Blog

CYBERSECURITY AND COMPLIANCE

Security Beyond Microsoft Products

With Microsoft, security can be simple once again. Microsoft 365 provides an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch the video to learn more and contact Xantrion with any questions.

Why Invest in Integrated Threat Protection?

With data growing increasingly more valuable and harder to protect, digital security has become infinitely complex. Check out our infographic below to learn why an investment in Microsoft Threat Protection provides the built-in intelligence, automation, and integration to coordinate protection, detection, response, and prevention that organizations need to stay secure. Contact us to learn how Xantrion’s managed service offerings can…

Microsoft Threat Protection is a Best-In-Class, Intelligent Security Solution

Cyber-attackers will cross multiple domains like email, identity, endpoints, and applications to find the point of least resistance. Today’s defense solutions have been designed to protect, detect, and block threats for each domain separately, allowing attackers to exploit the seams and threshold differences between solutions—leaving the business vulnerable to attack. Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with…

New Bills on Capitol Hill After the Colonial Pipeline Attack

The recent ransomware attack against the Colonial Pipeline illustrates the need for a plan to protect the economy in the event of a major cyber-attack, according to members of the House’s Homeland Security Committee (HSC). The Colonial Pipeline shut down operations last week as a result of the attack, leaving 45 percent of the U.S. East Coast without its normal fuel supply.…

5 Lies Cybercriminals Tell to Get You to Click Malicious Links

Read time: 60 seconds
The numbers are staggering. Each day, 156 million phishing emails are sent. Spam filters catch about 90% of them, but that still means 16 million phishing emails make it through to recipients’ inboxes, where half are opened. Out of the 8 million emails opened, 800,000 of them lure recipients into clicking a link. That simple act can lead to malware being installed,…

Business Email Scams in the Year of the Pandemic

Read time: 60 seconds
In BEC attacks, cybercriminals pose as company executives, supplier reps, lawyers, and other business professionals to con organizations into sending them wire transfers and sensitive data (e.g., bank account numbers, gift card numbers). Despite the pandemonium from the coronavirus pandemic, BEC scammers stole an unprecedented $1.9 billion from their victims, according to IC3’s “2020 Internet Crime Report“.  This all-time high is continuing to…

April 13 is Identity Management Day

Read time: 45 seconds
In a world defined by our use of technology, how we are identified digitally is important. Our digital identities and the credentials that protect them define how we work, interact with each other, access technology, execute transactions, and so much more.  For organizations, Identity and Access Management (IAM) “is the discipline that enables the right individuals to access the right…

Seven Steps to Building a Strong Cybersecurity Strategy

If it seems like we’re spending a lot of time talking about cybersecurity lately, you’re not imagining things. Between the need to secure systems so employees can work effectively from home and a massive uptick in cyberattacks, security is at the top of everyone’s agenda, including our own. This step-by-step checklist for building an effective cybersecurity strategy is written for CIOs, but we think it’s useful…

Today is Data Privacy Day

Read time: 20 seconds
Data Privacy Day is Jan. 28, just like it is every year. But as with everything else, COVID-19 has forced us to reconsider a new normal for enforcing data privacy in the work-from-home (WFH) environment. Sponsored by the National Cyber Security Alliance (NCSA), Data Privacy Day is designed to “inspire dialogue and empower individuals and companies to take action” on…

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Gain a Competitive Edge with Advanced Security Solutions from Microsoft

Read time: 45 seconds
When The Walsh Group—a construction contractor—moved to the cloud, it realized it needed better ways to manage who accesses its systems. The company set up identity as the control plane—with Microsoft Azure Active Directory at the center and a zero-trust security stance to better protect access to all its resources. Now, The Walsh Group CIO says the company leads the industry…

Four Key Areas of Intelligent Security with Microsoft

Read time: 30 seconds
Need intelligent security solutions to protect your entire company? Look no further than Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel. To learn more about Microsoft’s four key areas of intelligent security, click here to check out our infographic and contact us with any questions.   

Protect Against Cyberthreats with Microsoft 365

Read time: 30 seconds
If you work at a small or medium-sized business (SMB), you probably juggle multiple roles every day. Lighten your load with Microsoft 365 and cross off “become a cybersecurity expert” from your to-do list. Gone are the days when cybercrime was exclusively a big business problem. As more SMBs are targeted by hackers, take advantage of advanced security to defend…

Lock Down your Login

Read time: 30 seconds
We no longer recommend passwords to protect account logins.  We recommend passphrases instead, because they are more effective.    So, what is a passphrase?  Passphrases are just words strung together in a sentence that increase the phrases’ complexity and length. When it comes to passphrases, it’s best to mix it up! Keep them long, easy-to-remember, and unique for each account. Click here to learn more about using passphrases to keep your sensitive information safe.…

Think Before you Click

Read time: 45 seconds
Cybercriminals use email, text messages and voicemails to trick you into giving them your personal information. They often try to steal passwords, account numbers, or Social Security numbers. Personal information is so lucrative for criminals, they launch thousands of campaigns, called phishing attacks, every day!  Click here to learn how to avoid the latest vishing attack that targets telecommuters. 

Beware of Public WiFi

Read time: 30 seconds
Using public WiFi is convenient, since it is available almost everywhere, we go. Most people have used it, whether it is from an airport, coffee shop, library, park or hotel.  However, many might not be aware that using public WiFi comes with significant risks. Public WiFi networks are mostly unencrypted, which means that cybercriminals can hack into these networks and steal your sensitive information.  If you must use public WiFi, limit what you do while using it and avoid logging in to key accounts like email and financial services.   Read this…

62 Percent of Organizations Sacrifice Mobile Security for Speed

Read time: 45 seconds
According to Verizon’s Mobile Security Index (MSI) 2020, 39 percent of organizations admitted that they’ve experienced a security compromise involving a mobile device. This becomes much more concerning when you consider that the average loss from a successful business-email compromise attack is nearly $130,000. Click here to learn how your business can avoid and counter these threats. No matter where you are on…

The Four Pillars of Microsoft 365 Enterprise-Grade Security

In the era of cloud-first and mobile-first technology, productivity and security go hand in hand. This means that when utilizing digital tools, the fact that your data remains secure, encrypted, and in the right hands is just as important—if not more so—than the increase in productivity obtained by using them. Therefore, choosing the correct applications involves a careful understanding of…

Prevent Data Leaks with Proven Security Solutions

Read time: 60 seconds
The global average cost of a data breach is $3.6 million. Is your company prepared to deal with the fallout from a cyberattack?  With our security solutions from Microsoft 365 Business, you can take advantage of the latest data-loss protection policies to ensure that your sensitive data is always protected. With a simple, cost-effective security solution that’s easy to use,…

Blog

CYBERSECURITY AND COMPLIANCE

Security Beyond Microsoft Products

With Microsoft, security can be simple once again. Microsoft 365 provides an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch the video to learn more and contact Xantrion with any questions.

Why Invest in Integrated Threat Protection?

With data growing increasingly more valuable and harder to protect, digital security has become infinitely complex. Check out our infographic below to learn why an investment in Microsoft Threat Protection provides the built-in intelligence, automation, and integration to coordinate protection, detection, response, and prevention that organizations need to stay secure. Contact us to learn how Xantrion’s managed service offerings can…

Microsoft Threat Protection is a Best-In-Class, Intelligent Security Solution

Cyber-attackers will cross multiple domains like email, identity, endpoints, and applications to find the point of least resistance. Today’s defense solutions have been designed to protect, detect, and block threats for each domain separately, allowing attackers to exploit the seams and threshold differences between solutions—leaving the business vulnerable to attack. Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with…

New Bills on Capitol Hill After the Colonial Pipeline Attack

The recent ransomware attack against the Colonial Pipeline illustrates the need for a plan to protect the economy in the event of a major cyber-attack, according to members of the House’s Homeland Security Committee (HSC). The Colonial Pipeline shut down operations last week as a result of the attack, leaving 45 percent of the U.S. East Coast without its normal fuel supply.…

Strategic, Reliable, and Secure. Learn more about our services.

5 Lies Cybercriminals Tell to Get You to Click Malicious Links

Read time: 60 seconds
The numbers are staggering. Each day, 156 million phishing emails are sent. Spam filters catch about 90% of them, but that still means 16 million phishing emails make it through to recipients’ inboxes, where half are opened. Out of the 8 million emails opened, 800,000 of them lure recipients into clicking a link. That simple act can lead to malware being installed,…

Business Email Scams in the Year of the Pandemic

Read time: 60 seconds
In BEC attacks, cybercriminals pose as company executives, supplier reps, lawyers, and other business professionals to con organizations into sending them wire transfers and sensitive data (e.g., bank account numbers, gift card numbers). Despite the pandemonium from the coronavirus pandemic, BEC scammers stole an unprecedented $1.9 billion from their victims, according to IC3’s “2020 Internet Crime Report“.  This all-time high is continuing to…

April 13 is Identity Management Day

Read time: 45 seconds
In a world defined by our use of technology, how we are identified digitally is important. Our digital identities and the credentials that protect them define how we work, interact with each other, access technology, execute transactions, and so much more.  For organizations, Identity and Access Management (IAM) “is the discipline that enables the right individuals to access the right…

Seven Steps to Building a Strong Cybersecurity Strategy

If it seems like we’re spending a lot of time talking about cybersecurity lately, you’re not imagining things. Between the need to secure systems so employees can work effectively from home and a massive uptick in cyberattacks, security is at the top of everyone’s agenda, including our own. This step-by-step checklist for building an effective cybersecurity strategy is written for CIOs, but we think it’s useful…

Today is Data Privacy Day

Read time: 20 seconds
Data Privacy Day is Jan. 28, just like it is every year. But as with everything else, COVID-19 has forced us to reconsider a new normal for enforcing data privacy in the work-from-home (WFH) environment. Sponsored by the National Cyber Security Alliance (NCSA), Data Privacy Day is designed to “inspire dialogue and empower individuals and companies to take action” on…

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Gain a Competitive Edge with Advanced Security Solutions from Microsoft

Read time: 45 seconds
When The Walsh Group—a construction contractor—moved to the cloud, it realized it needed better ways to manage who accesses its systems. The company set up identity as the control plane—with Microsoft Azure Active Directory at the center and a zero-trust security stance to better protect access to all its resources. Now, The Walsh Group CIO says the company leads the industry…

Four Key Areas of Intelligent Security with Microsoft

Read time: 30 seconds
Need intelligent security solutions to protect your entire company? Look no further than Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel. To learn more about Microsoft’s four key areas of intelligent security, click here to check out our infographic and contact us with any questions.   

Protect Against Cyberthreats with Microsoft 365

Read time: 30 seconds
If you work at a small or medium-sized business (SMB), you probably juggle multiple roles every day. Lighten your load with Microsoft 365 and cross off “become a cybersecurity expert” from your to-do list. Gone are the days when cybercrime was exclusively a big business problem. As more SMBs are targeted by hackers, take advantage of advanced security to defend…

Lock Down your Login

Read time: 30 seconds
We no longer recommend passwords to protect account logins.  We recommend passphrases instead, because they are more effective.    So, what is a passphrase?  Passphrases are just words strung together in a sentence that increase the phrases’ complexity and length. When it comes to passphrases, it’s best to mix it up! Keep them long, easy-to-remember, and unique for each account. Click here to learn more about using passphrases to keep your sensitive information safe.…

Think Before you Click

Read time: 45 seconds
Cybercriminals use email, text messages and voicemails to trick you into giving them your personal information. They often try to steal passwords, account numbers, or Social Security numbers. Personal information is so lucrative for criminals, they launch thousands of campaigns, called phishing attacks, every day!  Click here to learn how to avoid the latest vishing attack that targets telecommuters. 

Beware of Public WiFi

Read time: 30 seconds
Using public WiFi is convenient, since it is available almost everywhere, we go. Most people have used it, whether it is from an airport, coffee shop, library, park or hotel.  However, many might not be aware that using public WiFi comes with significant risks. Public WiFi networks are mostly unencrypted, which means that cybercriminals can hack into these networks and steal your sensitive information.  If you must use public WiFi, limit what you do while using it and avoid logging in to key accounts like email and financial services.   Read this…

62 Percent of Organizations Sacrifice Mobile Security for Speed

Read time: 45 seconds
According to Verizon’s Mobile Security Index (MSI) 2020, 39 percent of organizations admitted that they’ve experienced a security compromise involving a mobile device. This becomes much more concerning when you consider that the average loss from a successful business-email compromise attack is nearly $130,000. Click here to learn how your business can avoid and counter these threats. No matter where you are on…

The Four Pillars of Microsoft 365 Enterprise-Grade Security

In the era of cloud-first and mobile-first technology, productivity and security go hand in hand. This means that when utilizing digital tools, the fact that your data remains secure, encrypted, and in the right hands is just as important—if not more so—than the increase in productivity obtained by using them. Therefore, choosing the correct applications involves a careful understanding of…

Prevent Data Leaks with Proven Security Solutions

Read time: 60 seconds
The global average cost of a data breach is $3.6 million. Is your company prepared to deal with the fallout from a cyberattack?  With our security solutions from Microsoft 365 Business, you can take advantage of the latest data-loss protection policies to ensure that your sensitive data is always protected. With a simple, cost-effective security solution that’s easy to use,…
Menu