June 25, 2017

Four Steps To Protect Your Company From Small Business Data Breaches

Small business data breaches and the theft of proprietary information is becoming all too common in the 21st century. An ongoing goal of Zephyr Networks is to reduce data anxiety among small business owners by improving cyber security. In today’s modern world, data breaches and stolen intellectual property can sink a once successful company. By providing adequate resources to properly manage information security and emphasizing the safety of our data center services, Zephyr Networks can help.

Beware Small Business Data Breaches

small business data breaches

Protect Your Company From Small Business Data Breaches

The simple truth is that the threat of a data breach is an increasingly widespread problem for businesses of all sizes. In 2015, the Anthem data breach opened the door to 80 million patient and employee records, potentially exposing names, dates of birth, Social Security numbers, email addresses, employment information and income data.

The 2015 Experian data breach led to information exposure for 15 million T-Mobile customers. Yet, despite these big company threats, small business data breaches remain the most prevalent. A Ponemon Institute survey found that 55 percent of small businesses have had at least one data breach and 53% of those companies had multiple small business data breaches.

Although many company owners are aware of the risks of small business data breaches, they believe that they do not have proper financial and human resources to effectively protect their company. Zephyr Networks want you to know that this is not the case. As Zephyr’s founder Marc Winger explains, “We have learned over time how to tailor our services to meet the needs of each specific client. By understanding a company’s resources and data security needs, in the vast majority of cases, we can design a package of valuable services that makes sense.”

Zephyr Networks Can Help Your Business

Below are four steps that a company can take to avoid small business data breaches and protect proprietary information. While working with Zephyr Networks can help make these initial steps operate more smoothly, guaranteeing long-term reliability, many also can be taken independently. Ultimately, the focus should be on spending a little today to avoid the huge costs and tremendous demands brought on by small business data breaches.

How To Protect Your Company From Small Business Data Breaches

1. Encrypt All Electronic Devices

With the increasingly mobile workplace, people can access the information they need remotely. Such remote access means company information may be exposed to greater security vulnerabilities. Encrypting all electronic devices is an important first step in securing information. All electronic devices used by employees should be encrypted to protect confidential company information regardless of whether employees use their own devices or devices provided through the company. In the event that electronic devices are lost, stolen or compromised, encryption will protect the information stored on the device and mitigate any compromising activity. Zephyr Networks can help your small business with the institution of this protocol.

2. Institute a Password-Protected and Clean-Desk Policy

Every employer device, whether desktop or mobile, should be password-protected. In addition, a clean-desk policy encourages employees to clear their desks and lock documents in a filing cabinet or storage unit when they step away from their workstation at the end of each work day or for an extended period during the day. Zephyr Networks believes the clean-desk policy also implies clean cyberspace where applications are closed, social networks logged off and documents protected. A combination of a password-protected and clean-desk policy ensures that all confidential data is secure, both in the office and in cyberspace.

3. Protect Printing Stations

Your small business needs to institute a best practices standard for the handling and printing of confidential information. Employees and staff should not leave documents unattended at a shared printing station. To strengthen security around printing stations, consider using passwords for printing jobs that identify each employee. Such password protection also can help detail the amount being spent by both employees and departments on printing, avoiding excessive outlays of resources.

4. Designate a Cyber Security Representative

40% of small business owners report having no employee directly responsible for managing data security and cyber security. When you work with Zephyr Networks, you can have a specific employee liaison with our company. In addition, your Zephyr account manager will know and understand the details of your work with our company. If you have a problem or a question, we are one phone call, one text message or one email away from a quick response. While senior management and leadership should play a vital role in mitigating data breaches, a Cyber Security Representative can handle the day-to-day management.

Ongoing Protection From Small Business Data Breaches

As small business owners, you need the freedom to focus on your business and not on data anxiety and help mitigate information security risks. In addition to these easy and cost-effective tips, businesses should consider planning and implementing a comprehensive information security approach for the long-term. This is where we can help. Please call (800) 884-7559 to learn more about how Zephyr Networks can help protect your company from small business data breaches.

Your Company’s Cybersecurity Options Must Be Kept Up-To-Date In A Dangerous World Of Hackers And Cybercrime

Are you cybersecurity options up-to-date? Even with the best of intentions, business people forget to update software, install antivirus programs and make sure that their cybersecurity options are kept up-to-date. If your company is failing to maintain a necessary focus on the ever-evolving threat of cybercrime and the resulting vulnerabilities, you could be placing more than yourself at risk. Zephyr Networks believes it is essential for small to mid-sized business owners to understand the risks involved. Once such risks are understood, very few ever choose to go it alone.

Danger Of Out-Of-Date Cybersecurity Options

By weakening your own defenses, you do a lot more than just make yourself more vulnerable to future attack from cybercriminals and hackers. You also increase the vulnerability of your customers, your vendors and other people in your online community by making the information on your servers accessible to hacking.  Furthermore, if a hacker surreptitiously takes over a device on your network, it can be used to attack other computers.

cybersecurity options

Cybersecurity Options Needed

Even a company as large as Target that spends a literal fortune each year on cyber-security ended up being attacked and hacked via a heating and air-conditioning supplier. The Target breach was nothing less than significant and a perfect example of the vulnerability we are describing. Since their vendor had second-rate cybersecurity, Target became vulnerable as well.

As you probably know, thousand of innocent consumers paid the price. That price is exponentially increased when you consider the long-term cost to Target’s reputation as being a safe place to shop, both in person and online. Do I trust a company a second time that rolled the dice with my confidential information once?

Small to Mid-Sized Cybersecurity Problems

What proves to be even more problematic is that small to mid-sized companies are often reluctant to admit that they have been hacked. Small to mid-sized companies think such a disclosure could lay them open to litigation while draining a large percentage of their customer base. Did such a network breach happen in the Target case to the air conditioning company in the past, but ultimately went unnoticed or was covered up by nervous executives?

Possible widespread solutions being suggested or tried include increasing transparency about data losses; helping consumers and firms to make more informed decisions about cybersecurity; and shedding more light on how internet-service providers (ISPs) deal with malware infections they spot on customers’ computers. In addition, almost all American states now have data-breach laws that require firms to reveal any loss of sensitive customer information.

Widespread Solutions + Cybersecurity Options

cybersecurity options, Zephyr managed services

Necessity of Cybersecurity Options

Widespread solutions are a good idea, and Zephyr Networks supports the institutions of laws that promote transparency and improve cybersecurity measures across the board. Nevertheless, such approaches will not necessarily help your company if you fail to keep your cybersecurity options up-to-date. In addition, if a client or vendor in your cyber circle fails to keep their cybersecurity options up-to-date, you could be the victim of their network being hijacked. By the time the damage is done, it could be too late for everyone involved.

At Zephyr Networks, we can do trainings at your business site, fostering a friendly atmosphere that allows your employees to understand the possible dangers and potential threats.  By keeping your company more cognizant of threats and providing ways to keep your data safe, Zephyr Networks goes beyond the cyber by focusing on the essential element of fostering security.

Zephyr Networks Cybersecurity Options

As a direct result of such obvious threats, Zephyr Networks of Orange County offers cybersecurity options to our clients that take the burden of the cutting edge off of their shoulders. As IT professionals with the experience and expertise needed, the tech team at Zephyr Networks have been updating the cybersecurity options of our clients for years. In addition, we offer them the latest cutting edge cybersecurity tools like access to a private cloud and virtual desktops. To learn more about what Zephyr Networks can do for your small to mid-sized company, please call (800) 884-7559 for a free consultation.

 

Do You Realize How High The Risk Of A Data Breach Is For Your Small Business?

Do you have any idea how high the risk of a data breach is for your small business? For every high-profile case like the Target data breach at the end of 2013, there are hundreds of data breaches experienced by small businesses owners across the country. If you thought there was no risk of a data breach because it only happens to the big boys and your confidential information is safe because of your size, you couldn’t be more wrong.

Since January 2012, California has seen the equivalent a major data breach every 2-½ days, and those include only the data breaches that have been reported. The risk of a data breach is increasing by the day.  The majority of data breaches often go unreported and, even more frightening, many go unnoticed.

The Risk Of A Data Breach

risk of a data breach, zephyr networks

Risk of a Data Breach

Jason Oxman, chief executive of the Electronic Transactions Association, told the Los Angeles times that, “We are absolutely facing an epidemic of attacks on our nation’s infrastructure and attempts to gain access to information… smaller merchants tend to be easier and more attractive targets for cyber criminals.” Although the big problems like Heartbleed make headlines, the threats to confidential data held by everyday enterprises – dentist offices, colleges, financial consultants, Specialty Retailers and the list goes on and on – tend to fly under the radar. This reality does not surprise Zephyr Networks.

The dark underside of the current American economy is populated by not only the prototypical nerdy hackers, but by organized crime operatives who steal office computers and ex-employees who take the information given in trusted confidence and sell it to the highest bidder. The risk of a data breach comes from many different dark sources.

If more than 500 Californians are affected, the institution must give the attorney general’s office a copy of the advisory letter sent to potential victims. More than 380 of these letters have been posted since the program began in January 2012 — which equates to a major breach in the state every 2-½ days.

Risk Of A Data Breach Growing

Still, these are only the companies coming forward, admitting what has happened to them, and taking responsibility. The risk of a data breach also includes the risk of losing business due to the scandal. A good percentage of small to mid-sized companies hit by data breaches bury the truth. Such a bad decision is the result of the fear that a data breach will permanently damage their business. What is problematic is their fear is based in reality because public data breaches often erode a company’s client base while damaging their reputation. This is the price brought on by casually accepting the risk of a data breach.

Despite the prevalence of data breaches and equipment thefts, many small firms know little or nothing about cybersecurity. The National Small Business Association reported that 44% of respondents to a survey last year had been victims of at least one cyberattack or data breach, with an average $8,699.48 cost for each breach. Accepting the risk of a data breach often proves costly.

Understanding The Risk Of A Data Breach

Zephyr Networks understands that California’s size and wealth make its businesses a popular target. Companies that process, store or transmit credit and debit card data are expected by card companies and payment processors to abide by the Payment Card Industry Data Security Standard, a checklist of protocols known as PCI. But many of the 8 million U.S. businesses that accept credit and debit cards simply ignore this requirement.

Small-business owners often leave themselves vulnerable, increasing the risk of a data breach, by browsing social media or messaging friends on the same computer used to process financials. Others allow employees to log in to company networks remotely using easily stolen passwords or credentials. “It’s an economic calculation for a small merchant — is it more expensive to secure the network, or pay for the damages that may result if not?” Oxman said. “But many don’t consider the possible reputational harm. If you’re a small business, you might not be able to withstand the drop in business that might result from a breach.”

Minimizing The Risk Of A Data Breach

If you are a small business in Orange County, Zephyr Networks has a proven history of providing cybersecurity solutions that are affordable and tailored for each specific company. We know how to miminize the risk of a data breach for your company. To find out more, please contact Zephyr Networks by calling 800.884.7559.

Did You Know A Public Data Breach Will Cost Your Company Up To A Third Of Your Clients And Customers?

A public data breach can really hurt your company in both the short-term and the long-term. As a respected provider of network security options in Orange County with private cloud capabilities, Zephyr Networks knows that retailers, service-oriented business owners and healthcare providers need to be put on notice right away. If your company suffers a public data breach, you should expect to lose up to a third of your clients and customers. Such frightening findings have been revealed in a new study entitled “Avoidable Collateral Damage from Corporate Data Breaches,” conducted by Javelin Strategy & Research and sponsored by Identify Finder.

Reported on in an article on e-Security Planet, Javelin surveyed 5,634 U.S. adults on their views around data security and privacy. Three points in particular stood out as being downright unnerving for a business owner facing a potential public data breach.

Public Data Breach Downside

  1. 33 percent of consumers said they will shop elsewhere if their retailer of choice suffers a data breach.
  2. 30 percent of patients said they will find a new healthcare care provider if their hospital or doctor’s office is breached and their data is placed in a position of jeopardy.
  3. 24 percent of consumers said they will change banks or credit card providers if their financial institution suffers a data breach.

As Marc Winger of Zephyr Networks explained, “It is scary for a business owner to see how many affected clients and customers will vanish post-breach. In past experiences, we have seen that such a drop-off can be anywhere from a 20% to even a 50% loss once the news gets out. That’s a big loss in terms of reduced sales and shows exactly how a data breach hits the bottom line of a business incredibly hard. Given the lack of skilled IT security professionals capable of dealing with such data breaches and the scope of work required to identify the vulnerabilities, it really makes sense for business owners to safeguard their futures by having a ready-made solution in place.”

Public Data Breach Challenges

public data breach

Public Data Breach Dangers

A further problem is too many companies have imprecise data breach detection systems and second-rate cyber security that casts too big of a net. Neiman Marcus experienced 30,000 security alerts during the period of its three-month public data breach in 2013. Such a bombardment of security alerts aids cyber-criminals in masking their attacks. By having imprecise network security systems and protocol and failing to move to the safety of the private cloud, small to mid-sized business owners are placing their future in jeopardy.

Zephyr Networks can address such problems and truly help safeguard the future of your business and protect you from the dangers of a public data breach. To learn more about how Zephyr Networks can help you with a tailored package of network security, data breach protection and private cloud IT options, please call 800.884.7559 for a free consultation.

IRS A Vocal Supporter Of Business Continuity Planning And Disaster Recovery Strategies For Business Owners

When the IRS becomes a vocal supporter of business continuity planning and disaster recovery strategies, the Computer & Networking Support specialists at Zephyr Networks take note. In a recent Special Edition Tax Tip entitled Keep Your Records Safe In Case Disaster Strikes that was released in May of 2014, the IRS strongly emphasizes the best practices that have helped make Zephyr Networks one of the top Computer & Network Security providers in Orange County.

IRS Supports Business Continuity Planning

In the recent news release, the IRS clearly explains an key point in business continuity planning:”

business continuity planning

IRS & Business Continuity Planning

“Some natural disasters are more common in the summer. But major events like hurricanes, tornadoes and fires can strike any time. It’s a good idea to plan for what to do in case of a disaster. You can help make your recovery easier by keeping your tax and financial records safe.”

By focusing on the essentials, the IRS outlines a list of effective disaster recovery strategies that Zephyr Networks has instituted in practice for Orange County business owners for many years. This list includes the following suggestions:

Business Continuity Planning Suggestions

1. Backup Records Electronically

Scan important business documents onto an electronic format and use an external storage source to store important records. This is why Zephyr Networks advises our clients to take advantage of our private cloud capabilities. Never forget to back up files and keep them in a safe place.

2. Use Business Continuity Planning To Be Prepared

If you have an expert on your side like Zephyr Networks, emergency preparedness for a disaster will be in place through first-class business continuity planning. The IRS recommends that you review your emergency plans every year. Knowing what natural disasters can hit your area, make sure your are ready to address the real potential problems your business might face.

3. Count On The IRS And Zephyr Network

If you fall victim to a disaster, the IRS is ready to help. The IRS disaster hotline at 866-562-5227 is your best resource for special help with disaster-related tax issues.

Help With Business Continuity Planning

At the same time, Zephyr Networks in Orange County is your best resource for business continuity planning and disaster recovery strategies. By being safe in advance, your business can weather any storm. By making sure client companies and businesses are safe if disaster strikes, Zephyr Networks ensures future financial security even in the face of natural disaster. Call Zephyr Networks at 800-884-7559 to access the business continuity help you need in Orange County.

5 Data Security Questions To Ask A Cloud Vendor

cloud vendor, data security

Data Security in the Clouds

Do you know the data security questions you should ask a cloud vendor? Zephyr Networks understands how important it is for a company to be able to trust a cloud vendor. When you are allowing an external party to safeguard the essential data and proprietary information that forms the backbone of your business, you need to be confident in their capabilities. Although not comprehensive, the 5 data security questions below can help any business validate whether or not they want to work with a potential new cloud vendor.

5 Data Security Questions To Ask A Cloud Vendor

1) Does the cloud vendor implement controls to segregate your data from other client companies?

Since cloud vendors tend to base their business on a multi-client model, the addition of other companies opens the door to a greater possibility of attack. If a multi-client server is not properly secured, a flaw in one client application could allow an attacker access to your company’s data. This is why it is essential for each client company to be safely segregated from the others on any cloud-based server.

2) Does the cloud vendor regularly encrypt and test its backups?

If a cloud vendor does not test its backups on a regular basis and update the necessary encryption, such backups are theoretically useless. Cloud-computing server backups need to be regularly tested, monitored and encrypted with the latest data security updates.

3) Does the cloud vendor have a reliable disaster recovery and business continuity plan for its data housing server sites?

When it comes to data recovery plans and business continuity strategies, your company cannot take a chance in the internet age of 24-hour business opportunities. Make sure any cloud vendor your company chooses to work with has a reliable disaster recovery and business continuity plan to ensure the safety of your data.

4) Does the cloud vendor follow data destruction processes for computer equipment and storage devices that ensures the zeroing out of all confidential information?

Before you enter into an agreement with a cloud vendor, ask them about their data destruction process. Do they take all the necessary steps to zero out confidential information on decommissioned computer equipment and storage devices? If you move on later, will your confidential information be thoroughly wiped from their servers?

5) Can the cloud vendor provide relevant certificates and applicable compliance certifications?

There is a vast array of compliance certifications for cloud vendors that include the following; ITIL, COBIT, ISO 2700, and many more. If a cloud vendor claims to be in such compliance, ask them to show you the relevant certificates and applicable compliance certifications? If they can’t do this, there most likely is a problem.

Cloud Vendor Relationship Managed

As a proponent of cloud-based solutions, Zephyr Networks has the experience needed by our clients to secure and ensure their valuable company data. We consistently negotiate and manage a client’s relationship with a cloud vendor.  To learn more about how we can help you with cloud-based storage, data security and network security solutions, please call Zephyr Networks toll free at (800) 884-7559 or fill out our handy contact form.

Is Your Company Protected By A Business Continuity And Data Recovery Plan That Makes Sense?

Is your business continuity and data recovery plan working? As a respected provider of information technology solutions and computer networking support, Zephyr Networks knows from experience that for business continuity and data recovery plans to succeed, data protection must become an integral part of a company. Rather than adding a second-rate business continuity and data recovery plan without any real implementation, Zephyr Networks helps our client companies make data protection and network security an extension of their overall company culture. After all, the way a company handles its information technology challenges, including systems, support and strategy, is already a key part of its culture.

Business Continuity and Data Recovery Plan

When auditing the technology plans and strategies of our client companies, Zephyr Networks often finds business continuity and data recovery plans that have atrophied. Why is this so often the case? When it comes to backup strategies and disaster recovery plans, they simply are not at the forefront of an everyday, weekly or even monthly awareness of most businesses. If your company is focused on the business of today and maintaining productivity levels, this outlook makes sense to Zephyr Networks. In fact, this outlook is exactly why so many Orange County companies choose to partner with us as a provider of their IT Solutions.

business continuity and data recovery plan

Is Your Company Ready For The Storm To Hit?

What is essential to understand is nothing can be more damaging to your company’s productivity and profitability than a lack of a workable business continuity and data recovery plan when a disaster hits. Whether it was Tropical Storm Sandy in New York or mud slides in Malibu or earthquakes in California, too many small to mid-sized businesses have been caught off guard by unexpected disasters. By working with Zephyr Networks, such unexpected happenings don’t have to become disasters for your company if the proper business continuity and data recovery plan is in place.

Disaster Recovery Questions To Ask

When Zephyr Networks works with a new client, we ask a lot of questions and access a lot of information to do the job right and the way a company owner wants it to be done. Among the questions we ask about business continuity and data recovery are the following:

  1.   What is needed to update the business continuity and data recovery plan accordingly?
  2.   Should we start replicating that virtual machine to preserve the data?
  3.   How often should that server’s data be protected?
  4.   Are virtual capabilities being used properly?
  5.   Are all essential employees aware of the plan and their roles?

By asking these questions and more, Zephyr Networks helps your company develop and install a business continuity and data recovery plan that makes sense. If you need help with your company’s business continuity and data recovery plan, please call Zephyr Networks toll free at (800) 884-7559 or fill out our handy contact form.

 

 

Orange County IT Services Provides Company Stability So You Can Work On Your Business, Not In Your Business

The key to Zephyr Networks approach to providing Orange County IT Services is stability. By ensuring that your company has the very best in information technology, system virtualization and network security, we give you the freedom to work on your business and not in your business. How many top executives have seen time and resources drained by network interruptions, data breaches, and poor technological planning? At Zephyr Networks, we truly believe that such challenges should be non-issues that no longer present problems or take up the time of our client companies.

By focusing on solutions that are both proactive and preventative, Zephyr Networks provides our clients with the freedom to do what they do best. After all, the point of going to work every day is not to work in your business, but to work on your business, being productive and profitable. Technology is supposed to make work easier. The very point of technological innovation is to improve your productivity and profitability. When IT issues get in the way of your core business, something clearly is not right and needs to be addressed. Zephyr Networks is designed to provide effective solutions to such problems.

The four-tiered approach of Zephyr Networks is at the very heart of why we do what we do so well. The beating core of this heart is setting the technological groundwork of consistent stability for our clients when it come to their IT needs. Like the consistency of a heartbeat, we want your company’s technology and networks and computer systems to operate consistently, effectively and efficiently. After ensuring stability, Zephyr Networks delivers ongoing maintenance and monitoring to help with business continuity. Business continuity is not merely an issue of what to do during a catastrophic event. Rather, business continuity is an ongoing day-to-day focus on the smooth and reliable operations of a company’sinformation technology, computer systems, and networks.

The third part of Zephyr Network’s four-tiered approach is like the armor a knight wears to protect the stability of his heart. Network security, cyber defense and contingency planning make up the defensive attributes of this armor. By making sure that your company is protected from data breaches, cyber criminals and casual hackers, Zephyr Networks prevents problems before they happen. The fourth part is about helping you do what you do best: Zephyr Networks helps you work on your business by keeping your computer systems up-to-date and making sure you remain on the cutting edge of technological updates. If there is an innovation that can help your company without consuming too much time or too many resources, Zephyr Networks wants you to have the freedom of knowledge to make such a choice.

Zephyr Networks understands that the focus of our work remains the IT stability and security of your company. By making sure that your technology base is strong, we help to give you the freedom to grow and improve your core business.  If you want to take your Orange County IT services to the next level of excellence, please contact Zephyr Networks today. To learn more about how we can help your company, call Zephyr toll free at (800) 884-7559 or fill out our handy contact form.

British Report Reveals Data Breaches And Cyber Security Incidents Increasing As Cyber Criminals Attack Both Large And Small Businesses

Data Breaches and Cyber Security incidents are not only a problem in the United States. Zephyr Networks was not surprised when a detailed British study of the state of cyber security and data breaches by the Department for Business, Innovation & Skills (BIS) revealed extensive threats and vulnerabilities in the UK. The study – The 2013 Information Security Breaches Survey – reveals the threat of cyber attacks for both large and small businesses.

Like in the United States and specifically in Southern California, it does not matter whether you have a large, small or mid-sized company. Without taking the proper cyber defense precautions, your company is vulnerable. In the UK, attacks against small businesses increased by 10% in the past year, costing up to 6% of their turnover. Zephyr Networks knows from experience that these companies could have protected themselves for much less. Small businesses were advised by the British Government  to ensure that they are protected through managing risk, staff training and increased network security. Cyber security is not just an IT challenge, it is critical to the running of any business.

Some small to mid-sized businesses, whether in the UK or in Southern California, don’t have the resources to hire a full team of information security staff. To help these businesses to protect themselves, the British government has introduce Innovation Vouchers with a value of over $7500 to be used to improve their IT security with outside expertise. Zephyr Networks wishes that either the federal government of the state government of California would follow this smart path laid out by the British authorities. If you need affordable help in Southern California, please contact Zephyr Networks for cyber security solutions that will help ensure the safe future of your business and safeguard your company’s data. To prevent data breaches, call Zephyr Networks for a free consultation at (800) 884-7559.

data breaches, cyber security, information security, cyber defense

Cyber Security Incidents & Data Breaches Increasing All Over The World

This infographic by Via Resource highlights the growing trends in UK information security breaches.

 

The United States And Japan Hold Bilateral Cyber Dialogue Conference On Cyber Security

In May of 2013, the United States and Japan held their first ever bilateral talks on cyber security and cyber defense. The focus of the Tokyo conference was the prevention malicious and intentional cyber attacks and data breaches. The genesis of the conference between the United States and Japan were the cyber attacks and data breaches by government-sponsored hackers traced back to China. Zephyr Networks fully supports such international efforts by states to address questions of cyber security and cyber defense.

Cyber Security, cyber defense, cyber dialogue

Cyber Security Leads To Bilateral Conference

Both the United States and Japan view such cyber attacks, including, hacking and the use of viruses, as a growing threat to national security. Being state-sponsored in China, the cyber attacks are becoming more and more sophisticated, demanding greater measures to ensure cyber security. The two-nation conference came in the wake of a report by the US Pentagon accusing China of cyber spying against the American government. Beijing naturally denies the allegations, saying it’s impossible to tell where the attacks originated.

Joint Statement From Cyber Security Conference

Here is an excerpt from the joint statement after the conference:

The U.S.-Japan Cyber Dialogue deepened bilateral cooperation on a wide range of cyber issues and strengthened the U.S.-Japan Alliance by:

  • Exchanging information on cyber issues of mutual concern and discussing possible cooperative measures.
  • Affirming common objectives in international cyber fora, especially the application of norms of responsible state behavior in cyberspace.
  • Supporting the development of practical confidence-building measures and the implementation of national whole-of-government cyber strategies in an effort to reduce risk in cyberspace.
  • Confirming support for the preservation of openness and interoperability enhanced by the multi-stakeholder system of Internet governance.
  • Coordinating cooperation on cyber capacity-building efforts in third countries.
  • Identifying actions governments and private sector entities can take to secure critical infrastructure.
  • Addressing the increasing role of cyber defense in national defense and security strategies and discussing new areas of bilateral cyber defense cooperation.

If Japan and the United States are able to turn these common objectives and goals into actual reality, Zephyr Networks believes the Cyber Dialogue Conference produced some real value. It will take time to see what happens, but without question as the hackers get more sophisticated, cyber security experts must do the same. If you want to learn more about how we can help your company with cyber security, please call Zephyr Networks toll free at (800) 884-7559 or fill out our handy contact form.