Articles

2020 Cybersecurity and Threat Preparedness Annual Study

Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed. DOWNLOAD FULL PDF » DOWNLOAD FULL PDF

Protect Company Data on Personal Devices

BYOD (bring your own device) refers to the practice of employees using their personal devices—such as smartphones, laptops, PCs, tablets, and other gear—on the job for the sake of convenience and comfort.

Update your Business Continuity Plan for an Extended Pandemic – Just in Case

As some workplaces reopen and others make plans to do so, we may start seeing business as usual. However, if the coronavirus re-emerges over the summer or fall due to a decrease in social distancing and other factors, organizations will need to be prepared for a return to remote work and other pandemic-induced workplace changes.

7 Best Practices for Supporting Employees During COVID-19

During the hardest times, this quote is especially true—people always remember how you make them feel. In 10 or even 30 years, people will remember the coronavirus pandemic and how their companies made them feel during this unprecedented time.

Make Virtual Meetings a Place Where You Shine

Although virtual meetings are the new norm, we’ve all attended ones that have gone awry. By taking them as seriously and thoughtfully as physical, in-person meetings, you can use them as a way to be known as someone who’s digitally-savvy and professional—qualities your clients and colleagues will value. 

Top 10 Tips for Securing your Work at Home

Even though you are no longer working within the protection of your office, you still need to safeguard the privacy of employee, client and business partner information.  Follow our ten tips so you don’t let security slip now that you are working at home.

Roles and Responsibilities of a Crisis Management Team

Companies facing a crisis — such as the current COVID-19 pandemic — must identify who will manage the company’s response. In many cases, this involves the creation of a crisis management team, which can help divvy up the many responsibilities. 

Microsoft Teams or Outlook?

Now that everyone is working from home, we can’t necessarily rely on communication methods we know and love. We need to branch out and start using new tools that can help us stay connected even though we are apart. One of those new tools is Microsoft Teams.

Handling Home Office Internet Issues

As we attempt to slow the spread of COVID-19 by working from home, it’s not surprising people are running into Internet  issues. We are relying on and stressing our connectivity like never before. If the result of your issues are poor online meeting and video conferencing quality, the following are some recommendations to improve your situation.

Watch Out for These Common COVID-19 Scams

One of the less deadly effects of COVID- 19 is the explosion of online scams. COVID-related email phishing attacks have spiked 667 percent since March 1, according to Barracuda. Read this article to learn more about some of the most common scams exploiting coronavirus fears, and some measures you can take to avoid falling for them.

An Employee’s Guide for Full Remote Working

While some of you are veteran remote workers, working from home, especially on a regular basis, might be new for others.  The following are some best practices to help guide you through it. 

A Manager’s Guide for Full Remote Working

While you might have managed a couple of team members remotely to date, managing a fully remote team, while balancing the challenges of being remote yourself, might be a new experience for you. The following are some best practices to help guide you through it.

Mac Threats Are on the Rise

In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.

5 Things to Know About Phishing Attacks

Only 66% of working adults correctly answered the question “What is phishing” in 2019 Proofpoint survey. This means one-third of adults do not know that phishing is a form of fraud in which cybercriminals try to scam people into providing sensitive information (e.g., login credentials, account information) or performing an action (e.g., clicking a link, opening an email attachment) in…

Business App Upgrades to Consider for your 2020 IT Budget

Microsoft will no longer support many business apps in 2020 because they are reaching the end of their lifecycles. Find out which popular programs are reaching this point so you can plan any needed upgrades and adjust your 2020 IT budget accordingly.

How to Manage Those Annoying Auto-Play Video Clips in Microsoft Edge

Microsoft Edge has several features to manage auto-play clips. For starters, Edge is designed to automatically silence these clips on background tabs — in other words, on web pages that are open but not currently being displayed. (Their tabs are greyed-out.) Edge also lets you mute auto-play clips on individual web pages as well as stop clips from running automatically…

Using Strong Passwords Is Not Always Enough to Stay Secure

Cybercriminals commonly use compromised passwords in cyberattacks. For example, in ransomware attacks, compromised passwords have now surpassed phishing scams as the No. 1 way to gain access to the systems in which the ransomware is planted, according to F-Secure’s “Attack Landscape H1 2019” report. And compromised passwords is No. 2 on hackers’ list of tools to use to gain access…

OneDrive versus SharePoint Online

I am so excited about OneDrive, my cloud-based file sharing and storage application. Accessing it is as easy as logging into Office.com on my home computer or opening the OneDrive app on my work computer or phone. And now that I’ve been using it a while, I can’t imagine using anything else – it makes my life easier and allows me…

Mitigating the Risk of a Ransomware Attack

Xantrion’s cybersecurity program takes a risk based approach to preventing, detecting and recovering from a potential ransomware attack. We provide multilayered protections which consider the various methods criminals might use to penetrate a client’s network and protect against each of these attack vectors.  We monitor client systems so that, should compromise occur, it can be quickly detected and shut down. Even…

3 Ways to Cultivate a Collaborative Workforce

In a study conducted by Microsoft and YouGov, more than 14,000 people in seven countries shared their views on collaboration and the tools they use to achieve it. The results reveal three insights that can help you cultivate a collaborative workforce: 1. Different Generations Prefer Different Collaboration Tools The Microsoft-YouGov study found that the collaboration tools people use most often…

Why Business Continuity Plans Should Attempt to Avoid Disasters as Well as Recover from Them

Fires, floods, ransomware attacks, or pandemics that prevent people from working in the office are all reasons your organization needs a disaster recovery plan. However, while thinking about how to recover from a disaster, don’t forget to include disaster avoidance (a.k.a. business continuity) as a cost-effective element of your overall plan. What is the difference between disaster avoidance and disaster…

15 Keyboard Shortcuts for Microsoft Excel and Word

Microsoft Word and Excel have been around for a long time, so they have many features, including more than 200 keyboard shortcuts. Using these shortcuts can save you time because you just need to press a combination of keys to perform an action. While trying to remember every single shortcut is impractical, it pays to learn the shortcuts for operations…

5 Ways to Ensure Your Data is Safe in the Cloud

While there are many services that fall under cloud computing, businesses often use the cloud to store data. Although security experts note that storing data in the cloud is a relatively safe practice, businesses should still take certain measures to protect their files. Here are five things you can do to help keep your business’s data safe in the cloud:…

Watch Out for This Direct Deposit Scam

Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have their paychecks deposited directly into their personal bank accounts. This practice is providing many opportunities for cybercriminals to perpetuate their latest scam — trying to get businesses to deposit employee paychecks into their accounts. Variations of the Direct Deposit…

Are your Employees Inadvertently Exposing Data?

The number is eye-opening: 83% of companies believe that employee errors have put sensitive business and customer data at risk of exposure, according to a study by Egress. More than 1,000 security professionals at US-based companies participated in this study. The study also identified the technologies that most often involved in this type of accidental data leak. Email services provided…

How to Choose Default Apps in Windows 10

It is common for people to have multiple apps that perform the same function on their Windows 10 computers. For instance, people might have several web browsers or email apps. Similarly, people often can open certain types of files with more than one program. For instance, they can open PDF files with a web browser such as Google Chrome or…
Menu