Articles

Should I Outsource IT Support?
Organizations are always looking for strategic ways to manage costs. One proven method is outsourcing IT support and other non-core functions, such as HR and accounting, to a specialist. Specialization allows outsourced organizations to achieve economies of scale, which lower costs while improving service.
 
Cybersecurity and Compliance Concerns? Microsoft Office 365 Has You Covered
Over the last year or so, we've been encouraging our clients who want to use a cloud-based office productivity suite to choose Microsoft Office 365. We've already talked about its rich functionality, ease of use, availability, and cost-effectiveness. Now we’d like to talk about its security and compliance features.
 
Supercharge Teamwork Securely
Microsoft has been around a long time. Some view them as past their prime and losing ground to Google. When I tell you the latest version of Microsoft Office is actually something to write home about, I don’t expect to get more than a, “I’ve heard that before?” Let’s see if I can change your mind.
 
Identity Management: The Key to Cloud and Mobile Security
When we talk about data security, we're basically talking about two things: making sure information and applications are available to people who are authorized to use them, and keeping everyone else away. Identity management is key to our ability to do that.
 
Why IT Best Practices are Imperative for Supporting a Mobile Work Force
As illustrated by our medical device company case study, gone are the days when employees only worked out of an office and wielded a simple set of tools to get work done. In today’s world of anytime, anywhere work, employees use whatever device is most convenient, whether it is a desktop at home, a laptop at work, a tablet in a client meeting, or a smartphone everywhere. To support this reality from an IT perspective, we recommend the following:
 
8 Ways to Save on IT Without Skimping
Looking for ways to save money on IT without sacrificing productivity or functionality? The following are 8 proven methods to help.
 
How to Avoid the Top 5 Pitfalls of Moving to Cloud Services
Shifting from on-premises applications to hosted cloud services is a great way to ease your company's IT burden, but it takes careful planning to avoid a stumble on the way to cloud services. Watch out for these common mistakes:
 
How to Protect your Employees from Phishing
Phishing is one of the biggest security threats to Xantrion's clients right now. Small and midsize businesses are low-hanging fruit for attackers because they have more worth stealing than an individual, but fewer security safeguards than a larger business. What's more, phishing attempts are becoming more frequent and more sophisticated. The harder they are to spot, the more likely one of your employees will get suckered into revealing sensitive information like a password or banking information.
 
Can Cloud Services Protect my Business from Disasters?
When it comes to IT, there are two kinds of risks. One involves system failures, whether they're caused by hardware, software, human error, or natural disaster. Minimizing these risks is called business continuity planning. The other involves the damage to your business caused by lost or corrupted data.
 
How the Latest, Greatest Smartphones Stack Up
If you're tempted by the newest high-end smartphones, here's what CRN's reviewer has to say about them:
 
10 Keyboard Shortcuts for Most Browsers
You can use many of the same keyboard shortcuts when working in Google Chrome, Microsoft Edge, and Mozilla Firefox web browsers. Here are 10 keyboard shortcuts that are handy as well as easy to remember.
 
15 Keyboard Shortcuts for Microsoft Excel and Word

 
3 Ways to Cultivate a Collaborative Workforce

 
3 Ways Your iPhone Can Keep you Organized
If your iPhone is running iOS 11 or later, you can use it for more than just staying in touch with the office. Here are 3 features you can use to help your business trip go more smoothly.
 
5 Ways to Ensure Your Data is Safe in the Cloud

 
5 Ways to Spend Less Time Dealing With Emails

 
6 Pitfalls to Avoid When Using Microsoft Teams

 
8 Great Things About Microsoft Teams
Microsoft Teams is a reasonably new chat-based collaboration tool that's meant to facilitate ongoing collaboration and communication that occurs within any team, project, organization, or group of people. It requires Office 365 to use.
 
A Holistic Approach to IT Compliance
Few issues in the last several years have been more bewildering and frustrating for organizations than government rules regarding the security and retention of electronic data.
 
Are your Employees Inadvertently Exposing Data?
The number is eye-opening: 83% of companies believe that employee errors have put sensitive business and customer data at risk of exposure, according to a study by Egress.
 
Building a Foundation for Cybersecurity Risk Management
Cybersecurity used to be primarily a concern for IT departments at large companies to tackle through technology — but that's no longer true. Today, even small and midsized companies need to worry about the ramifications and repercussions of cybercrime.
 
Cryptojacking: The new Ransomware and what to do About it?

 
Cybercons are Increasingly Clever: You Have to be Too
Determined criminals are constantly inventing new ways to access your company bank account. Sometimes they try to break in. Sometimes they try to steal your passwords and account information. But some of their techniques are designed to get you to simply hand over the money—and these cybercons are becoming even more common.
 
Data Backups vs. Replication: Which do you need?
Data backups and replication are not referring to the same thing. Discover how they differ so that you can determine whether your business needs only one solution or both of them.
 
Getting Extra Value from Microsoft Office 365: OneDrive and Mobile Apps
Recently, we started talking about getting more value out of Microsoft Office 365 in your business if you are already using it, by using Skype for Business. This month we want to talk about getting more value out of Microsoft Office 365 in your business if you are already using it, by using OneDrive for Business and Mobile Apps.
 
Getting Extra Value from Microsoft Office 365: Skype for Business
If you've already started using Microsoft Office 365 in your business, you've been enjoying all the familiar features of Microsoft Office, made better with the extra functionality, availability, and cybersecurity that the cloud services enables. That alone is worth the cost of the subscription.
 
Help Your Employees Protect Sensitive Data
Spending on cybersecurity hit an all-time high in 2017. Unfortunately, so did the frequency of cybercrime — proof that tools alone aren't enough to keep your sensitive information safe. In fact, employees who inadvertently give hackers access to the company computer network are one of the leading causes of data breaches.
 
How to Choose Default Apps in Windows 10
Having more than one web browser or email app on a computer is common nowadays. When more than one app can be used for a certain task, Windows decides which one to use.
 
How to Develop a Vendor Risk Management Program

 
How to Ensure your Data is Available When You Need It
The worst time to discover that your backup system isn’t working is when you’ve lost key information and need to recover it. Nowadays, there are as many ways to back up your data as there are ways to lose it. Products range from the venerable tape back up to hard drives to online back up services. No matter which product ends up being appropriate for you, the principals of sound data back up are the same.
 
How to Get the Most from your Cloud Services Investment

 
How to Stop Annoying Chrome Website Notifications

 
Installing Windows 10: Not For Amateurs
We recently surveyed Xantrion engineers to see whether the free upgrade to Windows 10 was something that people should undertake on their own. The answer is that, while Windows 10 is a fine operating system, most users won’t be able to complete the upgrade without some amount of professional troubleshooting.
 
iPads in the Office
Back in December, we blogged about Apple's growing popularity in the business world. Since then, we've received quite a few inquiries about iPads in the workplace.
Xantrion service manager has been handling these IT support calls. These are the three questions he gets most often — and the answers he's most likely to give:
 
Is it Time to Look into Cyber Liability Insurance?
With the increasing frequency, sophistication and consequences of cyber crime, Xantrion looked into cyber liability insurance coverage. Our investigation led us to believe it was worth strengthening our coverage to limit our risk exposure. As a result, we developed the following cyber liability insurance FAQ with the help of John Unick at Bolton & Company Insurance Brokers, one of the largest privately held insurance brokers in California:
 
Is the Desktop Computer Becoming Obsolete?
The fate of the desktop computer has been the topic of debate for several years. Knowing both sides of the argument can be beneficial when you need to purchase new computing devices for your business.
 
IT Policies and Procedures: The Missing Piece of the Cybersecurity Puzzle
New technologies have emerged that allow unprecedented efficiency, freedom and functionality e.g. cloud services, mobile computing, etc. However, they also introduce new risks that are harder to control and have higher impacts when something goes wrong.
 
Microsoft Office 2019 vs Office 365

 
Mitigating the Risk of a Ransomware Attack
Xantrion’s cybersecurity program takes a risk-based approach to preventing, detecting and recovering from a potential ransomware attack.
 
New Cybersecurity Measures Required to Protect Against Online Banking Attacks
We have observed that increasingly sophisticated cyberattacks are being directed at the on-line banking systems of our clients. In particular, targeted attack mechanisms which are either new or which have been modified way so they are not recognizable to antivirus software.
 
Nine Easy Steps to a Realistic IT Budget
If you struggle annually to develop an IT budget that allocates the right amount of money to the right things, following these nine steps will make sure you arrive at the right answers year after year.
 
OneDrive versus SharePoint Online
I am so excited to have cloud-based file sharing and storage. I use OneDrive for this functionality. I access OneDrive by logging into Office.com on my home computer or opening the OneDrive app on my work computer or phone. It makes my life easier and allows me to work more efficiently.
 
Online Backups: The Foundation for a Cost-Effective Disaster Recovery Plan
As we enter hurricane season, many organizations are thinking about disaster planning for their IT infrastructure. Last edition, I described how to create a comprehensive IT disaster recovery plan. For organizations with fewer resources, online backups are a cost-effective way to handle the basics of such a plan.
 
Protect Your Network: Give Employees Secure Online File Sharing
As the workforce becomes more mobile, your employees need to be able to do their jobs as easily on the go as they do at a desk. In fact, they expect nothing less. How do you make sure they're using workplace technology that improves their efficiency, productivity, and collaboration without sacrificing security?
 
Ransomware Infections Are Through The Roof: What Should you do?
The quick money to be made in ransomware scams appears to be driving furious innovation in the cybercrime world. A recent Trend Micro report stated that some scammers have begun using macros and scripts, professional-looking phishing pages, and a computer’s master boot record to get victims to activate the malware on their systems.
 
Select the Best Backup Solution for Your Business’s Laptops

 
Shadow IT: What You Don't See Can Hurt You
Shadow IT is any technology used by employees that your IT department doesn't know about. That would never happen to us, you may say — but you're probably wrong. According to Gartner, most companies hugely underestimate how much shadow IT their employees are using. And that's a big problem, because what you don't know about, you can't secure. Here's what you need to know to start shining some light into the dark corners of your infrastructure.
 
Technology Move Tips – Minimize the Business Interruption and Hassle
Ensure critical business operations are not severely interrupted during your next office move.
 
The 4 Riskiest Airports for WiFi
Using free Wi-Fi at airports is convenient but potentially dangerous. Find out which airports are the most risky and learn how to mitigate the risks.
 
The Five Most Important Files to Back Up
It’s critical to back up at least some files on a daily basis, even if you can’t do a full backup every night. These are the five files that absolutely must go in your nightly backup.
 
The Mac-Lover's Solution to Working in a Windows Environment
Macs won me over as soon as I used one for the first time at school. I wanted one at home, and eventually at work, too. Unfortunately, using my Mac at work hasn't been as easy as I'd have liked. Over the last few years, as I've tried to integrate it into the traditional Windows-based environment in which I work, I've run into all these challenges:
 
Things to Consider when Moving Documents to the Cloud

 
Watch Out for This Direct Deposit Scam
Cybercriminals are trying to scam businesses into depositing employee paychecks into their bank accounts. Learn about the variations of this scam and what you can do so that your business does not become the next victim.
 
What does Downtime Really Cost your Business?
When preparing your technology budget, it is useful to know the costs associated with downtime. This information can help you prioritize IT expenditures so that critical systems and operations receive the funding needed to keep them running efficiently. Knowing the downtime costs can also motivate you to create business continuity and disaster recovery plans if you have not created them yet.
 
What Is Digital Transformation and Why Are Companies Pursuing It?

 
What you Need to Know About Google Tracking Your Location
In August 2018, an investigation revealed that Google is tracking the whereabouts of billions of its customers, even when the customers tell the tech giant not to.
 
What You Need to Know About Microsoft Office 365
Q: My company wants to use a cloud-based office productivity suite. Why should we use Microsoft Office 365?

A: Simple: Microsoft Office 365 has evolved into a mature suite of productivity apps that are tightly integrated with the on premise version of Microsoft Office, allowing your employees to work and collaborate across the two without interruption or confusion.
 
Why Business Continuity Plans Should Attempt to Avoid Disasters as well as Recover from Them
Whether you're worried about fires and floods or a ransomware attack, you probably realize your organization needs a business continuity plan. However, while thinking about how to recover from a disaster, don't forget to include avoidance as a cost-effective element of your overall plan.
 
Why You Need a Business Continuity and Disaster Recovery Plan
Whether you're worried about fires and floods or a ransomware attack, you probably realize your organization needs a business continuity plan. However, while thinking about how to recover from a disaster, don't forget to include avoidance as a cost-effective element of your overall plan.
 
Should I Outsource IT Support?
Cybersecurity and Compliance Concerns? Microsoft Office 365 Has You Covered
Supercharge Teamwork Securely
Identity Management: The Key to Cloud and Mobile Security
Why IT Best Practices are Imperative for Supporting a Mobile Work Force
8 Ways to Save on IT Without Skimping
How to Avoid the Top 5 Pitfalls of Moving to Cloud Services
How to Protect your Employees from Phishing
Can Cloud Services Protect my Business from Disasters?
How the Latest, Greatest Smartphones Stack Up
10 Keyboard Shortcuts for Most Browsers
15 Keyboard Shortcuts for Microsoft Excel and Word
3 Ways to Cultivate a Collaborative Workforce
3 Ways Your iPhone Can Keep you Organized
5 Ways to Ensure Your Data is Safe in the Cloud
5 Ways to Spend Less Time Dealing With Emails
6 Pitfalls to Avoid When Using Microsoft Teams
8 Great Things About Microsoft Teams
A Holistic Approach to IT Compliance
Are your Employees Inadvertently Exposing Data?
Building a Foundation for Cybersecurity Risk Management
Cryptojacking: The new Ransomware and what to do About it?
Cybercons are Increasingly Clever: You Have to be Too
Data Backups vs. Replication: Which do you need?
Getting Extra Value from Microsoft Office 365: OneDrive and Mobile Apps
Getting Extra Value from Microsoft Office 365: Skype for Business
Help Your Employees Protect Sensitive Data
How to Choose Default Apps in Windows 10
How to Develop a Vendor Risk Management Program
How to Ensure your Data is Available When You Need It
How to Get the Most from your Cloud Services Investment
How to Stop Annoying Chrome Website Notifications
Installing Windows 10: Not For Amateurs
iPads in the Office
Is it Time to Look into Cyber Liability Insurance?
Is the Desktop Computer Becoming Obsolete?
IT Policies and Procedures: The Missing Piece of the Cybersecurity Puzzle
Microsoft Office 2019 vs Office 365
Mitigating the Risk of a Ransomware Attack
New Cybersecurity Measures Required to Protect Against Online Banking Attacks
Nine Easy Steps to a Realistic IT Budget
OneDrive versus SharePoint Online
Online Backups: The Foundation for a Cost-Effective Disaster Recovery Plan
Protect Your Network: Give Employees Secure Online File Sharing
Ransomware Infections Are Through The Roof: What Should you do?
Select the Best Backup Solution for Your Business’s Laptops
Shadow IT: What You Don't See Can Hurt You
Technology Move Tips – Minimize the Business Interruption and Hassle
The 4 Riskiest Airports for WiFi
The Five Most Important Files to Back Up
The Mac-Lover's Solution to Working in a Windows Environment
Things to Consider when Moving Documents to the Cloud
Watch Out for This Direct Deposit Scam
What does Downtime Really Cost your Business?
What Is Digital Transformation and Why Are Companies Pursuing It?
What you Need to Know About Google Tracking Your Location
What You Need to Know About Microsoft Office 365
Why Business Continuity Plans Should Attempt to Avoid Disasters as well as Recover from Them
Why You Need a Business Continuity and Disaster Recovery Plan