New data from IBM and Verizon shed light on the true costs of ransomware and data breaches. Do you understand the risks of leaving your business unprotected?
It might happen on a Friday afternoon, or maybe on the day before holiday. Many employees have clocked out early, so an intrusion goes unnoticed…until it’s too late. Suddenly the whole system begins shutting down. Your next step? Panic. A data breach or other cybersecurity incident can be a traumatic, shocking experience, even for a seasoned executive. To avoid freezing…
You have probably heard of some high-profile network breaches in the news in recent months. Threat actors targeting organizations both large and small and have found success breaching secure environments using a technique called MFA spamming. This is a highly effective tactic because it targets the person, not the technology, to work around an organization’s MFA protections. Companies as large…
When discussing the importance of adopting a strong cybersecurity strategy, too often the focus is on technology solutions designed to prevent and mitigate cyber-attacks. Certainly, the adoption of tools and solutions is integral to a strong security posture. Yet, as noted in Verizon’s 2022 Data Breach Investigations Report, a staggering 82 percent of data breaches involve some sort of human…
In recent years, cybersecurity has been a considerable concern for middle market companies. Threats are far more frequent, diverse, and severe than anyone could have anticipated. It’s crucial that all organizations implement cyber defense measures that better safeguard company and customer information to mitigate financial losses and brand damage. From lingering threats related to the COVID-19 pandemic, to geopolitical conflicts…
A good password is a critical part of protecting your data. So, when LastPass, a popular password manager solution, announced that its third-party cloud-based storage service had been breached, allowing an unknown attacker to gain access to backups containing customer data including password vaults, a lot of people got nervous. The bad news is that those customer password vaults are in…
Security remains one of the biggest concerns and most challenging responsibilities facing small and medium-sized businesses (SMBs) today. In 2021, there was a 300% increase in ransomware attacks with over 50% reaching small businesses. To address this challenge, Microsoft is investing in security solutions purposefully designed to help protect them. Microsoft Defender for Business is a new endpoint security solution…
By Robert Thomas, Audit Senior Manager, WithumSmith+Brown, PC and Christian Kelly, IT Auditor, Xantrion Inc. Congratulations! Your pharmaceutical, biologic, or medical device startup has developed a promising product, and you’re ready to raise a Series B round of funding. Read on to learn what experts Rob Thomas and Christian Kelly recommend to make it easier to pursue and obtain that…
Multi-factor authentication (MFA) is a great way to add an extra layer of security to network access. But it’s not foolproof – as Cisco, Microsoft, and Uber all learned recently when cybercriminals breached their network using a technique known as MFA spamming. Also known as MFA bombing and MFA fatigue, this ploy is used by an attacker who has acquired…
Phishing is when criminals use fake emails, social media posts or direct messages with the goal of luring you to click on a bad link or download a malicious attachment. If you click on a phishing link or file, you can hand over your personal information to the cybercriminals. A phishing scheme can also install malware onto your device. No need…
Last year’s headline-grabbing ransomware attacks on the Colonial Pipeline and meatpacking company JBS show how vital it is to remain vigilant in your efforts to protect yourself from ransomware. For several days, the attacks shut down one of the most vital oil pipelines in the US and disrupted the global meat supply chain. They also cost each company millions of…
1. What is penetration testing and why is it important? A penetration test identifies how a cybercriminal might successfully get into your network and systems in order to steal your data and compromise your operations. Many companies are required to provide the results of a penetration test to regulators or insurers every year, but even without an external requirement, a…
When you hire Xantrion as your managed security service provider (MSSP), you’re trusting our ability to protect your business-critical infrastructure and data – and the technology partners we choose to help us do that. Microsoft is one of our most trusted partners. In fact, we have so much confidence in their approach to zero trust security that we’ve made…
By Rapid Fire Tools Nearly every industry and government IT security standard around the world, including the NIST Cybersecurity Framework, the Center for Internet Security (CIS 20), Australia’s Essential 8, the Department of Defense’s CMMC and PCI requires vulnerability scanning. This almost universal requirement for network vulnerability scanning stems from its core function of identifying weaknesses in computers and networks…
Growing concerns about employee experiences—including securing mobile devices and working with flexibility—call for endpoint modernization. The value in Microsoft 365 is its innovation in secure, cloud-connected management as well as its awareness of employee satisfaction (including the acceleration of onboarding of all workers). Take stock in your endpoint estate and start using modern products like Cloud Configuration and Endpoint Manager…
Why is the average cost of cyber liability insurance starting to double from one year to the next, and what can you do about it? In the past, getting a high-quality, affordable policy was as simple as providing your revenue and some basic information about your cyber security controls. Today, you must fill out a detailed annual questionnaire about your…
By Jodi Daniels, Founder & CEO of Red Clover Advisors Our favorite time of the year is finally here—and yes, we know the winter holidays have already come and gone. But as much we may love warming up with a cup of hot cocoa (topped off with unreasonable amounts of marshmallows, please!), there’s one day that holds a special place…
It may seem strange to talk about cybersecurity in terms of “zero trust.” After all, if you can’t trust your systems and applications, why are you using them? But the term actually refers to a cybersecurity best practice that applies the basic concept “Never trust, always verify.” Under the zero-trust security model, no user is trusted with full access to…
It’s no longer enough to just install a firewall and antivirus software and think you have robust cybersecurity protections. Today, you need a cybersecurity strategy that stands toe-to-toe with the bad guys’ methods, frequency, and vectors of attack. And rather than starting with solutions and working backwards, we recommend using a layered approach like the one below. For many small…
Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.
When we talk about data security, we’re basically talking about two things: making sure information and applications are available to people who are authorized to use them, and keeping everyone else away. Identity management, also known as identity and access management, is key to our ability to do that. Identity management is the process of defining who you are and what you’re…
Software is an important tool that most businesses use in their day-to-day operations. However, apps can be detrimental to organizations’ operations if they contain vulnerabilities — that is, flaws or weaknesses that can be exploited by an attacker for malicious purposes. In 2019 alone, there were 22,316 new software vulnerabilities reported. A similar total is expected for 2020, as the mid-year count…
In the past decade, the number of known malware programs has risen from 65 million to 1.1 billion. The ways in which cybercriminals deploy the malware have also increased in number and sophistication. While advanced security technologies are available to defend against these cyberthreats, many can be thwarted with basic security practices. However, research is showing that many small and mid-sized…
The US Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) are warning businesses about a voice phishing (vishing) scam that targets employees working from home. Cybercriminals are using this scam to steal virtual private network (VPN) login credentials, which they use to access company networks and steal data or money. By understanding how this VPN vishing scam works,…
In the era of cloud-first and mobile-first technology, productivity and security go hand in hand. This means that when utilizing digital tools, the fact that your data remains secure, encrypted, and in the right hands is just as important—if not more so—than the increase in productivity obtained by using them. Therefore, choosing the correct applications involves a careful understanding of…
Just when you think you and your employees have learned how to recognize and avoid a social engineering attack, the criminals have come up with another way to trick you out of your cash and your sensitive data: the fake LinkedIn profile.
Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.
Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have their paychecks deposited directly into their personal bank accounts. This practice is providing many opportunities for cybercriminals to perpetuate their latest scam — trying to get businesses to deposit employee paychecks into their accounts. Variations of the Direct Deposit…
The global average cost of a data breach is $3.6 million. Is your company prepared to deal with the fallout from a cyberattack? With our security solutions from Microsoft 365 Business, you can take advantage of the latest data-loss protection policies to ensure that your sensitive data is always protected. With a simple, cost-effective security solution that’s easy to use,…
62 percent of small and medium-sized businesses (SMBs) don’t have an active or up-to-date cybersecurity strategy in place. Want to make sure that your data is protected, no matter what apps or devices you and your employees are using? Now, you can take advantage of our data protection solutions featuring Microsoft 365 Business. Check out the below infographic—which shows industry trends,…
Subscribe to our newsletter and get the latest IT tips.