Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

Safeguard Company Data Across Apps and Devices

62 percent of small and medium-sized businesses (SMBs) don’t have an active or up-to-date cybersecurity strategy in place. Want to make sure that your data is protected, no matter what apps or devices you and your employees are using?   Now, you can take advantage of our data protection solutions featuring Microsoft 365 Business. Check out this infographic—which shows industry…

Protect Company Data on Personal Devices

Read time: 30 seconds
Aren’t sure where to start in terms of securing company data on personal devices? Check out this article to learn more about how to protect your company data across all devices.   At Xantrion Inc., we can help protect your company data, no matter where it’s accessed from. Contact our team to learn more.

COVID-19: How to Clean Computers and Electronics for All Users

By Yale Environmental Health and Safety, as published on June 9, 2020 The following information provides guidance on how to clean high-touch electronics. Examples include computers, computer accessories, touchscreen devices, printers and copiers (hereinafter referred to as “electronics”). All electronics in shared and public locations should be frequently cleaned and disinfected. When cleaning electronics it is important to follow the…

Update your Business Continuity Plan for an Extended Pandemic – Just in Case

Read time: 60 seconds
As some workplaces reopen and others make plans to do so, we may start seeing business as usual. However, if the coronavirus re-emerges over the summer or fall due to a decrease in social distancing and other factors, organizations will need to be prepared for a return to remote work and other pandemic-induced workplace changes.  Smart organizations are making plans now—just in case—by taking the lessons…

How do a Business Impact Analysis and Risk Assessment Differ?

Risk assessments and business impact analyses are two key elements of a disaster recovery (DR) plan. Both involve assessing disruptive events and use the results to strengthen a disaster recovery strategy, but they are not interchangeable. In order to have an airtight DR plan, an organization should conduct both a business impact analysis and risk assessment.  To understand the differences…

Most Teleworkers Lack Training, Awareness to Avoid Hackers

Read time: 45 seconds
Nearly 75 percent of teleworkers and Work from Home (WFH) employees are without help from their employers on security awareness, guidance or training, according to a new report from Kaspersky. While this is a significant statistic on its own, it is even more important when combined with the 27 percent of teleworkers who’ve received phishing emails relating to the coronavirus and may not know how to avoid…

Investing in Privacy Brings Bigger Profits

Read time: 30 seconds
In each of the last three years, Cisco has surveyed organizations to learn if they reaped benefits from privacy beyond meeting compliance requirements.  The data shows that it does.  Over the past few years, data privacy has evolved from ‘nice to have’ to a business imperative and critical boardroom issue. The surveys revealed that: More than 40 percent of organizations…

Is your Outdated Phone System Costing You?

Read time: 20 seconds
Traditional small business phone systems have historically had a large advantage over VoIP phones from a call quality standpoint. However, due to increases in Internet speeds and technology innovation among VoIP service providers, this is no longer the case.  If you’re still using a traditional PBX or key phone system, reasons to make the switch to VoIP are:  Lower start–up costs  Lower…

Everything you Need to Know About the California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) represents a major advancement in privacy rights for California residents – and a major set of obligations for companies that have customers in the state, regardless of where in the world they are located physically.   Millions of businesses worldwide will be subject to the CCPA. Those subject to the law will be any company…

Actionable Tips on Mitigating Cloud Vulnerabilities

Read time: 30 seconds
Cloud misconfigurations, poor access controls, shared tenancy and supply chain vulnerabilities are common problems faced by organizations using cloud services. If you are concerned about managing these problems, read Mitigating Cloud Vulnerabilities, a recent guide developed by the National Security Agency (NSA) for actionable tips. If you don’t have the time or expertise to leverage this guide, contact us about how our Cloud Strategy services can help you mitigate your cloud vulnerabilities. 

Complimentary Crisis Management Checklist 

Read time: 45 seconds
The current COVID-19 pandemic has provided us with an all-too-real lesson in the importance of crisis management. Even organizations with traditional business continuity and disaster recovery plans have struggled with the unique challenges of a global pandemic.  Without a plan and clear leadership from a crisis management team, it is difficult to operate in a time of crisis. A crisis management plan provides…

The Best Way to Close Technical Skills Gaps

Read time: 20 seconds
IT professionals are training more than ever, and yet skills gaps are more prevalent than they’ve ever been. According to the Global Knowledge IT Skills and Salary Report, the largest annual survey of global IT professionals, skills gaps remain because of the pace of technology evolution and incorrect training. To combat these issues, the report provides a methodology for prioritizing your skill list and determining the formality of…

Zoom Security Woes Continue – Business Accounts Posted on the Dark Web

Read time: 30 seconds
“On April 1st, an actor in a popular dark web forum posted a link to a collection of 352 compromised Zoom accounts,” reported Yahoo Finance. The accounts were reportedly listed for hackers to troll rather than profit. Sixgill, a cybersecurity firm that reported the dark web posting, tweeted a screenshot of the dark web forum post about the compromised Zoom…

Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate

Read time: 45 seconds
Last month, legal services firm, Epiq Global was the victim of a ransomware attack. The attack took down all of their 80 offices spread across the globe. The ransomware problem is clearly getting worse.  In Q4 2019, the average ransom payment increased by 104% to $84,116 up from $41,981 in Q3 2019  Average downtime increased to 16.2 days, from 12.1 days    Public sector agencies continued to account for an elevated portion of ransomware attacks, albeit down slightly from Q3  Healthcare…

How to Keep Cyber Insurance Rates from Going through the Roof

Read time: 30 seconds
According to Reuters, cyber insurance rates have jumped about 25 percent over the past year, due in part to costly ransomware claims. Although the number of ransomware attacks actually fell in 2019 vs. 2018, the impact of those attacks rose. This trend has cyber insurers trying to figure out new strategies to minimize their risks while also continuing to protect policyholders. To keep your cyber insurance costs from going through the roof, contact us to learn…

Why Obtain a Microsoft Certified Solutions Expert (MCSE) Certification?

Read time: 30 seconds
According to the Global Knowledge IT Skills and Salary Report, the largest annual survey of global IT professionals, certification value is at an all-time high. Read on to learn what the certification is, who should get certified and what it will do for your career. What is the MCSE Cloud Platform and Infrastructure certification? The MCSE Cloud Platform and Infrastructure…

OCIE Moves Most Exams Off-Site

Read time: 60 seconds
The SEC’s Office of Compliance Inspections and Examinations (OCIE) has issued a statement announcing that because of health, safety, and firm operations disruption concerns, OCIE has moved to conducting examinations off-site through correspondence unless it is “absolutely necessary” for its teams to be on-site. Recognizing that firms are focused on maintaining operations and ensuring the safety of their employees, OCIE is working…

Watch Out for These Common COVID-19 Scams

Read time: 45 seconds
As social distancing measures take effect across the United States to combat the spread of coronavirus (COVID-19), it’s important to make sure your personal information also remains safe as more activity shifts online. Click here to learn about some of the most common scams exploiting coronavirus fears, that are on the rise, and some measures you can take to avoid…

Blog

MOST POPULAR

Use Microsoft Teams for an Efficient Digital Workplace

View time: 2 minutes
How do you empower great ideas across a digital workspace so that they evolve in a fluid and organic matter? This is a critical question to answer for any company with a remote workforce—and with teams growing more diverse and intergenerational every year, it’s becoming increasingly complex.    In this video, you’ll learn how Microsoft Teams complements the already-robust applications found…

Prevent Data Leaks with Proven Security Solutions

Read time: 60 seconds
The global average cost of a data breach is $3.6 million. Is your company prepared to deal with the fallout from a cyberattack?  With our security solutions from Microsoft 365 Business, you can take advantage of the latest data-loss protection policies to ensure that your sensitive data is always protected. With a simple, cost-effective security solution that’s easy to use,…

Safeguard Company Data Across Apps and Devices

62 percent of small and medium-sized businesses (SMBs) don’t have an active or up-to-date cybersecurity strategy in place. Want to make sure that your data is protected, no matter what apps or devices you and your employees are using?   Now, you can take advantage of our data protection solutions featuring Microsoft 365 Business. Check out this infographic—which shows industry…

Protect Company Data on Personal Devices

Read time: 30 seconds
Aren’t sure where to start in terms of securing company data on personal devices? Check out this article to learn more about how to protect your company data across all devices.   At Xantrion Inc., we can help protect your company data, no matter where it’s accessed from. Contact our team to learn more.

Strategic, Reliable, and Secure. Learn more about our services.

COVID-19: How to Clean Computers and Electronics for All Users

By Yale Environmental Health and Safety, as published on June 9, 2020 The following information provides guidance on how to clean high-touch electronics. Examples include computers, computer accessories, touchscreen devices, printers and copiers (hereinafter referred to as “electronics”). All electronics in shared and public locations should be frequently cleaned and disinfected. When cleaning electronics it is important to follow the…

Update your Business Continuity Plan for an Extended Pandemic – Just in Case

Read time: 60 seconds
As some workplaces reopen and others make plans to do so, we may start seeing business as usual. However, if the coronavirus re-emerges over the summer or fall due to a decrease in social distancing and other factors, organizations will need to be prepared for a return to remote work and other pandemic-induced workplace changes.  Smart organizations are making plans now—just in case—by taking the lessons…

How do a Business Impact Analysis and Risk Assessment Differ?

Risk assessments and business impact analyses are two key elements of a disaster recovery (DR) plan. Both involve assessing disruptive events and use the results to strengthen a disaster recovery strategy, but they are not interchangeable. In order to have an airtight DR plan, an organization should conduct both a business impact analysis and risk assessment.  To understand the differences…

Most Teleworkers Lack Training, Awareness to Avoid Hackers

Read time: 45 seconds
Nearly 75 percent of teleworkers and Work from Home (WFH) employees are without help from their employers on security awareness, guidance or training, according to a new report from Kaspersky. While this is a significant statistic on its own, it is even more important when combined with the 27 percent of teleworkers who’ve received phishing emails relating to the coronavirus and may not know how to avoid…

Investing in Privacy Brings Bigger Profits

Read time: 30 seconds
In each of the last three years, Cisco has surveyed organizations to learn if they reaped benefits from privacy beyond meeting compliance requirements.  The data shows that it does.  Over the past few years, data privacy has evolved from ‘nice to have’ to a business imperative and critical boardroom issue. The surveys revealed that: More than 40 percent of organizations…

Is your Outdated Phone System Costing You?

Read time: 20 seconds
Traditional small business phone systems have historically had a large advantage over VoIP phones from a call quality standpoint. However, due to increases in Internet speeds and technology innovation among VoIP service providers, this is no longer the case.  If you’re still using a traditional PBX or key phone system, reasons to make the switch to VoIP are:  Lower start–up costs  Lower…

Everything you Need to Know About the California Consumer Privacy Act (CCPA)

The California Consumer Privacy Act (CCPA) represents a major advancement in privacy rights for California residents – and a major set of obligations for companies that have customers in the state, regardless of where in the world they are located physically.   Millions of businesses worldwide will be subject to the CCPA. Those subject to the law will be any company…

Actionable Tips on Mitigating Cloud Vulnerabilities

Read time: 30 seconds
Cloud misconfigurations, poor access controls, shared tenancy and supply chain vulnerabilities are common problems faced by organizations using cloud services. If you are concerned about managing these problems, read Mitigating Cloud Vulnerabilities, a recent guide developed by the National Security Agency (NSA) for actionable tips. If you don’t have the time or expertise to leverage this guide, contact us about how our Cloud Strategy services can help you mitigate your cloud vulnerabilities. 

Complimentary Crisis Management Checklist 

Read time: 45 seconds
The current COVID-19 pandemic has provided us with an all-too-real lesson in the importance of crisis management. Even organizations with traditional business continuity and disaster recovery plans have struggled with the unique challenges of a global pandemic.  Without a plan and clear leadership from a crisis management team, it is difficult to operate in a time of crisis. A crisis management plan provides…

The Best Way to Close Technical Skills Gaps

Read time: 20 seconds
IT professionals are training more than ever, and yet skills gaps are more prevalent than they’ve ever been. According to the Global Knowledge IT Skills and Salary Report, the largest annual survey of global IT professionals, skills gaps remain because of the pace of technology evolution and incorrect training. To combat these issues, the report provides a methodology for prioritizing your skill list and determining the formality of…

Zoom Security Woes Continue – Business Accounts Posted on the Dark Web

Read time: 30 seconds
“On April 1st, an actor in a popular dark web forum posted a link to a collection of 352 compromised Zoom accounts,” reported Yahoo Finance. The accounts were reportedly listed for hackers to troll rather than profit. Sixgill, a cybersecurity firm that reported the dark web posting, tweeted a screenshot of the dark web forum post about the compromised Zoom…

Ransomware Costs Double in Q4 as Ryuk, Sodinokibi Proliferate

Read time: 45 seconds
Last month, legal services firm, Epiq Global was the victim of a ransomware attack. The attack took down all of their 80 offices spread across the globe. The ransomware problem is clearly getting worse.  In Q4 2019, the average ransom payment increased by 104% to $84,116 up from $41,981 in Q3 2019  Average downtime increased to 16.2 days, from 12.1 days    Public sector agencies continued to account for an elevated portion of ransomware attacks, albeit down slightly from Q3  Healthcare…

How to Keep Cyber Insurance Rates from Going through the Roof

Read time: 30 seconds
According to Reuters, cyber insurance rates have jumped about 25 percent over the past year, due in part to costly ransomware claims. Although the number of ransomware attacks actually fell in 2019 vs. 2018, the impact of those attacks rose. This trend has cyber insurers trying to figure out new strategies to minimize their risks while also continuing to protect policyholders. To keep your cyber insurance costs from going through the roof, contact us to learn…

Why Obtain a Microsoft Certified Solutions Expert (MCSE) Certification?

Read time: 30 seconds
According to the Global Knowledge IT Skills and Salary Report, the largest annual survey of global IT professionals, certification value is at an all-time high. Read on to learn what the certification is, who should get certified and what it will do for your career. What is the MCSE Cloud Platform and Infrastructure certification? The MCSE Cloud Platform and Infrastructure…

OCIE Moves Most Exams Off-Site

Read time: 60 seconds
The SEC’s Office of Compliance Inspections and Examinations (OCIE) has issued a statement announcing that because of health, safety, and firm operations disruption concerns, OCIE has moved to conducting examinations off-site through correspondence unless it is “absolutely necessary” for its teams to be on-site. Recognizing that firms are focused on maintaining operations and ensuring the safety of their employees, OCIE is working…

Watch Out for These Common COVID-19 Scams

Read time: 45 seconds
As social distancing measures take effect across the United States to combat the spread of coronavirus (COVID-19), it’s important to make sure your personal information also remains safe as more activity shifts online. Click here to learn about some of the most common scams exploiting coronavirus fears, that are on the rise, and some measures you can take to avoid…
Menu