Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: Cybercrimecyber threatsData ProtectionRansomware
Author: Laura Shafer
Date: November 17, 2022

How secure are you?

No matter what you do, you cannot escape security. I was reminded of that as I tried to access one of our applications here at 11:11 Systems. Although I entered my password and followed up with two-factor authentication, the system had locked me out. I’m certain this was due to “user error,” but it also reminded me that security has a two-fold purpose. It needs to keep the wrong people out, but it also needs to let the right people in.

This incident emphasizes that security is at the heart of everything we do at 11:11 Systems. It is addressed on many distinct levels, through our people, processes, and technology. Most of our customers and partners know that security is an essential part of our cloud, connectivity, and (obviously) our security solutions.

Safety and cyber resiliency are also top of mind for so many businesses these days because a lack of security is affecting the bottom line. Whether it is ransomware or data breaches or another form of cybercrime, a week doesn’t go by without an organization being featured in headlines due to a security failure.

Security is also at the heart of our upcoming season of the CloudBytes podcast. “With cybercrime on the rise, we know that our customers and partners are focused on what they need to do to keep their networks and infrastructure secure,” said Brian Knudtson, director of cloud market intelligence for 11:11 Systems. “With the dual pressures of cybercrime and adoption of the cloud, security really can’t be ignored any more.”

Over the next few weeks, the podcast will feature conversations around security and what you need to do — changes to make, things to look for, important data to keep in mind — to keep your organization more secure. In truth, security can and should be foremost in your mind. “If security is an afterthought, you’ve already failed,” explains Trevor Pott, solutions architect at Juniper Networks.

What should be your first step to ensure your organization is secure? “We need to go back to the fundamentals of security and think about the fact that availability is just one leg of the CIA triad, the three core tenants of security: confidentiality, integrity and availability,” according to Steve Sims, chief information security officer at 11:11 Systems. He also adds that many businesses are having trouble finding the right technical talent to provide the levels of security that businesses need nowadays.

The solution isn’t to lock everything down completely. If you try to do that, your users will find another, unapproved method to get their work done and do what they need to do. That’s a security failure.

If my boss is reading this, you can rest assured that I did not go rogue when I had difficulty using one of our backend apps. I did reach out to the system admin and worked to find what the problem was and how to solve it. That’s security success.

Check out this CloudBytes Season Three preview to hear expert advice on how to navigate security and find your own success. Upcoming podcast episodes will focus on ways to protect your network, malware defense, and other ways your organization can become cyber resilient.

Categories: Cloud Compliance, Cybercrime, Ransomware, SecurityBy Laura ShaferNovember 17, 2022
Tags: Cybercrimecyber threatsData ProtectionRansomware
Laura Shafer Headshot

Author: Laura Shafer

Laura Shafer is the Vice President of Product Marketing. Laura's exuberant and passionate style permeates her life, whether she's rooting for her beloved Utah Utes football team, singing, or strategically communicating about technology to 11:11 customers and partners. Laura's skill as a communicator began with an entirely different kind of channel. She began her career as a television news producer before moving into technology marketing and communications for companies such as PowerQuest, StorageCraft, MRM//McCann, iland and 11:11 Systems.

Post navigation

PreviousPrevious post:The NIST CyberSecurity Framework: RecoverNextNext post:A Career in Cybersecurity? Advice from a CISO.

Related Posts

Security
You Can’t Win: Learning to Live with Security Pessimism
March 13, 2023
Building a Championship-Caliber Data Security Strategy
February 15, 2023
Veeam 12
Veeam 12 Preview: Multi-Factor Authentication
February 7, 2023
Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
What is 11:11 Systems?
What is 11:11 Systems? A company built on cloud, connectivity, and security
January 30, 2023
11:11 Systems Wins 2022 Backup and Disaster Recovery Award from Cloud Computing Magazine
January 25, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}