<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cloud9advisers.com/News/tag/work-from-home/feed" rel="self" type="application/rss+xml"/><title>Cloud 9 Advisers - News #Work-From-Home</title><description>Cloud 9 Advisers - News #Work-From-Home</description><link>https://www.cloud9advisers.com/News/tag/work-from-home</link><lastBuildDate>Sat, 28 Feb 2026 02:34:37 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Remote Staff Optimization]]></title><link>https://www.cloud9advisers.com/News/post/remote-staff-optimization</link><description><![CDATA[We made it through that mess! There's a little bit lingering but at least we're over the hump. It does, however, beg the question, what now?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_pomPfw7-TpmO8Zg7gws3rg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_8H7Q8wTtQV-80GJi8TGzuw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_kZxkLjCuQ82PxGsec3LR9A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Y7LkMneySbuG_2v2v5AnjA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Y7LkMneySbuG_2v2v5AnjA"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true">Remote Staff Optimization</h1></div>
<div data-element-id="elm_XG0PgOzMDOeLtcyfoAS2iA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_XG0PgOzMDOeLtcyfoAS2iA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_ET-JZ2sWTigR8IJ2xXrjaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_ET-JZ2sWTigR8IJ2xXrjaw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_p3uV36hF4ec8UeccaeCwhA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_p3uV36hF4ec8UeccaeCwhA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">As a business leader, here's what you need to know</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We made it through that mess! There's a little bit lingering but at least we're over the hump.&nbsp; It does, however, beg the question, what now? Work at home declarations from the CDC and other government agencies have now become the new normal for so many of us. Many surveys from different sources have suggested that even though offices are open, over 65% of employees that have the option, say they would prefer and plan on staying at home or only a partial return to the office.&nbsp;</span><br></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">So how can you as a business owner keep staff productive and efficient and a work-at-home team that still performs at a high level?&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;">We've created a step-by-step process to help.</span></p><p style="margin-bottom:10pt;"><span style="font-size:12pt;font-weight:700;">Six Steps to Enable &amp; Optimize Your Remote Workers:</span></p><ol><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">High-Speed Internet</span><span style="font-size:12pt;"> - The first thing you need to do as a business owner is to survey your employees to see what kind of broadband they are using at home. To run business voice and video calls, they're going to need plenty of throughputs. A good standard that should provide enough horsepower is 50 Mb down, 5 Mb upload speed.<br><br></span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Move Your Phone System to the Cloud</span><span style="font-size:12pt;"> - Here are the key features of UCaaS that will enable your work-at-home employees by leveraging the benefits of unified communications in the Cloud:&nbsp;</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Video Conferencing&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Mobile App&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Collaboration&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">CRM Integration<br><br></span></p></li></ul><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Move Your Desktop Workspace to the Cloud - </span><span style="font-size:12pt;">With Active Directory, you can ensure certain file-sharing rules within your own Local Area Network. Two promising technologies address these features and move them all to the Cloud while maintaining centralized control over access permissions.&nbsp;</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Workspace as a Service&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Desktop as a Service<br><br></span></p></li></ul><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Move Your Contact Center to the Cloud - </span><span style="font-size:12pt;">Does your business have a contact center or help desk in-office? Having a Cloud Contact Center solution allows your employees to support your clients while working from home.<br><br></span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Identify &amp; Provide Necessary Devices - </span><span style="font-size:12pt;">Don't let Coronavirus hold your company back; make sure that your employees have the technology they need:</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Mobile or soft phone</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Desktop or lap top computer<br><br></span></p></li></ul><li style="font-size:12pt;"><p><span style="font-size:12pt;font-weight:700;">Remote File Share - </span><span style="font-size:12pt;">When you send your workers home, they must be able to share, collaborate on, and store files in the Cloud. The most popular cloud file storage providers are:&nbsp;</span></p></li><ul><li style="font-size:12pt;"><p><span style="font-size:12pt;">Microsoft 365 (OneDrive)&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Google Workspace (Google Drive)&nbsp;</span></p></li><li style="font-size:12pt;"><p><span style="font-size:12pt;">Dropbox&nbsp;</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">Box.com</span></p></li><li style="font-size:12pt;"><p style="margin-bottom:10pt;"><span style="font-size:12pt;">and others like Zoho One</span></p></li></ul></ol><p style="margin-bottom:10pt;"><span style="font-size:12pt;">If you'd like assistance with optimizing your current work-at-home strategy or need help putting a plan in place, contact us and we'll set you up with one of our trusted advisers and a team of experts. Between them and our vendor-neutral engineering team we’ll find the perfect vendors, carriers, and service providers that will solve problems fast. For more information reach out to us now.</span></p><p><span style="color:inherit;"></span></p><div><span style="font-size:12pt;"><br></span></div></div>
</div></div><div data-element-id="elm_filruWSHhE9o6-zWhzvNjw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_filruWSHhE9o6-zWhzvNjw"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_XI43SGP0RKeKUx3Xf4WXjw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_XI43SGP0RKeKUx3Xf4WXjw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us" title="contact us -&amp;gt; book appointment"><span class="zpbutton-content">Get Started</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 16 Jul 2021 11:43:20 -0500</pubDate></item><item><title><![CDATA[New WFH Workforce protections]]></title><link>https://www.cloud9advisers.com/News/post/new-wfh-workforce-protections</link><description><![CDATA[There may be some light at the end of this pandemic tunnel… Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gOkdvbyBQHmEWjHApA_8Yg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_yKOJH6bdT4Kih8kIJe9BNg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cu0WdtFoSMmdkIG_5G0nZg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_76bglzXFREWUAAmjFAUoPw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_76bglzXFREWUAAmjFAUoPw"].zpelem-heading { border-radius:1px; margin-inline-end:100px; margin-inline-start:100px; } </style><h1
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Tech and </span>Techniques<span style="color:inherit;">&nbsp;to Protect the New WFH Workforce</span></h1></div>
<div data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gcpkrgEkLQamaqvEWaQIKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Even if the pandemic ends tomorrow, everything has changed. It’s time to revisit, rethink, and revise. A look at a few technologies to better secure systems, data, and a permanent home-based/hybrid workforce.</span><br></p></div>
</div><div data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm__Pb-ylLvJSD-xb-PJzIf3w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Blog%20images/WFCS-1.jpeg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div><div data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qR7Kf7k6Tu2pp0eKBQIphg"].zpelem-text { border-radius:1px; margin-block-start:22px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;font-size:18px;">Remote work has evolved into a permanent fixture and must be included in long-term planning. This introduces more risks around access as employees connect in new ways.</span><br></p></div>
</div><div data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg" data-element-type="spacer" class="zpelement zpelem-spacer "><style> div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:30px; } @media (max-width: 768px) { div[data-element-id="elm_iwvkwHvYmsrlUt5gSyTMEg"] div.zpspacer { height:calc(30px / 3); } } </style><div class="zpspacer " data-height="30"></div>
</div><div data-element-id="elm_umLn4meYqa32K95-tLgY6g" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"> [data-element-id="elm_umLn4meYqa32K95-tLgY6g"].zprow{ border-radius:1px; } </style><div data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xzz7Ap_QxTWfrfeJ-b-mkg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_lXzHN7r4Qcla3nvsYpHnmA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:10pt;"><span style="font-size:15px;">There may be some light at the end of this pandemic tunnel… oh wait, no. That’s just a guy on a bicycle with a flashlight coming this way to tell us it ain’t over yet. Nevermind.&nbsp; ...but it is clear that many companies will never go back to demanding employees come to the office once this thing is finally over. The thought of not coming back to the office at all has crossed the minds of some owners, founders, and executives, leaving the open question “do we still need to pay all that money for all that space?”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">We can no longer assume the current environment is temporary and we must start planning and investing accordingly. The systems and tools that once supported the occasional road-warrior workforce and coincidentally served companies so well during the initial season of COVID now need to be revisited, rethought, and revised.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The glorious benefits and ability to work from anywhere has been in the vernacular of tech company sales teams for ages now. I remember, just a few years ago, being required to chant “anytime, anywhere, any device” in every sales meeting I had back when I was pedaling phone systems. Even if it was just for a 50 site gas station franchise.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Once relegated to traveling executives and sales teams, now the anytime, anywhere, any device mantra is the prevailing, and often only, option for many people. But enterprise tech needs to go much further than a decent cloud phone system and a VPN connection if companies want to pivot and make real and lasting changes.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Digital transformation is the promise of fundamentally changing how businesses operate and deliver value to customers by integrating “digital” into all areas of the business. It is no longer a distant pipe dream to keep pushing to the back burner. It is real, it is important, and it is necessary for change. Of the many categories, parts, and tactics to an overall digital transformation strategy, a solid security foundation might be the most important and therefore the best place to start.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Those systems and tools that once served so well in the beginning of the pandemic now need closer inspection. Creating an extended and enhanced secure foundation is critical. One that is nimble and flexible, able to support the “new normal” hybrid/remote workforce, able to provide access to all the company’s workflows, and enhance collaboration for dispersed teams.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The following sections are elements and excerpts from the article “6 top security technologies to protect remote workers” from our friends at <a href="https://www.csoonline.com">www.CSOonline.com</a> and written by Peter Wayner, Contributing Editor. We’ve embellished, elaborated, added, and removed some to fit here better. They illustrate a few basic security tools and technologies to support the new age of full-time and hybrid remote workers.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Multi-factor authentication (MFA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One of the first challenges will be identifying the users. The old-fashioned password may be sufficient within the confines of a trusted office but adding a layer of assurance is better. The simplest solution is to require a second level of authentication such as the employees’ mobile phones. Some service providers like 8x8, GoTo, Vonage, Ooma, and RingCentral offer a wide range of communications channels to users including business SMS text messaging.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">More sophisticated solutions use apps running locally on the mobile device that can generate single-use passwords based upon the time. Tools like Google Authenticator, DuoLingo, FreeOTP, and LinOTP store a shared secret when the user first initializes them and then uses this to generate a new password each time the user wants to log in.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">For the hyper-secure, there is increased interest in dedicated hardware tokens that apply all encryption and authentication algorithms inside a special piece of hardware. Tools like the RSA SecurID, Yubikey, or Onlykey aren’t susceptible to attacks that are able to infiltrate the desktop or mobile operating systems. They offer increased security but at the cost of requiring users to juggle one more device.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Identity and access management</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The tools for multi-factor authentication (MFA) need to work closely with enterprise applications, and this is a challenge for in-house developers who will need to adjust the local codebase. Some teams are turning to identity and access management (IAM) services. They are often referred to as Identity as a Service (IDaaS) or authentication as a service (but AaaS is not really a thing)&nbsp; IAM is&nbsp; designed to be easily integrated into any codebase. Software from companies like Auth0 or Okta handles identity and access management with the best algorithms, allowing the in-house developers to concentrate on the business logic.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Auth0, for instance, offers a collection of quick-start examples that let a developer cut and paste a few lines of code and secure everything inside the application. The code from Auth0 adds a login dialog box and then the Auth0 servers check the password and enforce any stronger rules like a requirement for two-factor authentication. If you need to trigger a mobile app or send an SMS, Auth0’s servers do the work. When it is satisfied, it passes control back to your application.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Okta offers a similar set of services and likes to call its approach an “identity engine” for testing anyone who wants access. It rolls together a collection of authentication and management tools into a flexible pipeline that simplifies creating accounts and granting the owners correct access. The steps can be configured to include a variety of options like tracking the user’s specific laptop or phone to reduce the focus on the password alone.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">The companies also simplify the work of juggling all the accounts by providing a dashboard for tracking users, adding new accounts and adjusting access roles. The developer can add a sophisticated layer that organizes both identity and authentication with the pre-tested code.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Zero Trust Network Access (ZTNA)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If you use a virtual private network (VPN), you already know that you must be able to trust the endpoint. Keep in mind that just because the company bought the asset three years ago doesn’t necessarily mean that it is still a trusted endpoint.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">While still widely used, VPN itself leaves much to be desired and is beginning to show its age. Today, VPN is not the best model for a world where there are no clear lines that mark where the office begins and where it ends. Growing in popularity as an alternative, some organizations are adopting a zero-trust model, which assumes that all employees are logging in from a dangerous place like, say, a coffee shop whose WiFi is compromised by an evil hacker collective. ZTNA always assumes that all packets are flowing through enemy territory.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This wary attitude is not just for bits and bytes traveling over the network. Many inward-facing applications are constructed with the assumption that they will live in a secure network because some firewall or other tool has filtered out dangerous packets. The old paradigm of a strong perimeter made it possible for application developers to ignore security concerns.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Moving to zero trust means shifting attitudes. Todd Thiemann, vice president of marketing at threat intelligence firm HYAS, says, “The perimeter is thoroughly dead. If you are relying on gateway security, you are not watching all the traffic flowing in and out of the work-from-home [and other remote] endpoints.”</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Secure Access Service Edge (SASE)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Another way to rework existing applications for staff on the open internet is to add a special gatekeeper where users and their requests for data will be stopped to check for correct identity and access. One growing architectural model for this kind of smart, pan-enterprise filter is a process that some vendors call “Secure Access Service Edge” or SASE (pronounced “sassy”). This gatekeeper is much smarter than a typical firewall and can deploy stateful filtering by examining the data inside the requests and make intelligent decisions based upon these values. SASE aims to remove the outdated idea of a site-centric network to a more user-centric approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">This new layer can be added to protect any of the various cloud and web services including many that might even be hosted outside the company. The user’s computer talks only to the SASE gatekeeper and the other services only answer to requests that have been checked by the SASE gatekeeper.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Solutions from companies like CATO Networks, Cloud Genix (Palo Alto), Open Systems, and others not only combine all the benefits of SDWAN and Next-Gen Firewall technologies but also track users over time and make decisions about access to all services even if they aren’t hosted in the same location or the same cloud.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Software-Defined Perimeter (SDP)</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">If it isn’t evident by now, allow me to reiterate. Networks operate far differently than in the past and especially so these days. Considering the dramatic increase in and changing patterns of traffic; both internal and external, the traditional “fixed” perimeter is severely limited. The traditional perimeter usually and simply deemed the internal network as trustworthy and the external network as hostile. Visibility and accessibility were the basis of that traditional approach.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">SDP is an extension of an overall zero-trust methodology and effectively creates a new flexible network perimeter. Rather than a fixed, static perimeter, SDP functionality deploys multiple dynamic perimeters to account for cloud, multi-cloud, hybrid environments, and on-premise and heavily relies on two important things; authentication and authorization. SDP can also be especially useful for the required dynamic access of today’s (and tomorrow’s) mostly permanent remote workforce.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Cloud applications and storage</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Employees’ remote computers can’t become regular storage locations for sensitive documents and data. Employees should not be able to work with sensitive information with unencrypted thumb drives or other hardware and leave the data in locations where thieves could prey upon them. Ransomware continues to be a serious threat for destroying remote data.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Many companies are shifting to web-based office tools like Google Workspace (formerly G Suite) or Microsoft Teams where cloud storage with encryption is available. These platforms are very flexible, perfect for dispersed teams, and relatively easy to deploy to a large workforce, but the security details are still not completely understood. While the major companies employ large security teams, the model of shipping code to people’s browsers is still evolving. Google, for example, suffered an embarrassing leak of private documents. And Microsoft has had its share of awkward moments and outages.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">On the other hand, from a security perspective, these two giants have cleared several strict Federal cloud security programs like FedRAMP and others. FedRAMPs mission is to “promote the adoption of secure cloud services across the Federal Government by providing a standardized approach to security and risk assessment.” Ultra-security conscience agencies and contractors often rely on FedRAMP approved vendors and service providers because of the strict minimum standards required.&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">TLS certificates</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">When employees log in remotely, they should use encrypted connections. Make sure websites have updated TLS certificates and the sites use HTTPS for all communications. Installing certificates to enable encrypted web connections couldn’t be easier thanks to the efforts of projects like Let’s Encrypt. Certificates offering more elaborate guarantees like organization are found with other certificate authorities like DigiCert, GeoTrust and Comodo. Many cloud providers and colocation services will resell certificates.</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;font-weight:700;">Review assumptions about remote security</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Some of the most important steps are not technical; they’re emotional and personal. “Everybody went home very rapidly and now I think we're in an era where we have to formalize procedures,” says Greg Conti, a co-founder of cybersecurity research firm Kopidlon. “We can’t assume it's temporary, then we need to develop policies for the long haul.&quot;&nbsp;</span></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">One important premise behind digital transformation is user and customer accessibility. The best foundation for digital transformation is “distributed” security. The best strategy for security is a layered approach. Combining a few, or in some cases all, of the technologies and techniques here may be the right approach for your organization. For example ZTNA and SDP work well together, when done right. In many instances, these technologies can completely replace existing legacy solutions and methodologies. Caution should be taken so that things don’t get unnecessarily complicated and undermine goals and objectives..&nbsp;</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;">Everyone should pause and revisit all decisions made in haste. The pandemic forced everyone to act quickly and in some cases rashly. It’s no longer a matter of holding on until this thing is over. Even if it’s all ends tomorrow it has changed everything and those changes aren’t going away.</span></p><p style="margin-bottom:10pt;"></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="color:inherit;"></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><p style="margin-bottom:10pt;"></p><div></div>
<p></p><p><span style="color:inherit;"></span></p><p></p><p style="margin-bottom:10pt;"><span style="font-size:15px;"><span style="color:inherit;"></span></span></p><div></div>
<p></p><p><span style="font-size:15px;"><span style="color:inherit;"></span></span></p></div>
</div></div><div data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_f7K7eJjHlgYw6e-1oTIOEg"].zpelem-col{ border-radius:1px; } </style></div>
</div><div data-element-id="elm_g-T-HgQvSlz8clQaDUusZw" data-element-type="divider" class="zpelement zpelem-divider "><style type="text/css"> [data-element-id="elm_g-T-HgQvSlz8clQaDUusZw"].zpelem-divider{ border-radius:1px; } </style><style></style><div class="zpdivider-container zpdivider-line zpdivider-align-center zpdivider-width100 zpdivider-line-style-solid "><div class="zpdivider-common"></div>
</div></div><div data-element-id="elm_HHGclGAVB56BMinShtsYYg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HHGclGAVB56BMinShtsYYg"].zpelem-text { border-radius:1px; margin-inline-end:60px; margin-inline-start:60px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><span style="color:inherit;"><div>Cloud 9 Advisers helps business leaders and understaffed IT teams that need a strategic partner, not just another vendor. We help you buy the right technology solutions and not “get sold” on the wrong ones. We work with you to rationalize and reduce technology spending without sacrificing technology by employing sound digital transformation principles and strategies.</div><div><br></div><div>We do not sell solutions, we help you buy solutions. We are not a vendor, we help you find the right vendors. We facilitate decisions by diagnosing the problems and pains you’re currently facing then prescribing the right procedures and “medication”.&nbsp;</div><div><br></div><div>We are impartial, unbiased, and vendor-neutral experts in Cybersecurity, Communications, Connectivity, and Cloud technologies and solutions. Our proprietary software contains decades of data and analytics on all of the 250+ vendors in our Supplier Portfolio. We will quickly discover, refine, then match your requirements with the vendors’ capabilities; eliminating months of research trying to do it on your own.&nbsp;</div><div><br></div><div>Contact us and book an appointment today to learn more</div></span></div>
</div></div><div data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_4_ArpSxEQo29V4AfwGb_Fw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/contact-us"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 12 Feb 2021 12:20:10 -0500</pubDate></item></channel></rss>