser.<br></p><p><br></p><div>Another quick way to spot bogus messages is to look at the From email address field. Usually, but not always, the address is subtly wrong. For example, PayPal, the most frequently abused company by phishers, proper email address ends with &quot;paypal.com.&quot; But, you'll often see phishing messages from fake addresses such as paypal@notice-access-275.com. If an address doesn't look exactly right, delete it.</div><p><br></p><div>Next, look at the message's web link. Hover over the link with your mouse pointer. Does the address look right? If, for example, you get a message from Amazon warning you that your account is about to be suspended, and when you hover the link instead of amazon.com you see something like amazon.com.xyz. Those are always fake, dangerous websites and you should never click on them.</div><p><br></p><div>Worried that maybe a message that looks a bit dodgy was real? Then, contact the company via a normal route. Just, whatever you do, do not connect via a link within the message.</div><p><br></p><div>Another way to spot a scam email is if it contains poor spelling and grammar. I subscribe to the theory that these blunders are a ‘filtering system.’ If you can't spot the mistake, the idea goes, you're likely to miss the attack hidden within the message as well. Be that as it may, if a message looks like the sender failed high-school English, don't open it.&nbsp;</div><p><br></p><div>Still, another common way of messing you is to include an attachment containing some kind of malware. Lately, I've been seeing a lot of fake invoices containing a dose of poison. Any time you get an attachment from anyone, unless you know for certain it's safe, don't open it. Instead delete the message and move on.</div><p><br></p><div>Not sure about a message that looks like it's from a coworker or friend? Ask yourself, &quot;Were we expecting an email from them?&quot; Or, ask them via a different medium, such as a phone call, Slack message, whatever, to verify that they had indeed emailed you.</div><p><br></p><div>Finally, Walsh warns that simply because a site is encrypted with HTTPS doesn't mean it's a trustworthy site. &quot;Over 93 percent of all phishing sites classified by MetaCert start with HTTPS.&quot;&nbsp; All HTTPS means is that data transmission to and from the site is encrypted. It has nothing to do with being able to trust the site's data.</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">Detecting coronavirus phishing</span></div></div><div>In addition to identifying generic phishing attempts, there are also ways of spotting coronavirus-specific phishing messages.</div><p><br></p><div>First, as the Electronic Frontier Foundation (EFF) points out, if &quot;an email sounds too good to be true (“New COVID-19 prevention and treatment information! Attachment contains instructions from the US Department of Health on how to get the vaccine for FREE”), it probably is.&quot; Let me get even more specific. There will be no cure, no vaccine, no miracle fix, no radical new treatment from a local doctor, for coronavirus. Anyone telling you otherwise is lying or trying to sell you something.</div><p><br></p><div>If you get an email demanding you do something about coronavirus right now -- (URGENT: COVID-19 medication shipment blocked. Please accept order here to receive medication) -- it's not real. If someone needs to do something immediately about the virus, they're not likely to be doing it via an email.</div><p><br></p><div>There are also many phishing messages purporting to be from the World Health Organization (WHO), Center for Diseases Control (CDC), and US Centers for Disease and Prevention warning you of new dangers or wonderful cures and to learn more just click &lt;Here&gt;. I won't say they're all fake, but I haven't seen a real one yet.</div><p><br></p><div>What makes this particularly villainous is such messages, claiming, for instance to provide vital information about how to prevent and treat COVID-19, are being directed at doctors, nurses and other medical professionals. They, like you, must be wary of messages that appear real, but aren't.</div><p><br></p><div>An especially insidious version of this appears to be from medical suppliers. These claim a delivery can't be made without some action by a hospital staffer to complete the order. With hospitals running out of ordinary, but vital medical supplies such as rubber gloves and N95 masks, and looking for them from any possible source, this kind of phishing has much too high a chance of succeeding.</div><p><br></p><div>Such messages typically contain links that lead to malicious code. Malwarebytes Labs reports that some Coronavirus phishing messages will give you a case of AzorUlt malware. Once in place, it will scan your computer for more data, pass it along to a botnet command and control server. Then, once it has information it can use, it can then download and execute more malicious code, such as ransomware</div><p><br></p><div>So far, so normal, but Krebs On Security has found some attackers use the Johns Hopkins University coronavirus map to make its poisoned messages look trustworthy. The moral of the story is that coronavirus phishing messages are especially good at fooling even the practiced security eye.</div><p><br></p><div>Finally, it's not just your computer that's in danger. DomainTools recently reported a new&nbsp; Android ransomware app that pretends to be a coronavirus update application. This one came with a mistake, which rendered it mostly harmless. Others won't. When someone sends you a message containing a link to a great new COVID-19 phone app, be careful of it. Don't download it via the message. Go to your app store and get it from there.&nbsp;</div><p><br></p><div><div><span style="font-weight:bold;font-size:18px;">4 tools to help you beat coronavirus phishing</span></div></div><p>If you can't trust your own eyes -- and with as much stress as we're now under you can't -- you need other tools to keep you safe. These include the following:<br></p><ol><li><span style="font-weight:bold;">PC security software</span>: Antivirus programs can help block phishing attacks. Set your program to update automatically, so it can deal with any new security threats. As I pointed out, there's a constant flood now of new coronavirus phishing sites.<br></li><li><span style="font-weight:bold;">Use email server anti-phishing services</span>: These can stop bad messages before users are ever exposed to them. Among others check out GFI MailEssentials, Sophos Phish Threat and Barracuda Email Security Gateway.<br></li><li><span style="font-weight:bold;">Use cloud-based services</span><span style="font-weight:bold;">to scan for and detect phishing</span>: Such services include INKY and Metacert. These use white-listing approaches, which block unknown and potentially dangerous messages and sites, while letting traffic from known trustworthy sites through.&nbsp;</li><li><span style="font-weight:bold;">Switch your Domain Name Server (DNS) setting to a DNS service which provides filtering</span>: Some DNS systems, including CleanBrowsing, OpenDNS, SafeDNS and Quad9, automatically attempt to block questionable sites. With these, you literally can't go to a bad site.</li></ol><div><br></div><div><span style="color:inherit;">Armed with these tools you should be OK. This is a rough time, but with care and due diligence, you and your systems will make it through OK. Good luck and stay safe.</span><br></div></div>
</div></div><div data-element-id="elm_JcAIz-pSmgnf11Fny1AvfQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_JcAIz-pSmgnf11Fny1AvfQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_JdukN19eWcvNk8UJpkscvQ" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_JdukN19eWcvNk8UJpkscvQ"] div.zpspacer { height:445px; } @media (max-width: 768px) { div[data-element-id="elm_JdukN19eWcvNk8UJpkscvQ"] div.zpspacer { height:calc(445px / 3); } } </style><div class="zpspacer " data-height="445"></div>
</div><div data-element-id="elm_d4cZzzib8n-okvMU_kJqQQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_d4cZzzib8n-okvMU_kJqQQ"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p>Skip to the end of the article to see the top four tips, tircks, and tools to help stop coronavirus and other phishing attacks. Contact Cloud 9 to get independent, vendor-agnostic, expert help and find the right security solutions for your business</p></div>
</div></div><div data-element-id="elm_Dc1a62GAL9hXiNLSqxSA0A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Dc1a62GAL9hXiNLSqxSA0A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval zpbutton-full-width " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about email and phishing security" title="consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div><div data-element-id="elm_eTJk02capeS51oi4qJA19g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_eTJk02capeS51oi4qJA19g"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_BX08X193-mnbXTpqmgxAWQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_BX08X193-mnbXTpqmgxAWQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about email and phishing security" title="consulting@Cloud9Advisers.com"><span class="zpbutton-content">Contact Cloud 9</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 15 Apr 2020 19:51:56 -0500</pubDate></item><item><title><![CDATA[Supplier Spotlight: Defendry]]></title><link>https://www.cloud9advisers.com/News/post/supplier-spotlight-defendry</link><description><![CDATA[New commercial applications are now available that utilize artificial intelligence, machine vision, Internet of Things, and camera-based security technologies to detect and interdict active shooter incidents before they become deadly.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_yjin8ehuSTmhbX0Tagp5PQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_tOTt4H6XRBOGvj9vOtw2Xg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_dWKa8LTCRuWrKisfIZwyxA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_SFPf34L9Q1ecumNolxMKzQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_SFPf34L9Q1ecumNolxMKzQ"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">All AI Is Not Created Equal</span></h1></div>
<div data-element-id="elm_ZAsSfFvo8PS6pZhuLaktaw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_ZAsSfFvo8PS6pZhuLaktaw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Shooter-Detection-Sample-1.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_zLSYf82snMnoLx2Lg0QbuA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zLSYf82snMnoLx2Lg0QbuA"].zpelem-text { border-radius:1px; margin-block-start:81px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:18px;">Cloud 9 Supplier Spotlight: <a href="https://defendry.com/" title="Defendry" target="_blank" style="font-weight:bold;">Defendry</a></span></p></div>
</div><div data-element-id="elm_YvsiyN3pSa6DmhxtIasuOQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_YvsiyN3pSa6DmhxtIasuOQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="https://defendry.com/" target="_blank" title="Defendry.com" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Supplier%20Logos/defendry.png" size="medium" alt="Defendry: Active Shooter Defense" style="width:1600px;padding:0px;margin:0px;"/></picture></a></figure></div>
</div><div data-element-id="elm_po8Vb938Vlg9xIplexMORg" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_po8Vb938Vlg9xIplexMORg"].zprow{ border-radius:1px; } </style><div data-element-id="elm_TnueKmd8muLEeVxRRP32_g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_TnueKmd8muLEeVxRRP32_g"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_jOSI4wv4mTaAHvOwVeykig" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_jOSI4wv4mTaAHvOwVeykig"].zpelem-heading { border-radius:1px; margin-block-start:50px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Not All AI is Created Equal</span></h2></div>
<div data-element-id="elm_EAb5cQ90b8wev8LLz_dD-Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_EAb5cQ90b8wev8LLz_dD-Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:12px;">By: Defendry, see the original article <a href="https://defendry.com/all-ai-is-not-created-equal/" title="here" target="_blank">here</a></span></p></div>
</div><div data-element-id="elm_0Um-ySk-Faw-sCPhDsibYw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0Um-ySk-Faw-sCPhDsibYw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><span style="color:inherit;"><div>New commercial applications are now available that utilize artificial intelligence, machine vision, Internet of Things, and camera-based security technologies to detect and interdict active shooter incidents before they become deadly.</div><div><br></div></span><div>Defendry LLC was founded with a singular mission: STOP active shooters and save lives through the use of advanced technologies. Defendry was launched in January 2019 by serial-tech entrepreneur, Pat Sullivan, utilizing cutting edge, AI threat detection software developed by Dr. Sean Huver, a former Bell Labs research scientist and veteran of numerous United States Department of Defense DARPA projects.</div><p><br></p><div>Defendry’s team is comprised of proven innovators, engineers, and scientists who are passionately-driven to provide affordable, sophisticated products that can help solve the current, tragic active shooter epidemic.</div></div>
</div><div data-element-id="elm_ifzUbNOSGalhFfceapwdJg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_ifzUbNOSGalhFfceapwdJg"].zpelem-image { border-radius:1px; margin-block-start:69px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-large zpimage-tablet-fallback-large zpimage-mobile-fallback-large hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/Mass%20Shootings%20Graph.svg" size="large" data-lightbox="true" style="width:220px;"/></picture></span></figure></div>
</div><div data-element-id="elm_paQ7MnjyIj4-IpzpjsEc2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_paQ7MnjyIj4-IpzpjsEc2g"].zpelem-text { border-radius:1px; margin-block-start:55px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;">Defendry monitors your security cameras feeds 24/7 to automatically detect, deter, and report potential threats in seconds using its advanced AI-based software. Early detection can even automatically lock a shooter out before entering.</span><br></p><p><span style="color:inherit;"><br></span></p><div>Defendry automatically detects visible guns, masks, and intruders 24/7 by analyzing your security camera streams.</div><p><span style="color:inherit;"><br></span></p><div>If a gun is detected, doors are automatically locked to prevent further entry by the armed culprit while remaining unlocked from the inside so people can escape if necessary. Furthermore,&nbsp; bulletproof laminate can also be installed to prevent forced entry through glass.</div><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">Detected threats are immediately verified by Defendry’s award-winning, 24/7 human verification partner, Rapid Response. False alarms are eliminated and real threats are immediately reported to first responders.</span><br></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">If a threat is verified, Defendry immediately sends emergency notifications with pictures, description, and location of the threat to police, onsite security teams, and anyone else who needs to know.</span><span style="color:inherit;"><br></span></p><p><span style="color:inherit;"><br></span></p><div>Users of the Defendry SeeSay app adds another layer of protection and defense. If someone recognizes something suspicious, they can report threats directly to on-site security using the Defendry SeeSay app. <span style="font-style:italic;">“If you see something, say something.”</span></div></div>
</div><div data-element-id="elm_JU98TL8NAtyaDNFxgE7IAQ" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_JU98TL8NAtyaDNFxgE7IAQ"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_xJ2IHSKsko_XK3Oul_FFTA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_xJ2IHSKsko_XK3Oul_FFTA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div>Stepping up your security surveillance system might be on your priority list, especially if you’re concerned about the increasing prevalence of active shooter incidents against places of business, worship, and education. If you’re considering implementing AI-enabled security, as many people are, you need to understand that there are big differences in types of artificial intelligence on the market. There are specific things about AI that make some extremely effective for security purposes, and others useless. Given the high risk involved if an AI system fails to work, it is especially important to understand what you’re buying before making the investment. Here’s what you need to know.</div><p><br></p><div><span style="font-weight:bold;">AI is only as good as what it’s built to do</span></div><p>Artificial Intelligence is a hot buzzword right now. Every technology company wants it, and coders all over the world are learning how to create it. It’s become an ecosystem in and of itself. Defendry could have completely outsourced AI development to a team of engineers oversees and had a system built for pennies on the dollar. Our mission, however, is to save lives, and so rather than gamble with a high risk of error from inexpensive development, we have assembled a team of expert engineers who inherently understand what that takes.<br></p><p><br></p><div>Defendry AI development is led by Dr. Sean Huver, Defendry’s Chief Science Officer. Huver is a research scientist and veteran of numerous United States Department of Defense DARPA projects. Upon discovering the gaping need for faster response to retail crimes, Huver created a company named Deep Science to develop the proprietary AI detection software that is now owned exclusively by Defendry. The system he built was the first human-in-the-loop AI active threat detection platform on the market.</div><p><br></p><div>Most artificial intelligence surveillance systems are built to simply recognize shapes and send alerts to authorities. This is problematic, as there are a number of scenarios in which the shape that’s recognized as a threat actually isn’t one, and other times the system misses an active threat because the AI doesn’t recognize the shape of the specific weapon in the frame.&nbsp;</div><p><br></p><div>Defendy’s AI has been designed to learn all kinds of threat-related patterns, and will naturally learn what all manner of threats look like. For instance, it can tell the difference between a gun and a drill (many AI systems cannot), and it can distinguish very intricate details such as different models of guns, the different ways guns are held, etc. “Military-grade AI” means it was designed to learn these things specifically. The more our AI is used, the smarter it becomes, and all of our customers become safer.</div><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;font-weight:bold;">AI has to be trained in something specific, in order to do something specific</span><span style="color:inherit;"><br></span></p><div><br></div><div><span style="color:inherit;"><div>Artificial Intelligence is, by nature, a learning system. That means it needs to be built to learn specific things, and it needs to be trained, just like a human brain. Defendry’s AI has been trained using surveillance videos of actual crimes, as well as proprietary staged crime scenarios. These videos teach our AI to understand and respond to multiple ways that an active shooter could attack. Further, our AI training was directed by renowned Police Officer Tony Sanborn, who trains and manages the Scottsdale, AZ K-9 unit attack dogs.&nbsp;</div><div><br></div><div>Officer Sanborn has helped train our AI in thousands of potential scenarios and in varying environments where an active shooter threat might happen. Variables like type of weapon, angle of attack, and even time of day are taken into account. This means our AI system is trained to accurately recognize virtually every imaginable type of gun in just about every possible situation.&nbsp;</div><div><br></div><div>When Defendry is installed in a location,&nbsp; if a threat is detected, Defendry’s 24/7 monitoring initiates a series of auto-responses ranging from locking doors to sounding alarms to calling police (only after a human verifies that the threat is real, which prevents false alarms). Other AI might be useful for lessening the severity of attacks or identifying bad guys faster. Our AI is built to help prevent active shooter incidents from happening in the first place by locking the shooter out.</div><div><br></div><div><span style="font-weight:bold;">AI must be able to identify non-threats&nbsp;</span></div><div>We mentioned above that some AI systems are designed to recognize just shapes, and not specific types of weapons (including models). This can be very problematic. Imagine if your security system were to see an employee walking into the building holding a drill or a stapler, inaccurately identified it as a gun, and automatically initiated an emergency response protocol? The result could be a very costly liability, not to mention traumatic for the person accused, and potentially even a PR nightmare for the business.&nbsp;</div><div><br></div><div>Defendry’s security-trained AI, plus our human verification, drastically reduces the incidence of false positives and eliminates false alarms. The most important thing an AI-enabled, active shooter defense system must have is precision. That means recognizing every kind of possible threat, and confidently excluding false threats.</div><div><br></div><div>Artificial Intelligence is an amazing breakthrough, with endless applications. Enabling better security through AI is a no-brainer for anyone who’s tasked with protecting the people inside a business, place of worship, school, or other building. Know that before you make the investment, all AI is not created equal. When it comes to protecting lives, you need an active shooter defense system that was built just for that purpose.</div></span></div></div>
</div></div><div data-element-id="elm_vXuixKesHIj5PIhyz_ouxQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_vXuixKesHIj5PIhyz_ouxQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_B404AbDZWSA9TdxYsI7wSg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_B404AbDZWSA9TdxYsI7wSg"] div.zpspacer { height:458px; } @media (max-width: 768px) { div[data-element-id="elm_B404AbDZWSA9TdxYsI7wSg"] div.zpspacer { height:calc(458px / 3); } } </style><div class="zpspacer " data-height="458"></div>
</div><div data-element-id="elm_lN0L7lUIKksWza5YVgJ71Q" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_lN0L7lUIKksWza5YVgJ71Q"] div.zpspacer { height:362px; } @media (max-width: 768px) { div[data-element-id="elm_lN0L7lUIKksWza5YVgJ71Q"] div.zpspacer { height:calc(362px / 3); } } </style><div class="zpspacer " data-height="362"></div>
</div><div data-element-id="elm_EddI-b7kYmxV_JXcJCd4jA" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_EddI-b7kYmxV_JXcJCd4jA"].zpelem-imagetext{ border-style:dotted; border-color:#000000 !important; border-width:1px; border-radius:10px; padding:10px; margin-block-start:495px; } </style><div data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-center zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="true" style="width:1800px;padding:0px;margin:0px;"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;">Active shooter defense and other security measures are important to your business, place of worship, or educational institution, ensuring peace of mind and potentially reduced liability. Contact Cloud 9 Advisers today to learn more about Defendry's advanced systems&nbsp; and see if they are right for your organization.&nbsp;&nbsp;</span><br></p><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Save Time<br></span>We manage everything by becoming an extension of your team and do the legwork for you.</div><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Save Money<br></span>We save you big by getting the buying power of thousands of other clients.</div><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Get Confidence<br></span>We evaluate and negotiate to get you the best solution, best supplier, and the best price.</div><p><span style="color:inherit;"><br></span></p><div><span style="font-weight:bold;">Get Clarity<br></span>We find the right companies, distill the information, and clear the clutter.</div></div>
</div></div></div></div><div data-element-id="elm_jQI0B5h5i-bSm3Z8YM3lew" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_jQI0B5h5i-bSm3Z8YM3lew"].zpelem-divider{ border-radius:1px; margin-block-start:50px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_fdLWkhv-QPCk7uVi0icYUA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_fdLWkhv-QPCk7uVi0icYUA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p>Active shooter defense and other security measures are important to your business, place of worship, or educational institution. Contact Cloud 9 Advisers today to learn more about Defendry's advanced systems and solution and see if they are right for your organization.</p></div>
</div><div data-element-id="elm_eJQv-EOoQ22n6aKB0SlpJg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_eJQv-EOoQ22n6aKB0SlpJg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="mailto:consulting@Cloud9Advisers.com?subject=I'd like to learn more about Defendry and how C9 can help" title="email us to learn more: consulting@Cloud9Advisers.com"><span class="zpbutton-content">Learn more about Active Shooter Defense</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 19 Feb 2020 18:36:02 -0500</pubDate></item><item><title><![CDATA[China Tops List as Top Risk (duh!)]]></title><link>https://www.cloud9advisers.com/News/post/China-Tops-List-as-Top-Risk</link><description><![CDATA[It probably goes without saying, but China is a major risk for most US business and certainly anyone conduction any sort of business online. Read more and contact Cloud 9 to learn ways to protect your digital assets]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_rVgB2_y6QFqaWlc7I3Es5w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_fZQ618y0S0yVuwgeACBtZw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_mvhK6RVoT6WNKbwJ9O62dA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TvGgmdI9QxWu0zeFEB5rnw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">China Tops List of U.S. Cybersecurity Agency’s Top Risks</span></h2></div>
<div data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LlaFodsMQDCrC-k-IMbRHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"><span style="font-size:12.6px;">By William Turton |&nbsp;August 23, 2019 - see the full article at <a href="https://www.insurancejournal.com/news/national/2019/08/23/537801.htm?utm_source=Partner%2BAug%2B%2719%2BNewsletter&utm_campaign=Partner%2BNewsletters&utm_medium=email" title="InsuranceJournal.com" target="_blank">InsuranceJournal.com</a></span></span><br></p></div>
</div><div data-element-id="elm_wpQyrPryRuPCab8mdi4FTw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_wpQyrPryRuPCab8mdi4FTw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://images.unsplash.com/photo-1501621185719-221c3312e3ba?ixlib=rb-1.2.1&amp;q=80&amp;fm=jpg&amp;crop=entropy&amp;cs=tinysrgb&amp;w=1080&amp;fit=max&amp;ixid=eyJhcHBfaWQiOjQ1Nzk3fQ" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_-l1px7zed5YDyx5NhzqrHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-l1px7zed5YDyx5NhzqrHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;">Cybersecurity and Infrastructure Security Agency (CISA), a</span>&nbsp;newly created U.S. cybersecurity agency said Thursday that China represents the greatest strategic risk to the U.S., and as a result, the agency’s top operational priority is reducing the risks from Chinese compromises to the global supply chain, including emerging 5G technology. The statement was part of a report outlining CISA's strategic intent for the next five years. The agency is responsible for protecting America’s critical infrastructure, like election systems and power grids, from hackers and other cybersecurity threats.</div><p><span style="color:inherit;"><br></span></p><div><span style="color:inherit;"><div>Besides China, the agency’s other priorities include federal cybersecurity and reducing risks for industrial control systems.&nbsp;<span style="color:inherit;">Christopher Krebs, the agency’s director, said in a speech Thursday that his agency is the nation’s “risk adviser,” which doesn’t have its hands on the keyboards of computer networks but rather seeks to make other agencies and companies do a better job managing risks against cyberattacks.</span></div><div><br></div><div>The priorities reflect the work CISA has already been doing since the agency was established in November 2018, a time during which the Chinese manufacturer Huawei Technologies Co. was blacklisted by the Trump administration amid security concerns and Russian agents were indicted for seeking to manipulate the 2016 presidential election.</div><div><br></div><div>“When we think about Russia, they’re trying to disrupt the system,” Krebs said, at an event at Auburn University in Alabama. “And China is trying to manipulate the system, so that requires us to take different approaches.”</div><div><br></div><div>CISA is currently offering services to election equipment vendors to find potential vulnerabilities in its systems. CISA’s work also includes protecting state and local governments from ransomware attacks, like the one that hit 22 towns in Texas last week. “Ransomware is not going anywhere,” Krebs said. “It’s only getting worse.”</div><br><div><span style="color:inherit;"><p style="margin-bottom:20px;font-size:16px;">CISA sits within the Department of Homeland Security. Krebs, the agency’s first director, joined the DHS in 2017 and was nominated to lead the agency by President Donald Trump in 2018. Before that, he was the Director for Cybersecurity Policy on Microsoft Corp.’s U.S. Government Affairs team.</p></span></div></span></div></div>
</div><div data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_-1UHAxSaRVedFTzaYPhd5Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-oval " href="/cybersecurity" target="_blank"><span class="zpbutton-content">Learn how Cloud 9 can help you protect your business</span></a></div>
</div><div data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_GBLZRdyGuzXxZ0cX1GzQ6g"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_2haLWEezyEXAZAWFZIYwGw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> [data-element-id="elm_2haLWEezyEXAZAWFZIYwGw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="right" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimagetext-container zpimage-with-text-container zpimage-align-right zpimage-size-small zpimage-tablet-fallback-small zpimage-mobile-fallback-small "><figure role="none" class="zpimage-data-ref"><a class="zpimage-anchor" href="/" target="" rel=""><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/C9-Logo1.1.150.t.png" size="small" data-lightbox="false" style="width:1800px;padding:0px;margin:0px;"/></picture></a></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Every company wants to be your partner, but let’s face it, if they are selling you something, they’re not your partner, they’re just another vendor. Cloud 9 is different. We don’t actually sell anything and we don't charge our clients. We become an extension of your team and help manage the often overwhelming process of finding, evaluating, and selecting the right technologies and competitive providers.&nbsp;</span></span><br></p><p><span style="color:inherit;"><span style="font-size:11pt;"><br></span></span></p><ul><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Time: </span>We manage everything by becoming an extension of your team and do the legwork for you.</span><br></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Save Money: </span>We save you big by getting the buying power of thousands of other clients.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Confidence: </span>We evaluate and negotiate to get you the best solution, best supplier, and the best price.</span></li><li><span style="font-size:11pt;"><span style="font-weight:bold;">Get Clarity:</span> We find the right companies, distill the information, and clear the clutter.</span></li></ul><div><span style="font-size:11pt;"><br></span></div><div><span style="color:inherit;"><p style="text-align:center;"><span style="font-size:11pt;font-weight:bold;">Technology Partners. Strategic Advisers.</span></p></span></div></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 08 Oct 2019 04:02:04 -0500</pubDate></item></channel></rss>