July 18, 2019

October Is National Cyber Security Awareness Month With A Message Of Action & Intelligence: STOP. THINK. CONNECT.

October 1 marked the start of National Cyber Security Awareness Month (NCSAM) for 2013, a U.S. initiative aimed at making sure everyone has the resources they need to protect themselves online. Zephyr Networks completely supports the number one goal of NCSAM: “Each and every one of us needs to do our part to make sure that our online lives are kept safe and secure.” Although  National Cyber Security Awareness Month is focused on both individuals and businesses, Zephyr Networks has seen the threats to the cyber security of small to mid-sized businesses becoming more and more dangerous in the past year.

National Cyber Security Awareness Month

Zephyr Networks is proud to quote from the About page on the National Cyber Security Awareness Month website that illuminates the mission of the project:

cyber security awareness, zephyr networks, network solutions


Cybersecurity is the mechanism that maximizes our ability to grow commerce, communications, community and content in a connected world. / The Internet is a shared resource and securing it is Our Shared Responsibility… No individual, business, or government entity is solely responsible for securing the Internet. Everyone has a role in securing their part of cyberspace, including the devices and networks they use… If each of us does our part—implementing stronger security practices, raising community awareness, educating young people, training employees—together we will be a digital society safer and more resistant from attacks and more resilient if one occurs. 

When it comes to our clients, Zephyr Networks also would like to pass on the central message of National Cyber Security Awareness Month: STOP. THINK. CONNECT. What is key about this message is that it focuses on combining action with intelligence. STOP means take a breath and look at your cyber vulnerabilities and what needs to be done. This is what Zephyr Networks does with new clients when we first analyze their business model, their network security, their cyber security and computer systems.

THINK means diagnosis before treatment for us. Zephyr Networks does not offer a blanket program for every company that comes to us for help. Instead, we diagnose the specific problems each company faces, then we offer treatment that makes sense for that company. Our goal is to help your company, not spend your valuable capital on programs and technologies that will sit idle and do nothing to protect your cyber security.

Connect With Cyber Security Experts

For Zephyr Networks, CONNECT means work with cyber experts and network professionals who are on the cutting edge of the technology industry. Nothing changes faster in our society than technology and the Internet. By connecting with our clients, the tech experts at Zephyr Networks learn about their business challenges and their real needs. We protect your cyber security by first understanding your business, then providing a cyber solution that makes sense.

One of our main goals is the same as the mission of the NCSAM: “Take security and safety precautions, understand the consequences of your actions and behaviors online and enjoy the benefits of the Internet.” To learn more about how we can protect the cyber security of your company, call Zephyr toll free at (800) 884-7559 or fill out our handy contact form.



3 HIPAA Omnibus Rule Compliance Tips For Health Care Organizations

hipaa omnibus rule, compliance, zephyr networks

HIPAA Omnibus Rule & Compliance

With March 26 being the effective date of the HIPAA Omnibus Rule taking effect, the time for your health care company to contemplate possible compliance options practically is over.  What keeps your company from being in real trouble is that Sept. 23 is the actual compliance enforcement date. The HIPAA Omnibus Rule modifies the HIPAA privacy, security and enforcement rules as well as the HIPAA breach notification regulations. These changes are complex and detailed because they include both greater accountability and documentation requirements. Such requirements complicate the rush for an implementation plan. The solution may not be simple, but Zephyr Networks can point you in the right direction to accomplish the first steps.

3 HIPAA Omnibus Rule Compliance Tips

HIPAA Compliance Tip 1: Implementation

Numerous healthcare associations, Internet resources and consultants can help your company understand the HIPAA updates, what’s changed from the earlier versions of the HIPAA Omnibus Rule, and where the risks are to your company. How complicated the implementation plan is depends on how compliant your program is today with past HIPAA standards and rules.

Your health care organization should be able to use the HHS Security Framework as a baseline and develop a compliance program. Still, very few people in the health care industry have read the entire HIPAA Omnibus Rule. It is extremely lengthy so the best bet is to use the search feature of your PDF reader and look for “Final Rule.” Read and understand every section that starts with this heading. Make sure you have good policies, documentation, processes and controls in place to meet each standard. Zephyr Networks can help our clients with the network security procedures and IT needs that apply.

In addition, The National Institute of Standards and Technology offers numerous free guidelines for how to create and manage security programs, including a HIPAA Security Resource Guide and HIPAA Toolkit.

HIPAA Compliance Tip 2: Operational Compliance

The operational goal of every compliance program should be simplicity and universal application in the context of your company. Each compliance program can be measured against the metrics used by the Health and Human Services’ Office for Civil Rights in its HIPAA audit program protocol. Compare your program of processes, controls, policies and training against the 78 security, 81 privacy and 10 breach elements. If you believe there is a gap, you most likely have identified a risk. The IT experts at Zephyr Networks can aid you in this complex process.

HIPAA Compliance Tip 3: Ongoing Transition Plan

The rise in reporting of breach incidents combined with the new hefty fines should motivate your motivate your health care company to prioritize an ongoing transition plan. By working with a quality IT and network security provider like Zephyr Networks, you can help guarantee that the initial push becomes an ongoing part of your business model. When it comes to regulations as complex as the new HIPAA Omnibus Rule, one initial push is not enough. Your health care company has to focus on creating an ongoing transition plan that turns the initial shift into a part of your company’s inherent culture and technological approach . Implementation must evolve to become a normative state of being.

After all, your health care company’s goals in this compliance process of implementation is the same as the main goal behind the new HIPAA Omnibus Rule. Like the new rules that have expanded HIPAA, a big part of your company’s ultimate goal is to improve the quality, integrity, and confidentiality of your patient’s protected health information. Still, Zephyr Networks understands how intimidating compliance with the new HIPAA Omnibus Rule can be for any health care company or business. This is why the information technology experts and network security consultants at Zephyr Networks are available to help your health care company navigate these dangerous waters.


Showing The Prominence Of Cyber Defense, Cisco To Buy Cybersecurity Company SourceFire For $2.7 Billion

At the end of July 2013, Cisco Systems agreed to buy Sourcefire, a key provider of cybersecurity services, for about $2.7 billion in cash. Reported in The New York Times and The Wall Street Journal, the acquisition reflects the growing fervor for cyber defense and the rising value of companies that can help guard against computer-based attacks. As a major Orange County provider of IT solutions and cybersecurity, Zephyr Networks  believes the efforts of major players in the technological industry to provide cybersecurity is only just beginning. Unlike the corporate giants, however, Zephyr Networks is able to deliver IT solutions and cybersecurity to small to mid-sized Orange County businesses with a desire to connect with the human face of their cyber defense.

Cybersecurity Equals Big Business

Under the terms of the mega deal, Cisco will pay $76 a share in cash, nearly 30 percent higher than Sourcefire’s closing price on Monday. The offer includes retention-based incentives for Sourcefire’s executives. Founded in 2001, Sourcefire has grown into a major cybersecurity provider. In 2012, the company reported $5 million in profit on revenue $223.1 million. Shares in Sourcefire climbed about 29 percent in premarket trading, to $76.40, over the deal price, in a potential sign that investors might be expecting a bidding war. After all, quality cybersecurity providers on the level of Sourcefire are few and far between, and there might be other bidders coming to the table.

cybersecurity, cyber defense, it solutions

Sourcefire & The Importance of Cybersecurity

In a statement, Cisco said that adding Sourcefire would take it’s portfolio of security offerings to the next-generation of excellence. “Buy has always been a key part of our build-buy-partner innovation strategy,” said Hilton Romanski, a Cisco vice president for corporate development. “Sourcefire aligns well with Cisco’s future vision for security and supports the key pillars of our security strategy.” Without question, the acquisition of Sourcefire is symbolic of the primary role that Cyber Defense has ascended to in the arena of business, technology and security.

Zephyr Networks & Affordable Cybersecurity

The focus of the work of Zephyr Networks  the IT stability and cybersecurity of our client company. If you want to find out how our IT solutions can help your company and ensure your cybersecurity , please contact Zephyr Networks today. To learn more about cybersecurity strategies that are affordable and actually work, call Zephyr toll free at (800) 884-7559 or fill out our handy contact form.


Orange County IT Services Provides Company Stability So You Can Work On Your Business, Not In Your Business

The key to Zephyr Networks approach to providing Orange County IT Services is stability. By ensuring that your company has the very best in information technology, system virtualization and network security, we give you the freedom to work on your business and not in your business. How many top executives have seen time and resources drained by network interruptions, data breaches, and poor technological planning? At Zephyr Networks, we truly believe that such challenges should be non-issues that no longer present problems or take up the time of our client companies.

By focusing on solutions that are both proactive and preventative, Zephyr Networks provides our clients with the freedom to do what they do best. After all, the point of going to work every day is not to work in your business, but to work on your business, being productive and profitable. Technology is supposed to make work easier. The very point of technological innovation is to improve your productivity and profitability. When IT issues get in the way of your core business, something clearly is not right and needs to be addressed. Zephyr Networks is designed to provide effective solutions to such problems.

The four-tiered approach of Zephyr Networks is at the very heart of why we do what we do so well. The beating core of this heart is setting the technological groundwork of consistent stability for our clients when it come to their IT needs. Like the consistency of a heartbeat, we want your company’s technology and networks and computer systems to operate consistently, effectively and efficiently. After ensuring stability, Zephyr Networks delivers ongoing maintenance and monitoring to help with business continuity. Business continuity is not merely an issue of what to do during a catastrophic event. Rather, business continuity is an ongoing day-to-day focus on the smooth and reliable operations of a company’sinformation technology, computer systems, and networks.

The third part of Zephyr Network’s four-tiered approach is like the armor a knight wears to protect the stability of his heart. Network security, cyber defense and contingency planning make up the defensive attributes of this armor. By making sure that your company is protected from data breaches, cyber criminals and casual hackers, Zephyr Networks prevents problems before they happen. The fourth part is about helping you do what you do best: Zephyr Networks helps you work on your business by keeping your computer systems up-to-date and making sure you remain on the cutting edge of technological updates. If there is an innovation that can help your company without consuming too much time or too many resources, Zephyr Networks wants you to have the freedom of knowledge to make such a choice.

Zephyr Networks understands that the focus of our work remains the IT stability and security of your company. By making sure that your technology base is strong, we help to give you the freedom to grow and improve your core business.  If you want to take your Orange County IT services to the next level of excellence, please contact Zephyr Networks today. To learn more about how we can help your company, call Zephyr toll free at (800) 884-7559 or fill out our handy contact form.

The United States And Japan Hold Bilateral Cyber Dialogue Conference On Cyber Security

In May of 2013, the United States and Japan held their first ever bilateral talks on cyber security and cyber defense. The focus of the Tokyo conference was the prevention malicious and intentional cyber attacks and data breaches. The genesis of the conference between the United States and Japan were the cyber attacks and data breaches by government-sponsored hackers traced back to China. Zephyr Networks fully supports such international efforts by states to address questions of cyber security and cyber defense.

Cyber Security, cyber defense, cyber dialogue

Cyber Security Leads To Bilateral Conference

Both the United States and Japan view such cyber attacks, including, hacking and the use of viruses, as a growing threat to national security. Being state-sponsored in China, the cyber attacks are becoming more and more sophisticated, demanding greater measures to ensure cyber security. The two-nation conference came in the wake of a report by the US Pentagon accusing China of cyber spying against the American government. Beijing naturally denies the allegations, saying it’s impossible to tell where the attacks originated.

Joint Statement From Cyber Security Conference

Here is an excerpt from the joint statement after the conference:

The U.S.-Japan Cyber Dialogue deepened bilateral cooperation on a wide range of cyber issues and strengthened the U.S.-Japan Alliance by:

  • Exchanging information on cyber issues of mutual concern and discussing possible cooperative measures.
  • Affirming common objectives in international cyber fora, especially the application of norms of responsible state behavior in cyberspace.
  • Supporting the development of practical confidence-building measures and the implementation of national whole-of-government cyber strategies in an effort to reduce risk in cyberspace.
  • Confirming support for the preservation of openness and interoperability enhanced by the multi-stakeholder system of Internet governance.
  • Coordinating cooperation on cyber capacity-building efforts in third countries.
  • Identifying actions governments and private sector entities can take to secure critical infrastructure.
  • Addressing the increasing role of cyber defense in national defense and security strategies and discussing new areas of bilateral cyber defense cooperation.

If Japan and the United States are able to turn these common objectives and goals into actual reality, Zephyr Networks believes the Cyber Dialogue Conference produced some real value. It will take time to see what happens, but without question as the hackers get more sophisticated, cyber security experts must do the same. If you want to learn more about how we can help your company with cyber security, please call Zephyr Networks toll free at (800) 884-7559 or fill out our handy contact form.


Steps To Address The Network Security Challenges Highlighted By 2013 Report

This is Part 2 of a Two-Part Blog about a 2013 report on global network security challenges. This second part will address some of the basic ways that a company can rectify the network security problems presented in Part 1.

network security, data breaches, zephyr networks

2013 Network Security A Necessity

Since Network Security and Data Breaches abound, and employee carelessness is a major cause of such problems, small to mid-sized companies need basic help. Zephyr Networks has a proven track record of helping companies deal with such problems. By providing quality network security and data breach prevention strategies, we help our clients protect their companies and safeguard their businesses. Our goal is to help you remain profitable.

4 Steps To Address Network Security Problems In 2013:

1) Educate Employees:

Employees are the first line of defense against cyber attacks and malware invasions. Organizations should conduct network security and data breach training on a regular basis for all existing and new employees. Zephyr Networks help train your employees to be aware of cyber security and avoid careless mistakes.

2) Identify Users: 

Every user-initiated action should be tagged to a specific person, whether in a physical or digital environment. Every year, a significant number of data breaches occur as the result of an attacker obtaining access to a user’s account. If each action taken is related to a specific user, it is that much easier to track the source of the problem and fix the damage done.

3) Unify Activity Logs:

 Most businesses today treat physical and information security controls separately. Badge systems, HR records, and even loss prevention are not typically tied to the same team that monitors firewalls, intrusion detection and other security technology. Zephyr Networks help businesses to unify security information and connect the processing of these logs to bolster network security

4) Visualize Network Security Problems:

 The ultimate goal for organizations should be to develop an environment in which network security threats are discovered before they happen. Security event visualization allows businesses to identify patterns, emerging vulnerabilities and cyber attacks before they happen. By knowing what has happened to other companies in your field and with your business model, you can prevent such network security problems and data breaches from happening to your company.

If you are worried about the network security of your company, please contact Zephyr Networks today. There is no reason why these straight forward approaches cannot be instituted to help your company and protect your proprietary intellectual property from data breaches. In the 21st Century, Network Security is not an option, but a necessity. To learn more about how we can protect the network security of your company, call Zephyr Networks toll free at (800) 884-7559 or fill out our handy contact form.


Highlights From 2013 Network Security & Data Breach Report

This is Part 1 of a Two-Part Blog about global network security challenges in 2013. Part 2 will address ways that a company can rectify these problems.

Spam, Network Security, malware

Spam & Network Security

Zephyr Networks is surprised at how slowly many small to mid-sized businesses are moving to address the new network security challenges and data breaches that have become all too common. A 2013 report about network security and data breaches by TrustWave focuses on the dominant problems facing companies and potential solutions. From spam to malware, phishing to data breaches, the problems faced by companies are growing as the use of technology grows. Zephyr Networks has a proven track record of helping companies deal with each of these challenges and more. By providing quality network security and data breach prevention strategies, we help our clients protect the essential data and intellectual property of their businesses.


4 Network Security and Data Breach Challenges:

1) Employees Unlocking The Cyber Door:

Employees leave the cyber door open to network security and data breach attacks. Whether due to lack of education or policy enforcement, employees pick weak passwords and continue to click on phishing links in spam and on websites. In addition, they share proprietary company information on social and public platforms.

2) The Vulnerability of Applications To Malware:

Applications emerged as the most popular attack vector, and the vulnerability of applications to malware is an ongoing issue. E-commerce sites were the number one targeted assets, and these sites often result in malware infecting applications used in conjunction with these sites.

3) Time Lag In Detection Of And Response To A Data Breach:

The majority of organizations attacked in 2012 took more than 90 days to detect an intrusion. What is even more frightening is that 5 percent discovered attacks that has taken place 3 or more years ago. The damage had already been done because the attack was never detected. This is where the services if a cyber security provider like Zephyr Networks becomes indispensable. .

4) Employees Still Clicking On Malicious Spam:

Spam volume represents over 75% percent of a typical organization’s inbound e-mail. Even if the majority is ignored, some gets through and the messages are examined and read by employees. What is disturbing is that roughly 10 percent of spam messages are malicious in nature, containing malware and other cyber threats. Still, employees continue to click on malicious spam, leading directly to breaches and network security  problems.

In Part 2 of this blog, Zephyr Networks will address some basic steps a company can take to address these issues.  If you are worried about the network security of your company, please contact Zephyr Networks today. To learn more about how we can protect your company, call Zephyr toll free at (800) 884-7559 or fill out our handy contact form.

3 Cloud-Based Technologies That Are Changing The Face Of Business Continuity For Small To Mid-Sized Companies

cloud based technologies, business continuity, zephyr

Business Continuity In The Clouds

Since reliability is invaluable when growing a small to mid-sized business, ensuring business continuity in the face of any disruption is becoming a necessity. Zephyr Networks has learned that a major aspect of the perception of a company’s business continuity is related to the appearance of availability. Today’s cloud-based technologies are changing the face of business continuity by making it easier than ever companies across the board to offer their customers an always-on, always-available and always-reliable service.

As a provider of modern technologies and cyber security, Zephyr Networks helps our clients employ the new cloud-based technologies to their benefit. Our ultimate goal is to make business continuity a non-issue for your company by addressing all of your cyber defense and cyber security needs.

 3 Cloud-Based Technologies To Maintain Business Continuity:

1) Cloud-Based Disaster Recovery Services – In the event of data loss or a natural disaster, using cloud-based backup services preserves and protects your data off-site. This enables your business to be up and running again quickly after a disaster.

2) Cloud-Based Storage Innovations – The cost of data storage hardware for even a small business can become staggering in this day and age of information technologies. Fortunately, new tools are making it possible for many businesses to substitute inexpensive cloud storage for costly servers and disk libraries.

3) File Syncing And Mobile Access – File syncing and mobile access tools help harness the potential of your cloud-based storage and disaster recovery backup tools. By synching computers with mobile devices, cloud-based technologies also provide access to essential data in remote locations.

While these new cloud-based tools can benefit small businesses, it does not always mix well with your existing technology. A prime example is Windows XP. Since Microsoft will soon discontinue support and upgrades for this anachronistic operating system, continuing to rely on it is a problematic choice for any company. If you want to take advantage of modern cloud-based technologies, you should not rely on an outdated Windows XP system.

If you hire Zephyr Networks as your network security provider, we will analyze what your company needs and tailor our solutions to meet your specific needs. To learn more about how we can help your company, call Zephyr Networks toll free at (800) 884-7559 or fill out our handy contact form.




If IT Professionals Doubt The Cyber Security Of Their Large Companies, How Can Your Small To Mid-Sized Business Protect Its Valuable Data?

The cyber defense and cyber security of their own companies are not respected by a majority of IT professionals. Zephyr Networks was not surprised when it was revealed that IT Security Professionals do not have faith in the cyber security of their own companies. A survey conducted recently revealed that more than 70% of IT security professionals would not be willing to bet $100 of their own money that their companies will not suffer a data breach in the next six months.

Carried out in February at RSA Conference 2013, the survey measured the attitudes of nearly 250 IT security professionals and the way their organizations manage cyber security. Nearly 50% of respondents work in organizations with more than 1,000 people. What was astounding is that the study revealed that a third of organizations do not have a policy making it compulsory to change default passwords when deploying new hardware, applications and network appliances to the corporate network.

Cyber Security Under Siege All Over

cyber security, network security, data breaches

Is Your Cyber Security Under Siege?

What bothers Zephyr Networks is if this is the cyber security perspective of IT security professionals at mostly large, well-funded companies with over 1,000 employees. If that is the case, what is the cyber security situation like for small to mid-sized businesses in America? While vendors of conventional security products like firewalls and anti-virus software are constantly updating their tools to reactively protect against the latest threats, hackers are looking for flaws. As this is being written, a hacker somewhere is engineering a new attack to exploit the latest updates.

The reality is that 100% protection is nearly impossible to achieve, particularly by professionals caught in the bureaucratic web of a company. Zephyr Networks knows, however, that best practices for securing access to critical systems and data are readily available if you work with an external network security provider. The key of working with a company like Zephyr Networks is providing your network security with the expertise and experience of an external eye.

Password Protection For Your Company

If you are worried about the cyber security and the cyber defense of your company, please contact Zephyr Networks today. When it comes to ensuring and maintaining your network security, we are your solution. To learn more about how we can protect your company, call Zephyr toll free at (800) 884-7559 or fill out our handy contact form.

2013 Verizon Data Breach Investigations Report Reveals Increased Need For Network Security And Cyber Defense

network security, data breach, verizon report

Network Security & Verizon Data Breach Report

The focus of the 2013 Verizon Data Breach Investigations Report is you should know how your network security is vulnerable to data breaches by knowing your enemy. In order to know your enemy, you have to know yourself first and your vulnerabilities. Zephyr Networks found the  2013 Verizon Data Breach Investigations Report to be a treasure-trove of data that underscores the importance of organizational self-analysis in determining what attackers want and how they are likely to go after it. The problem is that self-analysis is difficult when your staff is caught in the web of your business and its bureaucracy. Such a perspective reinforces the need to work with an outside provider like Zephyr Networks to protect your business

Verizon Data Breach Report Informs Network Security

The report is Verizon’s annual analysis of data breaches and breach investigations conducted in the previous year. In addition to Verizon’s own data, this year’s Data Breach Investigations Report (DBIR) includes breach incident data from 18 other organizations around the world (see below), including more than a dozen first-time contributors. Prior to analysis, Verizon once again standardized its breach dataset, this year encompassing 621 breach events and more than 44 million compromised records, using its VERIS incident-sharing framework.

Data points in the 2013 DBIR indicate clear patterns in the motives and methods adversaries used for successful data breaches. Of the 92% of breaches in this year’s data set that were caused by external threat actors, Verizon tied more than half (55%) to purely profit-driven organized criminal groups. According to Verizon, these profit-driven adversaries are most interested in companies in the finance, retail and food services industries, and their attacks most often originate from countries in Eastern Europe or North America. Not surprisingly, attackers seeking immediate profit favor payment data and personal information.

What is even scarier from the perspective of Zephyr Networks is that the focus of data breaches is not what most people expect. Small to mid-sized companies are more likely to be the victims of such attacks than major organizations. The difference is that any successful attack on a major organization receives a lot of external publicity as news. The truth is that cyber-espionage-related data breaches among companies with fewer than 10,000 employees happened more frequently than at larger firms by an 81-to-19 ratio.

Small To Mid-Sized Companies In Data Breach Danger

Kyle Maxwell, senior analyst with Verizon, explained: “Small attorney firms or professional services firms are getting compromised because they have sensitive data on clients. So rather than try to breach a large, well-defended network, it’s easier just to compromise the outside counsel or auditing firm, and get financials statements or plans for M&As [mergers and acquisitions] or other trade secrets from those firms . . .. Organizations can’t take a one-size-fits-all approach to their defenses; different types of attackers use different methods. Organizations of all sizes and all sectors need to understand their threats and plan accordingly rather than assume they can set up static defenses that’ll work for everything.”

A new twist in this year’s DBIR is the inclusion of more than 47,000 reported network security incidents, yet Verizon carefully delineated data points from that larger data set from those drawn from confirmed data breaches. Despite Verizon’s efforts to improve how it quantifies breach data, perhaps the most frightening data point in the entire report involves organizations’ inability to quantify data loss. According to Verizon, of the breach events comprising its data set, organizations had a complete and reliable count of compromised records only 15% of the time. In other words, in 85% of breach incidents, the organizations could not determine the full extent of the breach. Alexander said Verizon’s findings highlight how important it is for organizations to conduct a baseline inventory of sensitive data. It is essential to be able to discover what’s missing or what has been tampered with in the wake of a network security or data breach incident.

Zephyr Networks is grateful for the quality and precision of the 2013 Verizon Data Breach Investigations Report. Such a report helps us know how to provide better cyber defense and network security services to our clients. If you are worried about the network security and the cyber defense of your company, please contact Zephyr Networks today. When it comes to ensuring and maintaining your network security, we are your solution. To learn more about how we can protect your company, call Zephyr toll free at (800) 884-7559 or fill out our handy contact form.



The following organizations contributed breach incident data to the 2013 Verizon Data Breach Investigations Report.

First-time contributors are denoted with an asterisk.

Australian Federal Police (AFP)
*CERT Insider Threat Center at the Carnegie Mellon University Software Engineering Institute
*Consortium for Cybersecurity Action (CSIS control mapping)
*Danish Ministry of Defence, Center for Cybersecurity
*Danish National Police, NITES (National IT Investigation Section)
Dutch Police: National High Tech Crime Unit (NHTCU)
*Electricity Sector Information Sharing and Analysis Center (ES-ISAC)
*European Cyber Crime Center (EC3)
*G-C Partners, LLC
*Guardia Civil (Cybercrime Central Unit)
*Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
Irish Reporting and Information Security Service (IRISS-CERT)
*Malaysia Computer Emergency Response Team (MyCERT), CyberSecurity Malaysia
*National Cybersecurity and Communications Integration Center (NCCIC)
*U.S. Computer Emergency Readiness Team (US-CERT)
U.S. Secret Service