Articles

Why Endpoint Detection and Response (EDR) Instead of Anti-Virus Software?

Security remains one of the biggest concerns and most challenging responsibilities facing small and medium-sized businesses (SMBs) today. In 2021, there was a 300% increase in ransomware attacks with over 50% reaching small businesses. To address this challenge, Microsoft is investing in security solutions purposefully designed to help protect them.  Microsoft Defender for Business is a new endpoint security solution…

Ensure your Life Science Company Survives Investor Due Diligence

By Robert Thomas, Audit Senior Manager, WithumSmith+Brown, PC and Christian Kelly, IT Auditor, Xantrion Inc.  Congratulations! Your pharmaceutical, biologic, or medical device startup has developed a promising product, and you’re ready to raise a Series B round of funding. Read on to learn what experts Rob Thomas and Christian Kelly recommend to make it easier to pursue and obtain that…

The Do’s and Don’ts of Preventing MFA Spamming Attacks

Multi-factor authentication (MFA) is a great way to add an extra layer of security to network access. But it’s not foolproof – as Cisco, Microsoft, and Uber all learned recently when cybercriminals breached their network using a technique known as MFA spamming.  Also known as MFA bombing and MFA fatigue, this ploy is used by an attacker who has acquired…

Cybercriminals Like to go Phishing, Don’t Fall for the Bait

Phishing is when criminals use fake emails, social media posts or direct messages with the goal of luring you to click on a bad link or download a malicious attachment. If you click on a phishing link or file, you can hand over your personal information to the cybercriminals. A phishing scheme can also install malware onto your device. No need…

Ransomware Protection: Guaranteed

Last year’s headline-grabbing ransomware attacks on the Colonial Pipeline and meatpacking company JBS show how vital it is to remain vigilant in your efforts to protect yourself from ransomware. For several days, the attacks shut down one of the most vital oil pipelines in the US and disrupted the global meat supply chain. They also cost each company millions of…

Reduce Costs and Beat the IT Security Labor Shortage

To keep your your key systems functional, you need two centralized teams to oversee your entire network: a security operations center (SOC) and a network operations center (NOC).   Your SOC monitors, responds to, and remediates security threats to protect applications and data against cyberattacks. Your NOC keeps an eye on network status, applies updates and patches, and provides tech…

Is Penetration Testing Worth the Investment?

1. What is penetration testing and why is it important?  A penetration test identifies how a cybercriminal might successfully get into your network and systems in order to steal your data and compromise your operations. Many companies are required to provide the results of a penetration test to regulators or insurers every year, but even without an external requirement, a…

Take your Start Up to Grown Up in 3 Steps

By Karl Pontau, Owner, Squash & Stretch Productions, Dave Oates, Founder, PR Security Service, Anne Bisagno, President, Xantrion Inc. Perspectives from leaders in Managed Security, Crisis Management, and Story Coaching & Consulting Well done. You’ve cleared the hurdle of getting your startup funded and you’re now faced with the exciting, yet perhaps overwhelming next steps of scaling and growing your…

Why Xantrion Uses Microsoft

When you hire Xantrion as your managed security service provider (MSSP), you’re trusting our ability to protect your business-critical infrastructure and data – and the technology partners we choose to help us do that.   Microsoft is one of our most trusted partners. In fact, we have so much confidence in their approach to zero trust security that we’ve made…

Vulnerability Scanning: What It Is And What It Does

By Rapid Fire Tools Nearly every industry and government IT security standard around the world, including the NIST Cybersecurity Framework, the Center for Internet Security (CIS 20), Australia’s Essential 8, the Department of Defense’s CMMC and PCI requires vulnerability scanning. This almost universal requirement for network vulnerability scanning stems from its core function of identifying weaknesses in computers and networks…

My Cyber Liability Insurance Premium Just Doubled, Now What?

Why is the average cost of cyber liability insurance starting to double from one year to the next, and what can you do about it?  In the past, getting a high-quality, affordable policy was as simple as providing your revenue and some basic information about your cyber security controls. Today, you must fill out a detailed annual questionnaire about your…

QR Codes in the Time of Cybercrime

By Javvaad Malik, Co-founder, Security B-Sides London and security awareness advocate for KnowBe4 QR codes have been around for many years. While they were adopted for certain niche uses, they never did quite reach their full potential. They are a bit like Rick Astley in that regard, really popular for one song, but well after the boat had sailed. Do…

3 Reasons to Make Data Privacy your New Year’s Resolution

By Jodi Daniels, Founder & CEO of Red Clover Advisors Our favorite time of the year is finally here—and yes, we know the winter holidays have already come and gone. But as much we may love warming up with a cup of hot cocoa (topped off with unreasonable amounts of marshmallows, please!), there’s one day that holds a special place…

Getting to Zero: What You Need to Know About Zero-Trust Architecture

It may seem strange to talk about cybersecurity in terms of “zero trust.” After all, if you can’t trust your systems and applications, why are you using them? But the term actually refers to a cybersecurity best practice that applies the basic concept “Never trust, always verify.”  Under the zero-trust security model, no user is trusted with full access to the network just because…

2021 Cybersecurity and Threat Preparedness Annual Study

Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.

How to Compete for Talent in the New Era of Remote Work

A recent USA Today article explains why our current staffing crunch may take years to abate. Between pandemic-related changes to the workplace and early retirements, organizations are in a fierce competition for employees, including roles like IT that are increasingly important for supporting the primary business or mission.   Technology is playing a significant role in helping organizations meet the challenges…

Technology Helps California Life Sciences Companies Strategically Transition to the Remote / Hybrid Workplace

The 2021 California Life Sciences Workforce Trends Report, points to a nationwide staffing crunch in the life sciences industry. Between pandemic-related changes to the workplace and underdeveloped talent pipelines, the life sciences industry is in a fierce competition for skilled employees, both for STEM positions and for secondary roles like IT that are necessary to support scientists.

The Difference Between Business Continuity and Disaster Recovery

Fires, floods, ransomware attacks, or pandemics, such as COVID-19, that prevent people from working in the office are all reasons your organization needs a disaster recovery plan. However, while thinking about how to recover from a disaster, don’t forget to include business continuity (a.k.a) disaster avoidance as a cost-effective element of your overall disaster recovery plan. What is the difference between…

Identity and Access Management Best Practices: The Key to Cloud and Mobile Security

When we talk about data security, we’re basically talking about two things: making sure information and applications are available to people who are authorized to use them, and keeping everyone else away. Identity management, also known as identity and access management, is key to our ability to do that. Identity management is the process of defining who you are and what you’re…

Nine Reasons to Outsource IT to a Managed Service Provider

Organizations are always looking for ways to effectively manage costs, improve productivity, and scale efficiently. One method proven to help achieve these goals is to outsource IT support to a managed service provider (MSP). We’ve outlined nine key reasons businesses are outsourcing IT support to managed service providers. 1. Cost reduction due to economies of scale in design and operation  Problems can be solved once and solutions are shared across a larger scope. The…
IT support bay area

8 Ways to Save on IT Support Services Without Sacrificing Security

Looking for ways to save money on IT support services for your business without sacrificing productivity or functionality? Here are 8 proven ways to help:  1.  Standardize your systems Every piece of software and hardware you add to your computer network will have its own issues, both in terms of its own operation and in terms of interoperability with other systems. Say…

Three of the Most Common Employee Offboarding Mistakes

By Derik Belair, President and CEO, Augmentt There’s a famous phrase you’ve probably heard before: to err is human. Those words sum up why your security posture needs to focus on human actions–or the absence of them. When seen from this lens, cybersecurity becomes about much more than cleaning up after mistakes. It’s about proactively putting into place measures to…

Three Basic Security Blunders That Many SMBs Are Still Making

In the past decade, the number of known malware programs has risen from 65 million to 1.1 billion. The ways in which cybercriminals deploy the malware have also increased in number and sophistication.  While advanced security technologies are available to defend against these cyberthreats, many can be thwarted with basic security practices. However, research is showing that many small and mid-sized…

Our Top PC Picks for Work From Home Needs

Whether you’re counting the days until you can return to the office or your hoping you can work from home forever, you’ve spent more than enough time working on your home computer by now to know whether it’s up to the task. If you’re starting to realize that it’s not, let us recommend some alternatives from Dell, HP and Lenovo…

Beware This New Phishing Line: The Fake LinkedIn Profile

Just when you think you and your employees have learned how to recognize and avoid a social engineering attack, the criminals have come up with another way to trick you out of your cash and your sensitive data: the fake LinkedIn profile. 

What Headset Should I Use with My PC?

In the work-from-home era, a good headset can make all the difference between being able to focus on your work and, well, sharing distracting or embarrassing background noise with everyone on an important call. But what makes a good headset?

2020 Cybersecurity and Threat Preparedness Annual Study

Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.

Watch Out for This Direct Deposit Scam

Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have their paychecks deposited directly into their personal bank accounts. This practice is providing many opportunities for cybercriminals to perpetuate their latest scam — trying to get businesses to deposit employee paychecks into their accounts. Variations of the Direct Deposit…

Protect Company Data on Personal Devices

BYOD (bring your own device) refers to the practice of employees using their personal devices—such as smartphones, laptops, PCs, tablets, and other gear—on the job for the sake of convenience and comfort.

Update your Business Continuity Plan for an Extended Pandemic – Just in Case

As some workplaces reopen and others make plans to do so, we may start seeing business as usual. However, if the coronavirus re-emerges over the summer or fall due to a decrease in social distancing and other factors, organizations will need to be prepared for a return to remote work and other pandemic-induced workplace changes.
Menu