October 23, 2017

Protect Your Digital Business By Learning How Cybersecurity Has Evolved To Become A Top Priority In 2016

In the 21st century, Zephyr Networks has found that the complexities of digital business in an algorithmic economy have significantly increase the dangers faced by companies across the board. After all, what business is not a digital business with an online presence to at least a certain extent in 2016? As the hacker industry becomes an emergent reality, every digital business is vulnerable with size, geography and industry no longer being the main determinate risk factors. While most companies rely on perimeter defense and rule-based security, such an old-fashioned approach to cybersecurity is no longer adequate.

Digital Business = Cybersecurity Priority

digital business

Digital Business Equals Cybersecurity Needed

Given the evolution into cloud-based services, your company needs the support that allows threats to be both detected and responded to in real time. Beyond blocking and other past measures to prevent attacks, you need to realize that cybersecurity includes an intrinsic approach to dealing with threats that overcome traditional barriers. The new adaptive security architecture offered by Zephyr Networks evolves and grows to meet emerging threats.

Today’s hackers are now using negative machine learning. Machine learning is a field of computer science that leverages pattern recognition algorithms. Negative machine learning is when this technology is employed for malicious purposes. In 2016, hackers will use negative machine learning more broadly. As a result, positive machine learning needs to be employed to keep up with and even pre-empt sophisticated cyber attacks. Although positive machine learning has been a part of all cybersecurity options for years, only now is it being adapted to respond to negative machine learning.

Machine Learning And Digital Business

As Hackers broaden their targeting and expand their range beyond the specific, cyber targets have significantly increased. No longer will your company be specifically targeted. Rather, the cyber vulnerabilities of your company will turn your business into a target, regardless of size, industry or geography. If there is an opening found, the hackers will take advantage of it.

As data becomes more contextually rich, it becomes more valuable to cybercriminals once it is shown to be vulnerable. Suddenly, the context is not as important as the opportunity. The growing risk of attack will require next-generation techniques for cybersecurity, including improvements in identity access management and now information management.

Even more importantly, public clouds need security system architectures that protect the private companies operating within this matrix. Acceptable risk levels and controls radically shift once a private company with context-rich intellectual property and proprietary information becomes part of a public cloud. Zephyr Networks has designed protocols and strategies to address such issues while also offering private cloud access.

Positive Machine Learning For Your Digital Business

Although positive machine learning algorithms have been used by security applications for years with varying success, big data analytics in the cloud is changing the potential effectiveness of these applications. Since Zephyr Networks runs our own data centers, managing a private cloud for our clients, we help ensure safety beyond the dangers of the public cloud. Our goal is to help make sure your company is protected from hackers. By working with Zephyr Networks, you can make cybersecurity a priority in 2016.

Four Steps To Protect Your Company From Small Business Data Breaches

Small business data breaches and the theft of proprietary information is becoming all too common in the 21st century. An ongoing goal of Zephyr Networks is to reduce data anxiety among small business owners by improving cyber security. In today’s modern world, data breaches and stolen intellectual property can sink a once successful company. By providing adequate resources to properly manage information security and emphasizing the safety of our data center services, Zephyr Networks can help.

Beware Small Business Data Breaches

small business data breaches

Protect Your Company From Small Business Data Breaches

The simple truth is that the threat of a data breach is an increasingly widespread problem for businesses of all sizes. In 2015, the Anthem data breach opened the door to 80 million patient and employee records, potentially exposing names, dates of birth, Social Security numbers, email addresses, employment information and income data.

The 2015 Experian data breach led to information exposure for 15 million T-Mobile customers. Yet, despite these big company threats, small business data breaches remain the most prevalent. A Ponemon Institute survey found that 55 percent of small businesses have had at least one data breach and 53% of those companies had multiple small business data breaches.

Although many company owners are aware of the risks of small business data breaches, they believe that they do not have proper financial and human resources to effectively protect their company. Zephyr Networks want you to know that this is not the case. As Zephyr’s founder Marc Winger explains, “We have learned over time how to tailor our services to meet the needs of each specific client. By understanding a company’s resources and data security needs, in the vast majority of cases, we can design a package of valuable services that makes sense.”

Zephyr Networks Can Help Your Business

Below are four steps that a company can take to avoid small business data breaches and protect proprietary information. While working with Zephyr Networks can help make these initial steps operate more smoothly, guaranteeing long-term reliability, many also can be taken independently. Ultimately, the focus should be on spending a little today to avoid the huge costs and tremendous demands brought on by small business data breaches.

How To Protect Your Company From Small Business Data Breaches

1. Encrypt All Electronic Devices

With the increasingly mobile workplace, people can access the information they need remotely. Such remote access means company information may be exposed to greater security vulnerabilities. Encrypting all electronic devices is an important first step in securing information. All electronic devices used by employees should be encrypted to protect confidential company information regardless of whether employees use their own devices or devices provided through the company. In the event that electronic devices are lost, stolen or compromised, encryption will protect the information stored on the device and mitigate any compromising activity. Zephyr Networks can help your small business with the institution of this protocol.

2. Institute a Password-Protected and Clean-Desk Policy

Every employer device, whether desktop or mobile, should be password-protected. In addition, a clean-desk policy encourages employees to clear their desks and lock documents in a filing cabinet or storage unit when they step away from their workstation at the end of each work day or for an extended period during the day. Zephyr Networks believes the clean-desk policy also implies clean cyberspace where applications are closed, social networks logged off and documents protected. A combination of a password-protected and clean-desk policy ensures that all confidential data is secure, both in the office and in cyberspace.

3. Protect Printing Stations

Your small business needs to institute a best practices standard for the handling and printing of confidential information. Employees and staff should not leave documents unattended at a shared printing station. To strengthen security around printing stations, consider using passwords for printing jobs that identify each employee. Such password protection also can help detail the amount being spent by both employees and departments on printing, avoiding excessive outlays of resources.

4. Designate a Cyber Security Representative

40% of small business owners report having no employee directly responsible for managing data security and cyber security. When you work with Zephyr Networks, you can have a specific employee liaison with our company. In addition, your Zephyr account manager will know and understand the details of your work with our company. If you have a problem or a question, we are one phone call, one text message or one email away from a quick response. While senior management and leadership should play a vital role in mitigating data breaches, a Cyber Security Representative can handle the day-to-day management.

Ongoing Protection From Small Business Data Breaches

As small business owners, you need the freedom to focus on your business and not on data anxiety and help mitigate information security risks. In addition to these easy and cost-effective tips, businesses should consider planning and implementing a comprehensive information security approach for the long-term. This is where we can help. Please call (800) 884-7559 to learn more about how Zephyr Networks can help protect your company from small business data breaches.

Modern Cyber Criminals Are A Real Threat To Your Company’s Onsite Servers

Cyber criminals are a real threat to your company Zephyr Networks wants to be sure that small to mid-sized business owners across Orange California in particular and Southern California as a whole are aware of the criminal dangers that can threaten their company’s servers. Beyond the remote cyber security threats, onsite hacking due to a lack of security in your office server rooms is a danger as well. Still, remote cyber security threats and hacking dangers to your servers remain the number one danger.

The Threat of Cyber Criminals

cyber criminals

The Real Threat of Cyber Criminals

Recent revelations about the hacking forum Darkode proved to be truly frightening. Upon being taken down by the Justice Department, it was discovered that the hackers were making malware to create networks of malware-infected “zombie” computers to perform automated criminal tasks online without the user’s knowledge. The zombie computers could be used to do just about anything within a hacker’s realm of power. Nobody is immune to such 21st century threats. Such dangers exist for your company as well.

A zombie is a computer connected to the Internet that has been compromised by a hacker. Such a computer can be used to perform malicious tasks of one sort or another under remote direction. Potential threats of cyber criminals could greatly undermine your business by compromising your servers are real.

Cyber Criminals – Onsite Threats To Servers

Criminal threats to your company’s servers exist because security in office server rooms is often nonexistent. Beyond remote hacking with zombie computers, if thieves that are hackers with computer capabilities break into your offices in the night or during a holiday, they literally can steal everything. More and more of these cyber criminals exist, particularly within local organized crime gangs and syndicates that see private business information, intellectual property, and computers as the new criminal frontier.

Once experienced cyber criminals are actually in your office and in front of the server hardware, it is so much easier for them to access what they want to steal. By tackling servers head-on, cyber criminals can capture all of your company’s data and information. Imagine a kidnapping of everything on your company’s servers and the compromising of all of your databases. Once the kidnappers are gone, there will be no ransom demands; the data is taken for good.

Advanced Security Of The Irvine Data Center

At the Irvine data center of Zephyr Networks, our security team’s monitoring tools function 24-7. If something happens that is not copasetic, our security team is immediately alerted. The Irvine Data Center has security designed to address HIPAA, SOX, and other compliance challenges where client and company information must be protected. We make sure both cyber criminals and onsite thieves are unable to steal your company’s data and intellectual property.

Zephyr Networks offers local safety for the modern remote world. Our data center team helps your business avoid problems that could undermine your profitability and productivity. You can set-up a free informational tour of the Irvine data center site with Zephyr Networks so you can see our capabilities for yourself. To learn more about the advantages of the Zephyr Networks Irvine Data Center, please contact us today by calling (800) 884-7559.

Orange County IT News – No More Microsoft Product Support For Windows Server 2003, Exchange Server 2003 & More

If you are an Orange County business owner with older computer and networking systems, did you know that Microsoft product support ended in the beginning of April for several key 2003 products. If you have not updated your systems, the time to do it is now. Since your company is more than two generations behind given how past computer networking and software product lines evolve, it is a complex process to get up-to-date. But Zephyr Networks can help while improving your security, offering innovative new options and helping to train your staff.

Lifecycles of Microsoft Product Support

Here is an outline of what is happening with the older Microsoft products as their lifecycles come to an end:

microsoft product support

Zephyr Networks Provides Orange County IT Support

The Microsoft Exchange Server 2003, Outlook 2003, Windows XP, Exchange 2010 SP2 and Windows Server 2003 will no longer be  eligible for tech or updates support from Microsoft. All the lifecycles of these Microsoft products end in early April of 2015, except for Windows Server 2003 that ends in the middle of July 2015 .

  1. Outlook 2003 will transition out of extended support on 8th of April 2014
  2. Exchange Server 2003 will transition out of extended support on 8th of April 2014
  3. Windows XP will transition out of extended support on 8th of April 2014
  4. Exchange 2010 SP2 will transition out of support on 8th April 2014
  5. Windows Server 2003will transition out of extended support on 14th of July 2015

Microsoft Product Support Ends

Microsoft will stop sending security updates to System Center Endpoint Protection and Forefront Endpoint Protection for Windows Server 2003 on July 14, 2015. Windows Server 2003 will become an “unsupported” product on that date, according to Microsoft’s product lifecycle schedule. Once a product has passed their “extended support” period, the customer no longer receive product updates, including security patches, from Microsoft.

Microsoft doesn’t recommend using Windows Server 2003 past its product lifecycle end date. Even if Windows Server 2003 had good anti-malware support, such support may not be enough to keep it secure as hackers and cybercriminals continue to evolve their attacks. “We have found in our research that the effectiveness of anti-malware solutions on out-of-support operating systems is limited,” Microsoft warned.

The lack of security patches means a potential risk for organizations. Once the previous malware updates expire, your company will be vulnerable. By not keeping up-to-date with the latest networking and computer security threats, your company could be hit hard by cybercriminals looking to hijack your data or even just bored hackers out to cause a little trouble. To avoid such problems, please contact Zephyr Networks at (800) 884-7559 today.

Sony Hack Implications For The Cybersecurity Of Your Company

Without question, the biggest entertainment story, maybe even the biggest story period at the end of 2014 was the Sony hack by presumed North Korean agents in response to the release of The Interview. Beyond the leak of unreleased movies like Annie and Still Alice, the hackers behind the cyber-attack stole the personal, financial and medical data about thousands of past and present SPE employees and their dependents. By failing to properly secure such information, Sony Pictures Entertainment placed the future of the company in jeopardy by opening the door to countless civil lawsuits and class action suits.

The Sony Cyber-Attack & Your Company

Can you imagine such a cyber-attack against your company and the ugly consequences? Would you be able to survive class action lawsuits by employees and ex-employees if such information was stolen and used against them? Do you want the private emails between you and your employees to be revealed in public?

The goal of Zephyr Networks is to help you avoid such devastation by providing you with the latest in information technology protection in the form of cybersecurity, network security and computer security. If a multinational company as large as Sony Pictures Entertainment could be severely hurt and publicly humiliated by a cyber-attack, then your company is at risk as well.

 Confidential Employee Information Stolen

sony hack, cybersecurity

The Sony Hack & Your Company’s Cybersecurity

Before going any further into what Zephyr Networks can do to help, here is a sample of what was stolen by the hackers. The damage goes well beyond the early release of a few minor movies and some scandalous emails between executives and producers. According to a notice letter to employees that was dated December 8, 2014, Sony Pictures Entertainment revealed that unauthorized individuals as a result of a “brazen cyber-attack” had obtained identifiable information about employees and their dependents. Sony Pictures Entertainment listed the following types of information that may have been obtained:

“(i) name, (ii) address, (iii) social security number, driver’s license number, passport number and/or other government identifier, (iv) bank account information, (v) credit card information for corporate travel and expense, (vi) username and passwords, (vii) compensation and (viii) other employment-related information. In addition, unauthorized individuals may have obtained (ix) HIPAA protected health information, such as name, social security number, claims appeals information you submitted to SPE (including diagnosis and disability code), date of birth, home address, and member ID number to the extent that you and/or your dependents participated in SPE health plans, and (x) health/medical information that you provided to use outside of SPE health plans.”

In a downright shocking account of the hack, C-SPAN reported that the hackers stole 47,000 unique Social Security numbers from the Sony Pictures Entertainment computer network. The hackers claim to have stolen over 100 terabytes of data from Sony. Can you imagine if such confidential information about your employees was stolen from your company? Rather than working on growing your business, you would be entrenched in legal fights as you struggled to survive the onslaught of lawsuits.

A Goal Of Zephyr Networks

Zephyr Networks, Cybersecurity, Sony hack

Zephyr Cybersecurity Protection

The goal of Zephyr Networks is to make sure that no such cyber-attack is ever allowed to hurt our client companies. Yes, we understand that your company most likely will not be targeted by North Korea or any such foreign entity. Given the power of hackers, however, one disgruntled employee or angry competitor easily could wreak illegal damage on your company. What bothers Zephyr Networks is how many companies remain unprotected and how at risk their confidential information is when it doesn’t have to be that way.

To learn more about how Zephyr Networks can help your company address the issue of cybersecurity and network security, please call (800) 884-7559 for a free consultation.

Your Company’s Cybersecurity Options Must Be Kept Up-To-Date In A Dangerous World Of Hackers And Cybercrime

Are you cybersecurity options up-to-date? Even with the best of intentions, business people forget to update software, install antivirus programs and make sure that their cybersecurity options are kept up-to-date. If your company is failing to maintain a necessary focus on the ever-evolving threat of cybercrime and the resulting vulnerabilities, you could be placing more than yourself at risk. Zephyr Networks believes it is essential for small to mid-sized business owners to understand the risks involved. Once such risks are understood, very few ever choose to go it alone.

Danger Of Out-Of-Date Cybersecurity Options

By weakening your own defenses, you do a lot more than just make yourself more vulnerable to future attack from cybercriminals and hackers. You also increase the vulnerability of your customers, your vendors and other people in your online community by making the information on your servers accessible to hacking.  Furthermore, if a hacker surreptitiously takes over a device on your network, it can be used to attack other computers.

cybersecurity options

Cybersecurity Options Needed

Even a company as large as Target that spends a literal fortune each year on cyber-security ended up being attacked and hacked via a heating and air-conditioning supplier. The Target breach was nothing less than significant and a perfect example of the vulnerability we are describing. Since their vendor had second-rate cybersecurity, Target became vulnerable as well.

As you probably know, thousand of innocent consumers paid the price. That price is exponentially increased when you consider the long-term cost to Target’s reputation as being a safe place to shop, both in person and online. Do I trust a company a second time that rolled the dice with my confidential information once?

Small to Mid-Sized Cybersecurity Problems

What proves to be even more problematic is that small to mid-sized companies are often reluctant to admit that they have been hacked. Small to mid-sized companies think such a disclosure could lay them open to litigation while draining a large percentage of their customer base. Did such a network breach happen in the Target case to the air conditioning company in the past, but ultimately went unnoticed or was covered up by nervous executives?

Possible widespread solutions being suggested or tried include increasing transparency about data losses; helping consumers and firms to make more informed decisions about cybersecurity; and shedding more light on how internet-service providers (ISPs) deal with malware infections they spot on customers’ computers. In addition, almost all American states now have data-breach laws that require firms to reveal any loss of sensitive customer information.

Widespread Solutions + Cybersecurity Options

cybersecurity options, Zephyr managed services

Necessity of Cybersecurity Options

Widespread solutions are a good idea, and Zephyr Networks supports the institutions of laws that promote transparency and improve cybersecurity measures across the board. Nevertheless, such approaches will not necessarily help your company if you fail to keep your cybersecurity options up-to-date. In addition, if a client or vendor in your cyber circle fails to keep their cybersecurity options up-to-date, you could be the victim of their network being hijacked. By the time the damage is done, it could be too late for everyone involved.

At Zephyr Networks, we can do trainings at your business site, fostering a friendly atmosphere that allows your employees to understand the possible dangers and potential threats.  By keeping your company more cognizant of threats and providing ways to keep your data safe, Zephyr Networks goes beyond the cyber by focusing on the essential element of fostering security.

Zephyr Networks Cybersecurity Options

As a direct result of such obvious threats, Zephyr Networks of Orange County offers cybersecurity options to our clients that take the burden of the cutting edge off of their shoulders. As IT professionals with the experience and expertise needed, the tech team at Zephyr Networks have been updating the cybersecurity options of our clients for years. In addition, we offer them the latest cutting edge cybersecurity tools like access to a private cloud and virtual desktops. To learn more about what Zephyr Networks can do for your small to mid-sized company, please call (800) 884-7559 for a free consultation.

 

Simple Steps to a Secure Password

If you’ve had to reset any of your passwords, you’ve run into the stricter requirements that all websites are now enforcing.  These requirements may include using both lower and upper case letters; using numbers; or using a symbol.  By incorporating these, your making a secure password, and  you’re helping to ensure the privacy of your information.

But how can these simple and effect steps create a secure password?

The longer and more complex your password is, the better.

With the increasing amount of online purchases and transaction, safeguarding your information is more important than ever.

Here are 5 other easy ways to help you create a more secure password.

1. Use a password phrase

  • A quote for your favorite movie, book, poem, or song:  ‘You’re gonna need a bigger boat’[1]
  • A famous saying:  ‘My fellow Americans’

2. Substitute numbers and symbols in place of letters

  •  Leaves of Grass  —>  Le@v3 of Gr4$$[2]

3. Create an acronym

  • ‘Toto, I’ve got a feeling we’re not in Kansas anymore’[3] —>  TIGAFWNIKA

4. Misspell or write your password backwards

  • Broadway  —>  Braodway
  • Broadway  —>  yawdaorB

5. Create a pattern on your keyboard

  • Make a zigzag pattern by using letters and numbers that are above or below one another for example, FT6yhu8IK

 


[1] JAWS, 1975

[2] Leaves of Grass, Walt Whitman

[3] Wizard of Oz, 1939

Do You Realize How High The Risk Of A Data Breach Is For Your Small Business?

Do you have any idea how high the risk of a data breach is for your small business? For every high-profile case like the Target data breach at the end of 2013, there are hundreds of data breaches experienced by small businesses owners across the country. If you thought there was no risk of a data breach because it only happens to the big boys and your confidential information is safe because of your size, you couldn’t be more wrong.

Since January 2012, California has seen the equivalent a major data breach every 2-½ days, and those include only the data breaches that have been reported. The risk of a data breach is increasing by the day.  The majority of data breaches often go unreported and, even more frightening, many go unnoticed.

The Risk Of A Data Breach

risk of a data breach, zephyr networks

Risk of a Data Breach

Jason Oxman, chief executive of the Electronic Transactions Association, told the Los Angeles times that, “We are absolutely facing an epidemic of attacks on our nation’s infrastructure and attempts to gain access to information… smaller merchants tend to be easier and more attractive targets for cyber criminals.” Although the big problems like Heartbleed make headlines, the threats to confidential data held by everyday enterprises – dentist offices, colleges, financial consultants, Specialty Retailers and the list goes on and on – tend to fly under the radar. This reality does not surprise Zephyr Networks.

The dark underside of the current American economy is populated by not only the prototypical nerdy hackers, but by organized crime operatives who steal office computers and ex-employees who take the information given in trusted confidence and sell it to the highest bidder. The risk of a data breach comes from many different dark sources.

If more than 500 Californians are affected, the institution must give the attorney general’s office a copy of the advisory letter sent to potential victims. More than 380 of these letters have been posted since the program began in January 2012 — which equates to a major breach in the state every 2-½ days.

Risk Of A Data Breach Growing

Still, these are only the companies coming forward, admitting what has happened to them, and taking responsibility. The risk of a data breach also includes the risk of losing business due to the scandal. A good percentage of small to mid-sized companies hit by data breaches bury the truth. Such a bad decision is the result of the fear that a data breach will permanently damage their business. What is problematic is their fear is based in reality because public data breaches often erode a company’s client base while damaging their reputation. This is the price brought on by casually accepting the risk of a data breach.

Despite the prevalence of data breaches and equipment thefts, many small firms know little or nothing about cybersecurity. The National Small Business Association reported that 44% of respondents to a survey last year had been victims of at least one cyberattack or data breach, with an average $8,699.48 cost for each breach. Accepting the risk of a data breach often proves costly.

Understanding The Risk Of A Data Breach

Zephyr Networks understands that California’s size and wealth make its businesses a popular target. Companies that process, store or transmit credit and debit card data are expected by card companies and payment processors to abide by the Payment Card Industry Data Security Standard, a checklist of protocols known as PCI. But many of the 8 million U.S. businesses that accept credit and debit cards simply ignore this requirement.

Small-business owners often leave themselves vulnerable, increasing the risk of a data breach, by browsing social media or messaging friends on the same computer used to process financials. Others allow employees to log in to company networks remotely using easily stolen passwords or credentials. “It’s an economic calculation for a small merchant — is it more expensive to secure the network, or pay for the damages that may result if not?” Oxman said. “But many don’t consider the possible reputational harm. If you’re a small business, you might not be able to withstand the drop in business that might result from a breach.”

Minimizing The Risk Of A Data Breach

If you are a small business in Orange County, Zephyr Networks has a proven history of providing cybersecurity solutions that are affordable and tailored for each specific company. We know how to miminize the risk of a data breach for your company. To find out more, please contact Zephyr Networks by calling 800.884.7559.

Did You Know A Public Data Breach Will Cost Your Company Up To A Third Of Your Clients And Customers?

A public data breach can really hurt your company in both the short-term and the long-term. As a respected provider of network security options in Orange County with private cloud capabilities, Zephyr Networks knows that retailers, service-oriented business owners and healthcare providers need to be put on notice right away. If your company suffers a public data breach, you should expect to lose up to a third of your clients and customers. Such frightening findings have been revealed in a new study entitled “Avoidable Collateral Damage from Corporate Data Breaches,” conducted by Javelin Strategy & Research and sponsored by Identify Finder.

Reported on in an article on e-Security Planet, Javelin surveyed 5,634 U.S. adults on their views around data security and privacy. Three points in particular stood out as being downright unnerving for a business owner facing a potential public data breach.

Public Data Breach Downside

  1. 33 percent of consumers said they will shop elsewhere if their retailer of choice suffers a data breach.
  2. 30 percent of patients said they will find a new healthcare care provider if their hospital or doctor’s office is breached and their data is placed in a position of jeopardy.
  3. 24 percent of consumers said they will change banks or credit card providers if their financial institution suffers a data breach.

As Marc Winger of Zephyr Networks explained, “It is scary for a business owner to see how many affected clients and customers will vanish post-breach. In past experiences, we have seen that such a drop-off can be anywhere from a 20% to even a 50% loss once the news gets out. That’s a big loss in terms of reduced sales and shows exactly how a data breach hits the bottom line of a business incredibly hard. Given the lack of skilled IT security professionals capable of dealing with such data breaches and the scope of work required to identify the vulnerabilities, it really makes sense for business owners to safeguard their futures by having a ready-made solution in place.”

Public Data Breach Challenges

public data breach

Public Data Breach Dangers

A further problem is too many companies have imprecise data breach detection systems and second-rate cyber security that casts too big of a net. Neiman Marcus experienced 30,000 security alerts during the period of its three-month public data breach in 2013. Such a bombardment of security alerts aids cyber-criminals in masking their attacks. By having imprecise network security systems and protocol and failing to move to the safety of the private cloud, small to mid-sized business owners are placing their future in jeopardy.

Zephyr Networks can address such problems and truly help safeguard the future of your business and protect you from the dangers of a public data breach. To learn more about how Zephyr Networks can help you with a tailored package of network security, data breach protection and private cloud IT options, please call 800.884.7559 for a free consultation.

5 Data Security Questions To Ask A Cloud Vendor

cloud vendor, data security

Data Security in the Clouds

Do you know the data security questions you should ask a cloud vendor? Zephyr Networks understands how important it is for a company to be able to trust a cloud vendor. When you are allowing an external party to safeguard the essential data and proprietary information that forms the backbone of your business, you need to be confident in their capabilities. Although not comprehensive, the 5 data security questions below can help any business validate whether or not they want to work with a potential new cloud vendor.

5 Data Security Questions To Ask A Cloud Vendor

1) Does the cloud vendor implement controls to segregate your data from other client companies?

Since cloud vendors tend to base their business on a multi-client model, the addition of other companies opens the door to a greater possibility of attack. If a multi-client server is not properly secured, a flaw in one client application could allow an attacker access to your company’s data. This is why it is essential for each client company to be safely segregated from the others on any cloud-based server.

2) Does the cloud vendor regularly encrypt and test its backups?

If a cloud vendor does not test its backups on a regular basis and update the necessary encryption, such backups are theoretically useless. Cloud-computing server backups need to be regularly tested, monitored and encrypted with the latest data security updates.

3) Does the cloud vendor have a reliable disaster recovery and business continuity plan for its data housing server sites?

When it comes to data recovery plans and business continuity strategies, your company cannot take a chance in the internet age of 24-hour business opportunities. Make sure any cloud vendor your company chooses to work with has a reliable disaster recovery and business continuity plan to ensure the safety of your data.

4) Does the cloud vendor follow data destruction processes for computer equipment and storage devices that ensures the zeroing out of all confidential information?

Before you enter into an agreement with a cloud vendor, ask them about their data destruction process. Do they take all the necessary steps to zero out confidential information on decommissioned computer equipment and storage devices? If you move on later, will your confidential information be thoroughly wiped from their servers?

5) Can the cloud vendor provide relevant certificates and applicable compliance certifications?

There is a vast array of compliance certifications for cloud vendors that include the following; ITIL, COBIT, ISO 2700, and many more. If a cloud vendor claims to be in such compliance, ask them to show you the relevant certificates and applicable compliance certifications? If they can’t do this, there most likely is a problem.

Cloud Vendor Relationship Managed

As a proponent of cloud-based solutions, Zephyr Networks has the experience needed by our clients to secure and ensure their valuable company data. We consistently negotiate and manage a client’s relationship with a cloud vendor.  To learn more about how we can help you with cloud-based storage, data security and network security solutions, please call Zephyr Networks toll free at (800) 884-7559 or fill out our handy contact form.