Blog

CYBERSECURITY AND COMPLIANCE

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Gain a Competitive Edge with Advanced Security Solutions from Microsoft

Read time: 45 seconds
When The Walsh Group—a construction contractor—moved to the cloud, it realized it needed better ways to manage who accesses its systems. The company set up identity as the control plane—with Microsoft Azure Active Directory at the center and a zero-trust security stance to better protect access to all its resources. Now, The Walsh Group CIO says the company leads the industry…

Four Key Areas of Intelligent Security with Microsoft

Read time: 30 seconds
Need intelligent security solutions to protect your entire company? Look no further than Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel. To learn more about Microsoft’s four key areas of intelligent security, click here to check out our infographic and contact us with any questions.   

Protect Against Cyberthreats with Microsoft 365

Read time: 30 seconds
If you work at a small or medium-sized business (SMB), you probably juggle multiple roles every day. Lighten your load with Microsoft 365 and cross off “become a cybersecurity expert” from your to-do list. Gone are the days when cybercrime was exclusively a big business problem. As more SMBs are targeted by hackers, take advantage of advanced security to defend…

Lock Down your Login

Read time: 30 seconds
We no longer recommend passwords to protect account logins.  We recommend passphrases instead, because they are more effective.    So, what is a passphrase?  Passphrases are just words strung together in a sentence that increase the phrases’ complexity and length. When it comes to passphrases, it’s best to mix it up! Keep them long, easy-to-remember, and unique for each account. Click here to learn more about using passphrases to keep your sensitive information safe.…

Think Before you Click

Read time: 45 seconds
Cybercriminals use email, text messages and voicemails to trick you into giving them your personal information. They often try to steal passwords, account numbers, or Social Security numbers. Personal information is so lucrative for criminals, they launch thousands of campaigns, called phishing attacks, every day!  Click here to learn how to avoid the latest vishing attack that targets telecommuters. 

Beware of Public WiFi

Read time: 30 seconds
Using public WiFi is convenient, since it is available almost everywhere, we go. Most people have used it, whether it is from an airport, coffee shop, library, park or hotel.  However, many might not be aware that using public WiFi comes with significant risks. Public WiFi networks are mostly unencrypted, which means that cybercriminals can hack into these networks and steal your sensitive information.  If you must use public WiFi, limit what you do while using it and avoid logging in to key accounts like email and financial services.   Read this…

62 Percent of Organizations Sacrifice Mobile Security for Speed

Read time: 45 seconds
According to Verizon’s Mobile Security Index (MSI) 2020, 39 percent of organizations admitted that they’ve experienced a security compromise involving a mobile device. This becomes much more concerning when you consider that the average loss from a successful business-email compromise attack is nearly $130,000. Click here to learn how your business can avoid and counter these threats. No matter where you are on…

The Four Pillars of Microsoft 365 Enterprise-Grade Security

In the era of cloud-first and mobile-first technology, productivity and security go hand in hand. This means that when utilizing digital tools, the fact that your data remains secure, encrypted, and in the right hands is just as important—if not more so—than the increase in productivity obtained by using them. Therefore, choosing the correct applications involves a careful understanding of…

Prevent Data Leaks with Proven Security Solutions

Read time: 60 seconds
The global average cost of a data breach is $3.6 million. Is your company prepared to deal with the fallout from a cyberattack?  With our security solutions from Microsoft 365 Business, you can take advantage of the latest data-loss protection policies to ensure that your sensitive data is always protected. With a simple, cost-effective security solution that’s easy to use,…

Safeguard Company Data Across Apps and Devices

62 percent of small and medium-sized businesses (SMBs) don’t have an active or up-to-date cybersecurity strategy in place. Want to make sure that your data is protected, no matter what apps or devices you and your employees are using?   Now, you can take advantage of our data protection solutions featuring Microsoft 365 Business. Check out this infographic—which shows industry…

Protect Company Data on Personal Devices

Read time: 30 seconds
Aren’t sure where to start in terms of securing company data on personal devices? Check out this article to learn more about how to protect your company data across all devices.   At Xantrion Inc., we can help protect your company data, no matter where it’s accessed from. Contact our team to learn more.

Most Teleworkers Lack Training, Awareness to Avoid Hackers

Read time: 45 seconds
Nearly 75 percent of teleworkers and Work from Home (WFH) employees are without help from their employers on security awareness, guidance or training, according to a new report from Kaspersky. While this is a significant statistic on its own, it is even more important when combined with the 27 percent of teleworkers who’ve received phishing emails relating to the coronavirus and may not know how to avoid…

Investing in Privacy Brings Bigger Profits

Read time: 30 seconds
In each of the last three years, Cisco has surveyed organizations to learn if they reaped benefits from privacy beyond meeting compliance requirements.  The data shows that it does.  Over the past few years, data privacy has evolved from ‘nice to have’ to a business imperative and critical boardroom issue. The surveys revealed that: More than 40 percent of organizations…

Everything you Need to Know About the California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) represents a major advancement in privacy rights for California residents – and a major set of obligations for companies that have customers in the state, regardless of where in the world they are located physically.   Millions of businesses worldwide will be subject to the CCPA. Those subject to the law will be any company…

Zoom Security Woes Continue – Business Accounts Posted on the Dark Web

Read time: 30 seconds
“On April 1st, an actor in a popular dark web forum posted a link to a collection of 352 compromised Zoom accounts,” reported Yahoo Finance. The accounts were reportedly listed for hackers to troll rather than profit. Sixgill, a cybersecurity firm that reported the dark web posting, tweeted a screenshot of the dark web forum post about the compromised Zoom…

Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate

Read time: 45 seconds
Last month, legal services firm, Epiq Global was the victim of a ransomware attack. The attack took down all of their 80 offices spread across the globe. The ransomware problem is clearly getting worse.  In Q4 2019, the average ransom payment increased by 104% to $84,116 up from $41,981 in Q3 2019  Average downtime increased to 16.2 days, from 12.1 days    Public sector agencies continued to account for an elevated portion of ransomware attacks, albeit down slightly from Q3  Healthcare…

How to Keep Cyber Insurance Rates from Going through the Roof

Read time: 30 seconds
According to Reuters, cyber insurance rates have jumped about 25 percent over the past year, due in part to costly ransomware claims. Although the number of ransomware attacks actually fell in 2019 vs. 2018, the impact of those attacks rose. This trend has cyber insurers trying to figure out new strategies to minimize their risks while also continuing to protect policyholders. To keep your cyber insurance costs from going through the roof, contact us to learn…

OCIE Moves Most Exams Off-Site

Read time: 60 seconds
The SEC’s Office of Compliance Inspections and Examinations (OCIE) has issued a statement announcing that because of health, safety, and firm operations disruption concerns, OCIE has moved to conducting examinations off-site through correspondence unless it is “absolutely necessary” for its teams to be on-site. Recognizing that firms are focused on maintaining operations and ensuring the safety of their employees, OCIE is working…

Blog

CYBERSECURITY AND COMPLIANCE

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Gain a Competitive Edge with Advanced Security Solutions from Microsoft

Read time: 45 seconds
When The Walsh Group—a construction contractor—moved to the cloud, it realized it needed better ways to manage who accesses its systems. The company set up identity as the control plane—with Microsoft Azure Active Directory at the center and a zero-trust security stance to better protect access to all its resources. Now, The Walsh Group CIO says the company leads the industry…

Four Key Areas of Intelligent Security with Microsoft

Read time: 30 seconds
Need intelligent security solutions to protect your entire company? Look no further than Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel. To learn more about Microsoft’s four key areas of intelligent security, click here to check out our infographic and contact us with any questions.   

Strategic, Reliable, and Secure. Learn more about our services.

Protect Against Cyberthreats with Microsoft 365

Read time: 30 seconds
If you work at a small or medium-sized business (SMB), you probably juggle multiple roles every day. Lighten your load with Microsoft 365 and cross off “become a cybersecurity expert” from your to-do list. Gone are the days when cybercrime was exclusively a big business problem. As more SMBs are targeted by hackers, take advantage of advanced security to defend…

Lock Down your Login

Read time: 30 seconds
We no longer recommend passwords to protect account logins.  We recommend passphrases instead, because they are more effective.    So, what is a passphrase?  Passphrases are just words strung together in a sentence that increase the phrases’ complexity and length. When it comes to passphrases, it’s best to mix it up! Keep them long, easy-to-remember, and unique for each account. Click here to learn more about using passphrases to keep your sensitive information safe.…

Think Before you Click

Read time: 45 seconds
Cybercriminals use email, text messages and voicemails to trick you into giving them your personal information. They often try to steal passwords, account numbers, or Social Security numbers. Personal information is so lucrative for criminals, they launch thousands of campaigns, called phishing attacks, every day!  Click here to learn how to avoid the latest vishing attack that targets telecommuters. 

Beware of Public WiFi

Read time: 30 seconds
Using public WiFi is convenient, since it is available almost everywhere, we go. Most people have used it, whether it is from an airport, coffee shop, library, park or hotel.  However, many might not be aware that using public WiFi comes with significant risks. Public WiFi networks are mostly unencrypted, which means that cybercriminals can hack into these networks and steal your sensitive information.  If you must use public WiFi, limit what you do while using it and avoid logging in to key accounts like email and financial services.   Read this…

62 Percent of Organizations Sacrifice Mobile Security for Speed

Read time: 45 seconds
According to Verizon’s Mobile Security Index (MSI) 2020, 39 percent of organizations admitted that they’ve experienced a security compromise involving a mobile device. This becomes much more concerning when you consider that the average loss from a successful business-email compromise attack is nearly $130,000. Click here to learn how your business can avoid and counter these threats. No matter where you are on…

The Four Pillars of Microsoft 365 Enterprise-Grade Security

In the era of cloud-first and mobile-first technology, productivity and security go hand in hand. This means that when utilizing digital tools, the fact that your data remains secure, encrypted, and in the right hands is just as important—if not more so—than the increase in productivity obtained by using them. Therefore, choosing the correct applications involves a careful understanding of…

Prevent Data Leaks with Proven Security Solutions

Read time: 60 seconds
The global average cost of a data breach is $3.6 million. Is your company prepared to deal with the fallout from a cyberattack?  With our security solutions from Microsoft 365 Business, you can take advantage of the latest data-loss protection policies to ensure that your sensitive data is always protected. With a simple, cost-effective security solution that’s easy to use,…

Safeguard Company Data Across Apps and Devices

62 percent of small and medium-sized businesses (SMBs) don’t have an active or up-to-date cybersecurity strategy in place. Want to make sure that your data is protected, no matter what apps or devices you and your employees are using?   Now, you can take advantage of our data protection solutions featuring Microsoft 365 Business. Check out this infographic—which shows industry…

Protect Company Data on Personal Devices

Read time: 30 seconds
Aren’t sure where to start in terms of securing company data on personal devices? Check out this article to learn more about how to protect your company data across all devices.   At Xantrion Inc., we can help protect your company data, no matter where it’s accessed from. Contact our team to learn more.

Most Teleworkers Lack Training, Awareness to Avoid Hackers

Read time: 45 seconds
Nearly 75 percent of teleworkers and Work from Home (WFH) employees are without help from their employers on security awareness, guidance or training, according to a new report from Kaspersky. While this is a significant statistic on its own, it is even more important when combined with the 27 percent of teleworkers who’ve received phishing emails relating to the coronavirus and may not know how to avoid…

Investing in Privacy Brings Bigger Profits

Read time: 30 seconds
In each of the last three years, Cisco has surveyed organizations to learn if they reaped benefits from privacy beyond meeting compliance requirements.  The data shows that it does.  Over the past few years, data privacy has evolved from ‘nice to have’ to a business imperative and critical boardroom issue. The surveys revealed that: More than 40 percent of organizations…

Everything you Need to Know About the California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) represents a major advancement in privacy rights for California residents – and a major set of obligations for companies that have customers in the state, regardless of where in the world they are located physically.   Millions of businesses worldwide will be subject to the CCPA. Those subject to the law will be any company…

Zoom Security Woes Continue – Business Accounts Posted on the Dark Web

Read time: 30 seconds
“On April 1st, an actor in a popular dark web forum posted a link to a collection of 352 compromised Zoom accounts,” reported Yahoo Finance. The accounts were reportedly listed for hackers to troll rather than profit. Sixgill, a cybersecurity firm that reported the dark web posting, tweeted a screenshot of the dark web forum post about the compromised Zoom…

Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate

Read time: 45 seconds
Last month, legal services firm, Epiq Global was the victim of a ransomware attack. The attack took down all of their 80 offices spread across the globe. The ransomware problem is clearly getting worse.  In Q4 2019, the average ransom payment increased by 104% to $84,116 up from $41,981 in Q3 2019  Average downtime increased to 16.2 days, from 12.1 days    Public sector agencies continued to account for an elevated portion of ransomware attacks, albeit down slightly from Q3  Healthcare…

How to Keep Cyber Insurance Rates from Going through the Roof

Read time: 30 seconds
According to Reuters, cyber insurance rates have jumped about 25 percent over the past year, due in part to costly ransomware claims. Although the number of ransomware attacks actually fell in 2019 vs. 2018, the impact of those attacks rose. This trend has cyber insurers trying to figure out new strategies to minimize their risks while also continuing to protect policyholders. To keep your cyber insurance costs from going through the roof, contact us to learn…

OCIE Moves Most Exams Off-Site

Read time: 60 seconds
The SEC’s Office of Compliance Inspections and Examinations (OCIE) has issued a statement announcing that because of health, safety, and firm operations disruption concerns, OCIE has moved to conducting examinations off-site through correspondence unless it is “absolutely necessary” for its teams to be on-site. Recognizing that firms are focused on maintaining operations and ensuring the safety of their employees, OCIE is working…
Menu