September Cloud Forecast

Written by Eric Sanders

September 15, 2021

September roars ahead as it leaves a wake of security breaches from August in the past. 


If there was a levy it would have broken from the force of the cyber attack deluges on the market. 

It has been another month of comparatively few reported cyber-attacks and data breaches, with our August list containing 84 incidents accounting for 60,865,828 breached records.

And it would have been even fewer if not for the attack on T-Mobile. The mobile network disclosed a hack earlier this month, which it originally said affected 7.8 million customers and 40 million records. However, a week later it bumped up that figure to 53 million.

For the complete list for cyber-attacks check the article from Luke Irwin from IT Governance.



Phishing remains an effective cyberattack technique primarily because it continues to evolve. To keep up, your customers’ phishing defenses need to evolve too.

Social engineering is the most common attack technique used for password phishing. It involves luring unsuspecting users into clicking links in emails that bring them to a landing page with the look and feel of a legitimate page with which they may be familiar. Even though cybersecurity technology has become increasingly sophisticated, what stands out is the consistency of the nature of the attacks over the years. For example, phishing remains the number one method of spreading malware and stealing credentials. Despite spending $100 billion or more in cybersecurity, companies are no safer than they were 10 years ago.

This highlights the need for a new approach to cybersecurity, one that is based on improved security
operations around detection and response, and not prevention. The approach also must protect against
multiple attack vectors and be adaptive to defend against new variants or changes in attackers’ strategy. Large
companies achieve this with a 24×7 security operations center (SOC), but every company needs to create a
cybersecurity strategy that includes the security operations capabilities delivered by a world-class SOC.

Reduce your attack service now!

Cisco Taps Into Equinix for SD-WAN On Demand

The offering allows customers to automatically deploy and manage Cisco’s SD-WAN gateways on Equinix’s global network from a single unified management console in a matter of minutes.

Traditionally, SD-WAN overlays have been used over broadband or MPLS circuits managed by a telecom or managed service provider. The partnership with Equinix provides customers an alternative to MPLS circuits, which can be slow to deploy and expensive to maintain, while retaining many of the performance and stability advantages over broadband.

The move underscores a trend in the SD-WAN space around middle-mile connectivity. To date, Cisco has announced numerous integrations with large cloud and colocation providers, including Megaport, Amazon Web Services (AWS), and Google Cloud (GCP).

“If I can extend SD-WAN to the cloud for the workload, can I use the cloud as my transit network,” Raj Gulani, senior director of product management for enterprise cloud and SD-WAN at Cisco, explained in an earlier interview with SDxCentral. “We are able to offer the most comprehensive SD-WAN platform, which can offer on-demand networking because we have automated our partnerships with [software-defined cloud interconnect] vendors, like Megaport, like Equinix, [and] opened up the GCP backbone.”

Sources: SDX Central


Are you stuck in a one-sided hostile relationship with your service provider?
Is your business suffering and wanting to move on but experiencing a lack of co-operation from your unsupportive service provider? Cloud lock-in is one of the most frustrating places to be, but it doesn’t have to be that way.

It’s time to experience a better cloud. We can help you move on from your provider quickly and efficiently without detection.

Get out of Cloud Lock-In


The country stood still on September 11, 2001.None of us will ever forget the tragedy that ensued in our country. We reflect upon the heroes and the loved ones lost from this event. The images of the scene in NY is burned into the memories of everyone around the world.

eCloud dramatically simplifies backup and recovery by consolidating multiple point products on a single software-defined platform that spans from on-premises, enterprise edge, and to the public cloud. Architected on web-scale principles, eCloud can natively run in the public cloud and offers comprehensive protection against ransomware.  We future proof our backup and recovery strategy whether you’re on premise, hybrid, or fully in the public cloud.

Typically, eCloud helps customers reduce their TCO by 50 to 70% with our proven solutions.

Get Started
Speak with a cloud consultant today.

Author: Eric Sanders, Managing Partner


You May Also Like…