Articles

CYBERSECURITY AND COMPLIANCE

Why Xantrion Uses Microsoft

When you hire Xantrion as your managed security service provider (MSSP), you’re trusting our ability to protect your business-critical infrastructure and data – and the technology partners we choose to help us do that.   Microsoft is one of our most trusted partners. In fact, we have so much confidence in their approach to zero trust security that we’ve made…

Top 10 Ways to Manage the Cost of Cyber Liability Insurance

Why is the average cost of cyber liability insurance starting to double from one year to the next, and what can you do about it?  In the past, getting a high-quality, affordable policy was as simple as providing your revenue and some basic information about your cyber security controls. Today, you must fill out a detailed annual questionnaire about your…

3 Reasons to Make Data Privacy your New Year’s Resolution

By Jodi Daniels, Founder & CEO of Red Clover Advisors Our favorite time of the year is finally here—and yes, we know the winter holidays have already come and gone. But as much we may love warming up with a cup of hot cocoa (topped off with unreasonable amounts of marshmallows, please!), there’s one day that holds a special place…

Getting to Zero: What You Need to Know About Zero-Trust Architecture

It may seem strange to talk about cybersecurity in terms of “zero trust.” After all, if you can’t trust your systems and applications, why are you using them? But the term actually refers to a cybersecurity best practice that applies the basic concept “Never trust, always verify.”  Under the zero-trust security model, no user is trusted with full access to the network just because…

2021 Cybersecurity and Threat Preparedness Annual Study

Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.

Identity and Access Management Best Practices: The Key to Cloud and Mobile Security

When we talk about data security, we’re basically talking about two things: making sure information and applications are available to people who are authorized to use them, and keeping everyone else away. Identity management, also known as identity and access management, is key to our ability to do that. Identity management is the process of defining who you are and what you’re…

Let’s work together to achieve state-of-the-art ransomware protection

Recent headlines have been dominated by stories about the Colonial Pipeline and JBS ransomware attacks. With multi-million-dollar ransoms, operations shut down for days, and the costs associated with investigating and recovering from the attacks, these incidents are stark reminders that businesses need to remain vigilant in their efforts to protect themselves from ransomware.   Our state-of-the-art security programs have proven…

Three Basic Security Blunders That Many SMBs Are Still Making

In the past decade, the number of known malware programs has risen from 65 million to 1.1 billion. The ways in which cybercriminals deploy the malware have also increased in number and sophistication.  While advanced security technologies are available to defend against these cyberthreats, many can be thwarted with basic security practices. However, research is showing that many small and mid-sized…

Beware This New Phishing Line: The Fake LinkedIn Profile

Just when you think you and your employees have learned how to recognize and avoid a social engineering attack, the criminals have come up with another way to trick you out of your cash and your sensitive data: the fake LinkedIn profile. 

2020 Cybersecurity and Threat Preparedness Annual Study

Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.

Watch Out for This Direct Deposit Scam

Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have their paychecks deposited directly into their personal bank accounts. This practice is providing many opportunities for cybercriminals to perpetuate their latest scam — trying to get businesses to deposit employee paychecks into their accounts. Variations of the Direct Deposit…

Protect Company Data on Personal Devices

BYOD (bring your own device) refers to the practice of employees using their personal devices—such as smartphones, laptops, PCs, tablets, and other gear—on the job for the sake of convenience and comfort.

The 4 Riskiest Airports for WiFi

Using free WiFi at airports is convenient but potentially dangerous. According to a Coronet study, these four airports are the riskiest: 1. San Diego International Airport in California. There is a 30 percent chance of connecting to a medium-risk network and a 11 percent chance of connecting to high-risk hotspot at this airport. The researchers even found an “evil twin”…

Top 10 Tips for Securing your Work at Home

Even though you are no longer working within the protection of your office, you still need to safeguard the privacy of employee, client and business partner information.  Follow our ten tips so you don’t let security slip now that you are working at home.

Watch Out for These Common COVID-19 Scams

One of the less deadly effects of COVID- 19 is the explosion of online scams. COVID-related email phishing attacks have spiked 667 percent since March 1, according to Barracuda. Read this article to learn more about some of the most common scams exploiting coronavirus fears, and some measures you can take to avoid falling for them.

Mac Threats Are on the Rise

In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.

5 Things to Know About Phishing Attacks

Only 66% of working adults correctly answered the question “What is phishing” in 2019 Proofpoint survey. This means one-third of adults do not know that phishing is a form of fraud in which cybercriminals try to scam people into providing sensitive information (e.g., login credentials, account information) or performing an action (e.g., clicking a link, opening an email attachment) in…

Using Strong Passwords Is Not Always Enough to Stay Secure

Cybercriminals commonly use compromised passwords in cyberattacks. For example, in ransomware attacks, compromised passwords have now surpassed phishing scams as the No. 1 way to gain access to the systems in which the ransomware is planted, according to F-Secure’s “Attack Landscape H1 2019” report. And compromised passwords is No. 2 on hackers’ list of tools to use to gain access…

Mitigating the Risk of a Ransomware Attack

Xantrion’s cybersecurity program takes a risk based approach to preventing, detecting and recovering from a potential ransomware attack. We provide multilayered protections which consider the various methods criminals might use to penetrate a client’s network and protect against each of these attack vectors.  We monitor client systems so that, should compromise occur, it can be quickly detected and shut down. Even…

Articles

CYBERSECURITY AND COMPLIANCE

Why Xantrion Uses Microsoft

When you hire Xantrion as your managed security service provider (MSSP), you’re trusting our ability to protect your business-critical infrastructure and data – and the technology partners we choose to help us do that.   Microsoft is one of our most trusted partners. In fact, we have so much confidence in their approach to zero trust security that we’ve made…

Top 10 Ways to Manage the Cost of Cyber Liability Insurance

Why is the average cost of cyber liability insurance starting to double from one year to the next, and what can you do about it?  In the past, getting a high-quality, affordable policy was as simple as providing your revenue and some basic information about your cyber security controls. Today, you must fill out a detailed annual questionnaire about your…

3 Reasons to Make Data Privacy your New Year’s Resolution

By Jodi Daniels, Founder & CEO of Red Clover Advisors Our favorite time of the year is finally here—and yes, we know the winter holidays have already come and gone. But as much we may love warming up with a cup of hot cocoa (topped off with unreasonable amounts of marshmallows, please!), there’s one day that holds a special place…

Getting to Zero: What You Need to Know About Zero-Trust Architecture

It may seem strange to talk about cybersecurity in terms of “zero trust.” After all, if you can’t trust your systems and applications, why are you using them? But the term actually refers to a cybersecurity best practice that applies the basic concept “Never trust, always verify.”  Under the zero-trust security model, no user is trusted with full access to the network just because…

Strategic, Reliable, and Secure. Learn more about our services.

2021 Cybersecurity and Threat Preparedness Annual Study

Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.

Identity and Access Management Best Practices: The Key to Cloud and Mobile Security

When we talk about data security, we’re basically talking about two things: making sure information and applications are available to people who are authorized to use them, and keeping everyone else away. Identity management, also known as identity and access management, is key to our ability to do that. Identity management is the process of defining who you are and what you’re…

Let’s work together to achieve state-of-the-art ransomware protection

Recent headlines have been dominated by stories about the Colonial Pipeline and JBS ransomware attacks. With multi-million-dollar ransoms, operations shut down for days, and the costs associated with investigating and recovering from the attacks, these incidents are stark reminders that businesses need to remain vigilant in their efforts to protect themselves from ransomware.   Our state-of-the-art security programs have proven…

Three Basic Security Blunders That Many SMBs Are Still Making

In the past decade, the number of known malware programs has risen from 65 million to 1.1 billion. The ways in which cybercriminals deploy the malware have also increased in number and sophistication.  While advanced security technologies are available to defend against these cyberthreats, many can be thwarted with basic security practices. However, research is showing that many small and mid-sized…

Beware This New Phishing Line: The Fake LinkedIn Profile

Just when you think you and your employees have learned how to recognize and avoid a social engineering attack, the criminals have come up with another way to trick you out of your cash and your sensitive data: the fake LinkedIn profile. 

2020 Cybersecurity and Threat Preparedness Annual Study

Based on a survey conducted by ResearchCorp.org and sponsored by Xantrion, see how organizations responded when asked how confident they are about the effectiveness of their security measures and see how your company is doing in comparison to those surveyed.

Watch Out for This Direct Deposit Scam

Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have their paychecks deposited directly into their personal bank accounts. This practice is providing many opportunities for cybercriminals to perpetuate their latest scam — trying to get businesses to deposit employee paychecks into their accounts. Variations of the Direct Deposit…

Protect Company Data on Personal Devices

BYOD (bring your own device) refers to the practice of employees using their personal devices—such as smartphones, laptops, PCs, tablets, and other gear—on the job for the sake of convenience and comfort.

The 4 Riskiest Airports for WiFi

Using free WiFi at airports is convenient but potentially dangerous. According to a Coronet study, these four airports are the riskiest: 1. San Diego International Airport in California. There is a 30 percent chance of connecting to a medium-risk network and a 11 percent chance of connecting to high-risk hotspot at this airport. The researchers even found an “evil twin”…

Top 10 Tips for Securing your Work at Home

Even though you are no longer working within the protection of your office, you still need to safeguard the privacy of employee, client and business partner information.  Follow our ten tips so you don’t let security slip now that you are working at home.

Watch Out for These Common COVID-19 Scams

One of the less deadly effects of COVID- 19 is the explosion of online scams. COVID-related email phishing attacks have spiked 667 percent since March 1, according to Barracuda. Read this article to learn more about some of the most common scams exploiting coronavirus fears, and some measures you can take to avoid falling for them.

Mac Threats Are on the Rise

In the past, Mac devices have largely been out of cybercriminals’ crosshairs. While hackers occasionally launched malware attacks against Mac machines, they targeted Windows devices much more often. But this is no longer the case.

5 Things to Know About Phishing Attacks

Only 66% of working adults correctly answered the question “What is phishing” in 2019 Proofpoint survey. This means one-third of adults do not know that phishing is a form of fraud in which cybercriminals try to scam people into providing sensitive information (e.g., login credentials, account information) or performing an action (e.g., clicking a link, opening an email attachment) in…

Using Strong Passwords Is Not Always Enough to Stay Secure

Cybercriminals commonly use compromised passwords in cyberattacks. For example, in ransomware attacks, compromised passwords have now surpassed phishing scams as the No. 1 way to gain access to the systems in which the ransomware is planted, according to F-Secure’s “Attack Landscape H1 2019” report. And compromised passwords is No. 2 on hackers’ list of tools to use to gain access…

Mitigating the Risk of a Ransomware Attack

Xantrion’s cybersecurity program takes a risk based approach to preventing, detecting and recovering from a potential ransomware attack. We provide multilayered protections which consider the various methods criminals might use to penetrate a client’s network and protect against each of these attack vectors.  We monitor client systems so that, should compromise occur, it can be quickly detected and shut down. Even…
Menu