Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

Why Invest in Integrated Threat Protection?

With data growing increasingly more valuable and harder to protect, digital security has become infinitely complex. Check out our infographic below to learn why an investment in Microsoft Threat Protection provides the built-in intelligence, automation, and integration to coordinate protection, detection, response, and prevention that organizations need to stay secure. Contact us to learn how Xantrion’s managed service offerings can…

Microsoft Threat Protection is a Best-In-Class, Intelligent Security Solution

Cyber-attackers will cross multiple domains like email, identity, endpoints, and applications to find the point of least resistance. Today’s defense solutions have been designed to protect, detect, and block threats for each domain separately, allowing attackers to exploit the seams and threshold differences between solutions—leaving the business vulnerable to attack. Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with…

New Bills on Capitol Hill After the Colonial Pipeline Attack

The recent ransomware attack against the Colonial Pipeline illustrates the need for a plan to protect the economy in the event of a major cyber-attack, according to members of the House’s Homeland Security Committee (HSC). The Colonial Pipeline shut down operations last week as a result of the attack, leaving 45 percent of the U.S. East Coast without its normal fuel supply.…

The U.S. Government’s Plan to Deter Cyberattacks

The Biden administration wants to help power plants and other electric utilities protect their networks from cyberattacks. The following is an overview of their plan. The new initiative was announced in April by the United States Department of Energy, and it includes a variety of milestones for owners and operators of environments like power plants. It makes recommendations for how…

Three Things to Keep in Mind Before Moving More IT Operations to the Cloud

The future is looking a little brighter these days. With the COVID-19 infection rate falling, the US economy growing, and pandemic restrictions easing, companies are beginning to look for ways to improve their operations and their bottom line. One approach is move IT operations or assets (e.g., data) to public clouds.  Using public cloud services is not new. You probably…

Three of the Most Common Employee Offboarding Mistakes

There are a lot of steps you can take to mitigate the risks posed by insider threats. But according to Augmentt, a SaaS management company, one of the best actions you can take, is to avoid these three common employee off boarding mistakes.

The Apple iOS Update Everyone is Talking About

Recently, Apple released the iOS 14.5 operating system. While it has some interesting new features, it is primarily about security fixes for more than 50 (!) different vulnerabilities.  iOS 14.5 and Security: An Overview One of the major reasons why iOS updates are so important is because they include a host of different fixes that help make devices more secure.  One of the vulnerabilities fixed with this new update…

3 Reasons Why You Shouldn’t Click “Unsubscribe” Links in Emails

Using “Unsubscribe” links might seem like a good way to prevent junk emails from cluttering your inbox but doing so is risky and can lead to unforeseen consequences. Here are three reasons why you should avoid clicking “Unsubscribe” links in emails: 1. You Might End Up Getting More Rather Than Fewer Emails When you click “Unsubscribe”, you are letting the…

The Executive Order that will Require Software Vendors to Notify Government of Cybersecurity Breaches

The Biden administration is planning to issue an executive order that will require many software vendors to provide notification when they experience a data breach, according to a recent draft. Reuters reported on March 25, 2021 that the order will affect companies whose customers include agencies of the federal government. The administration could issue the order as early as March 31, although…

5 Lies Cybercriminals Tell to Get You to Click Malicious Links

Read time: 60 seconds
The numbers are staggering. Each day, 156 million phishing emails are sent. Spam filters catch about 90% of them, but that still means 16 million phishing emails make it through to recipients’ inboxes, where half are opened. Out of the 8 million emails opened, 800,000 of them lure recipients into clicking a link. That simple act can lead to malware being installed,…

Business Email Scams in the Year of the Pandemic

Read time: 60 seconds
In BEC attacks, cybercriminals pose as company executives, supplier reps, lawyers, and other business professionals to con organizations into sending them wire transfers and sensitive data (e.g., bank account numbers, gift card numbers). Despite the pandemonium from the coronavirus pandemic, BEC scammers stole an unprecedented $1.9 billion from their victims, according to IC3’s “2020 Internet Crime Report“.  This all-time high is continuing to…

April 13 is Identity Management Day

Read time: 45 seconds
In a world defined by our use of technology, how we are identified digitally is important. Our digital identities and the credentials that protect them define how we work, interact with each other, access technology, execute transactions, and so much more.  For organizations, Identity and Access Management (IAM) “is the discipline that enables the right individuals to access the right…

How to Minimize the Impact of Severe Weather on IT Systems

Read time: 90 seconds
A recent report has confirmed what many people have suspected: 2020 was plagued by severe weather. In the United States alone, a record-breaking 22 weather and climate disasters earned the unwanted distinction of causing $1 billion or more in damages. Combined, these 22 events resulted in 262 deaths and $95 billion in damages.  The severe weather does not seem to be letting…
Bay Area IT Services | IT Support & Consulting

Microsoft IE 11 Nears Deadline to Stop Supporting 365 Apps & Services

Read time: 45 seconds
Internet Explorer has been phasing out for the last five years and Microsoft is now launching its newest version of ‘open-source browsing’ Microsoft Edge.  The Beginning of the End Consumers have been using Internet Explorer 11 since 2013, when browsing experiences were far less advanced and accommodating.  As browsers progressed, open-source standards have risen to new heights and set the standard for…
Outsourced cybersecurity for business

What You Need to Know Now About the CPRA

Read time: 30 seconds
The California Privacy Rights Act (CPRA), which passed in November 2020, is a comprehensive privacy law that provides significant protections to people who live in California. If your company has more than $25 million in annual revenues and handles the data of California residents, the CPRA will apply to you, regardless of where you’re located. That makes it critical to start getting legal advice and planning your compliance strategy now.   When the CPRA goes into effect on January 1, 2023,…

Microsoft Windows 10/10X Provides Users with Innovative Tools and Security Options

Read time: 60 seconds
Windows 10/10X design aims for simplification and has integrated an adaptive experience to optimize user preference for streamlined daily use and productivity.  Privacy for Edge Users Windows 10 ‘Version 20H2’ is the first to come with the redesigned Microsoft Edge browser installed by default. The browser is now built on Chromium, Google’s open-source foundation for the Chrome browser, which makes…

Blog

MOST POPULAR

Fortify your Data Against Threats

Maximize threat detection during attack stages with Microsoft’s comprehensive suite of security solutions. Unmatched volumes of data inform Microsoft security solutions. Check out this infographic to learn how you can harness decades of security experience with Microsoft Advanced Threat Protection. Have questions about Microsoft 365 products or features? If so, contact Xantrion, we’re here to help.

Security Beyond Microsoft Products

With Microsoft, security can be simple once again. Microsoft 365 provides an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch the video to learn more and contact Xantrion with any questions.

Why Invest in Integrated Threat Protection?

With data growing increasingly more valuable and harder to protect, digital security has become infinitely complex. Check out our infographic below to learn why an investment in Microsoft Threat Protection provides the built-in intelligence, automation, and integration to coordinate protection, detection, response, and prevention that organizations need to stay secure. Contact us to learn how Xantrion’s managed service offerings can…

Microsoft Threat Protection is a Best-In-Class, Intelligent Security Solution

Cyber-attackers will cross multiple domains like email, identity, endpoints, and applications to find the point of least resistance. Today’s defense solutions have been designed to protect, detect, and block threats for each domain separately, allowing attackers to exploit the seams and threshold differences between solutions—leaving the business vulnerable to attack. Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with…

Strategic, Reliable, and Secure. Learn more about our services.

New Bills on Capitol Hill After the Colonial Pipeline Attack

The recent ransomware attack against the Colonial Pipeline illustrates the need for a plan to protect the economy in the event of a major cyber-attack, according to members of the House’s Homeland Security Committee (HSC). The Colonial Pipeline shut down operations last week as a result of the attack, leaving 45 percent of the U.S. East Coast without its normal fuel supply.…

The U.S. Government’s Plan to Deter Cyberattacks

The Biden administration wants to help power plants and other electric utilities protect their networks from cyberattacks. The following is an overview of their plan. The new initiative was announced in April by the United States Department of Energy, and it includes a variety of milestones for owners and operators of environments like power plants. It makes recommendations for how…

Three Things to Keep in Mind Before Moving More IT Operations to the Cloud

The future is looking a little brighter these days. With the COVID-19 infection rate falling, the US economy growing, and pandemic restrictions easing, companies are beginning to look for ways to improve their operations and their bottom line. One approach is move IT operations or assets (e.g., data) to public clouds.  Using public cloud services is not new. You probably…

Three of the Most Common Employee Offboarding Mistakes

There are a lot of steps you can take to mitigate the risks posed by insider threats. But according to Augmentt, a SaaS management company, one of the best actions you can take, is to avoid these three common employee off boarding mistakes.

The Apple iOS Update Everyone is Talking About

Recently, Apple released the iOS 14.5 operating system. While it has some interesting new features, it is primarily about security fixes for more than 50 (!) different vulnerabilities.  iOS 14.5 and Security: An Overview One of the major reasons why iOS updates are so important is because they include a host of different fixes that help make devices more secure.  One of the vulnerabilities fixed with this new update…

3 Reasons Why You Shouldn’t Click “Unsubscribe” Links in Emails

Using “Unsubscribe” links might seem like a good way to prevent junk emails from cluttering your inbox but doing so is risky and can lead to unforeseen consequences. Here are three reasons why you should avoid clicking “Unsubscribe” links in emails: 1. You Might End Up Getting More Rather Than Fewer Emails When you click “Unsubscribe”, you are letting the…

The Executive Order that will Require Software Vendors to Notify Government of Cybersecurity Breaches

The Biden administration is planning to issue an executive order that will require many software vendors to provide notification when they experience a data breach, according to a recent draft. Reuters reported on March 25, 2021 that the order will affect companies whose customers include agencies of the federal government. The administration could issue the order as early as March 31, although…

5 Lies Cybercriminals Tell to Get You to Click Malicious Links

Read time: 60 seconds
The numbers are staggering. Each day, 156 million phishing emails are sent. Spam filters catch about 90% of them, but that still means 16 million phishing emails make it through to recipients’ inboxes, where half are opened. Out of the 8 million emails opened, 800,000 of them lure recipients into clicking a link. That simple act can lead to malware being installed,…

Business Email Scams in the Year of the Pandemic

Read time: 60 seconds
In BEC attacks, cybercriminals pose as company executives, supplier reps, lawyers, and other business professionals to con organizations into sending them wire transfers and sensitive data (e.g., bank account numbers, gift card numbers). Despite the pandemonium from the coronavirus pandemic, BEC scammers stole an unprecedented $1.9 billion from their victims, according to IC3’s “2020 Internet Crime Report“.  This all-time high is continuing to…

April 13 is Identity Management Day

Read time: 45 seconds
In a world defined by our use of technology, how we are identified digitally is important. Our digital identities and the credentials that protect them define how we work, interact with each other, access technology, execute transactions, and so much more.  For organizations, Identity and Access Management (IAM) “is the discipline that enables the right individuals to access the right…

How to Minimize the Impact of Severe Weather on IT Systems

Read time: 90 seconds
A recent report has confirmed what many people have suspected: 2020 was plagued by severe weather. In the United States alone, a record-breaking 22 weather and climate disasters earned the unwanted distinction of causing $1 billion or more in damages. Combined, these 22 events resulted in 262 deaths and $95 billion in damages.  The severe weather does not seem to be letting…
Bay Area IT Services | IT Support & Consulting

Microsoft IE 11 Nears Deadline to Stop Supporting 365 Apps & Services

Read time: 45 seconds
Internet Explorer has been phasing out for the last five years and Microsoft is now launching its newest version of ‘open-source browsing’ Microsoft Edge.  The Beginning of the End Consumers have been using Internet Explorer 11 since 2013, when browsing experiences were far less advanced and accommodating.  As browsers progressed, open-source standards have risen to new heights and set the standard for…
Outsourced cybersecurity for business

What You Need to Know Now About the CPRA

Read time: 30 seconds
The California Privacy Rights Act (CPRA), which passed in November 2020, is a comprehensive privacy law that provides significant protections to people who live in California. If your company has more than $25 million in annual revenues and handles the data of California residents, the CPRA will apply to you, regardless of where you’re located. That makes it critical to start getting legal advice and planning your compliance strategy now.   When the CPRA goes into effect on January 1, 2023,…

Microsoft Windows 10/10X Provides Users with Innovative Tools and Security Options

Read time: 60 seconds
Windows 10/10X design aims for simplification and has integrated an adaptive experience to optimize user preference for streamlined daily use and productivity.  Privacy for Edge Users Windows 10 ‘Version 20H2’ is the first to come with the redesigned Microsoft Edge browser installed by default. The browser is now built on Chromium, Google’s open-source foundation for the Chrome browser, which makes…
Menu