The Better Business Bureau of Western Michigan has posted an alert on new cyber threats that Michigan businesses should watch out for in 2013:
In effort to advance Michigan’s cybersecurity awareness among businesses, consumers and state government, the Michigan Cyber Range was launched recently to prepare professionals to detect and prevent cyber attacks. The range puts people in real-world settings to simulate an actual threat.
The range also showcases courses and events that allow professionals to become certified in the information security field, including titles such as Certified Information Systems Security Officer (CISSO), Certified Web Application Engineer (CSWAE), Certified Disaster Recovery Engineer (CDRE) and others. Find a full list of course descriptions on the Merit Michigan Cyber Range course offerings website.
To reduce risk of data loss and potential fraud or identity theft, Michigan businesses can turn to secure Michigan hosting providers for their data protection services, and to take advantage of the investments made in data center security and maintenance. When it comes to compliance needs for the retail or healthcare industries, Michigan businesses should seek PCI hosting and HIPAA hosting providers that can provide an audit report to verify that the design of their environmental, technical and administrative controls are operating at the highest level of security.
Michigan data centers are also an ideal location for data hosting due to the low risk of natural disaster, natural cooling, and cost-efficient services. Find out which audits and compliance reports to ask for when seeking a Michigan hosting provider in our Data Center Standards Cheat Sheet – From HIPAA to SOC 2.
About the Michigan Cyber Range
This course is presented through the facilities of the Michigan Cyber Range, and all exercises will be conducted within the Cyber Range infrastructure. Hosted by Merit Network, the Michigan Cyber Range enables individuals and organizations to develop detection and reaction skills through simulations and exercises. The program offers students and IT professionals a full curriculum of meetings and workshops as well as critical cybersecurity training and awareness tools. More information on the Michigan Cyber Range can be found at www.merit.edu/cyberrange.
Cyberthreats of 2013
Otava provides the secure, compliant hybrid cloud solutions demanded by service providers, channel partners and enterprise clients in compliance-sensitive industries. By actively aggregating best-of-breed cloud companies and investing in people, tools, and processes, Otava’s global footprint continues to expand. The company provides its customers in highly regulated disciplines with a clear path to transformation through its effective solutions and broad portfolio of hybrid cloud, data protection, disaster recovery, security and colocation services, all championed by an exceptional support team. Learn more at www.otava.com.