Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

That Text Message You Received is Smishing

You may have been the victim of an SMS-based phishing, or smishing, attack if you’ve ever received a text message that claimed there was a problem with one of your accounts and asked you to click on a link to resolve the issue. Smishing is one of the easiest ways for hackers to steal your data because you’re literally giving…

FINRA Issues Updated Vendor Supervision Guidance, Seeks Feedback on Cloud Computing; Warns of New Phishing Scam

By The Bates Group, LLC FINRA remained busy through the end of Summer with several important regulatory actions. New actions included issuing updated guidance on supervision of third-party vendors, requesting feedback on a report by the Office of Financial Innovation (“OFI”) concerning broker-dealer approaches to cloud computing, and raising additional alarms about a phishing campaign using fraudulent FINRA email domains. The actions reinforce important compliance objectives as new…
Outsourced cybersecurity for business

T-Mobile Breach Exposed the Personal Data of 54 Million Customers

On August 15, 2021, the world first learned about the massive T-Mobile data breach. The disclosure came from a most unusual source — the hackers who pulled off the data heist. The cybercriminals told BleepingComputer that they hacked into T-Mobile’s production, staging, and development servers and stole the personal data of millions of T-Mobile customers. A day later, T-Mobile confirmed that its systems had…

Secure Digital Transformation with Microsoft

Read time: 45 seconds
Integrated security solutions from Microsoft provide comprehensive protection against cyberattacks. With Microsoft 365, you have an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch this video to learn more and contact Xantrion with any…
Protect your sensitive data from a breach

The Latest Data Breach & Why It Keeps Happening

The growing value of information is increasing the incentive of hackers to obtain data from both individuals and organizations. These incidents include ransomware attacks in which the perpetrator encrypts the victim’s data or threatens to publish that data unless the victim pays a ransom. Another tactic is to simply sell the information, either to a specific party or the highest…

Introducing the Windows 365 Cloud PC

Read time: 90 seconds
Microsoft has rolled out Windows 365, which provides the Windows 10 and Windows 11 operating systems as a cloud service. Discover how these “Cloud PCs” are enabling employees to work wherever they want using just about any device. The COVID-19 pandemic has changed the way many companies operate. One notable development is an increase in the number of businesses adopting…

The Massive Costs of Ransomware Attacks

Read time: 90 seconds
Ransomware attacks have continued to increase in 2021, creating challenges for individuals and organizations throughout the world. Major victims of recent attacks include Apple, Colonial Pipeline and the Washington DC Metropolitan Police Department. Many individuals have also been victims of ransomware attacks, resulting in very high costs, both in the ransoms themselves and the disruption of services they cause. Ransomware…

Senate & House Using Bills to Combat Cyberattacks. Is it Working?

Read time: 90 seconds
The U.S. House of Representatives has recently passed multiple bills to support cybersecurity requirements for state and local governments as of July 2021. This legislation would also strengthen defenses of critical infrastructure and improve remediation measures for security measures. Analysts expect these bills to have far-reaching effects in the way managed detection and response (MDR), managed service providers (MSPs) and…

Secure Hybrid Environments Effectively

Read time: 45 seconds
Every day, BP manages the difficult business of finding, producing, marketing, and moving energy around the globe. Core to success is the modernization and digitization of the business, while being able to defend a vast digital perimeter against cyberattacks. This video shows how BP is migrating its work environment to Microsoft 365 Enterprise E5 to take advantage of a platform…

Navigate Data Protection and Risk in the Cloud Era

Microsoft invests in compliance and risk management to help your customers more easily protect and govern their data, address regulations and standards, and mitigate insider risks. This how-to guidance article announces new capabilities in Microsoft 365 that use machine learning and intelligence to help your customers address compliance and risk management in their organizations.  Digital transformation in the cloud era…

The Seven Pillars of Microsoft’s Advanced Threat Protection

Threat and vulnerability management is a game changer. It’s also the first of the seven pillars of security that define Microsoft Defender Advanced Threat Protection. In this video overview of those pillars, learn how ATP delivers preventative protection, post-breach detection, automated investigation, and response for enterprise networks.  When you’re ready to harness decades of security experience with Microsoft Advanced Threat…

Fortify your Data Against Threats

Maximize threat detection during attack stages with Microsoft’s comprehensive suite of security solutions. Unmatched volumes of data inform Microsoft security solutions. Check out this infographic to learn how you can harness decades of security experience with Microsoft Advanced Threat Protection. Have questions about Microsoft 365 products or features? If so, contact Xantrion, we’re here to help.

Security Beyond Microsoft Products

With Microsoft, security can be simple once again. Microsoft 365 provides an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch the video to learn more and contact Xantrion with any questions.

Why Invest in Integrated Threat Protection?

With data growing increasingly more valuable and harder to protect, digital security has become infinitely complex. Check out our infographic below to learn why an investment in Microsoft Threat Protection provides the built-in intelligence, automation, and integration to coordinate protection, detection, response, and prevention that organizations need to stay secure. Contact us to learn how Xantrion’s managed service offerings can…

Microsoft Threat Protection is a Best-In-Class, Intelligent Security Solution

Cyber-attackers will cross multiple domains like email, identity, endpoints, and applications to find the point of least resistance. Today’s defense solutions have been designed to protect, detect, and block threats for each domain separately, allowing attackers to exploit the seams and threshold differences between solutions—leaving the business vulnerable to attack. Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with…

New Bills on Capitol Hill After the Colonial Pipeline Attack

The recent ransomware attack against the Colonial Pipeline illustrates the need for a plan to protect the economy in the event of a major cyber-attack, according to members of the House’s Homeland Security Committee (HSC). The Colonial Pipeline shut down operations last week as a result of the attack, leaving 45 percent of the U.S. East Coast without its normal fuel supply.…

The U.S. Government’s Plan to Deter Cyberattacks

The Biden administration wants to help power plants and other electric utilities protect their networks from cyberattacks. The following is an overview of their plan. The new initiative was announced in April by the United States Department of Energy, and it includes a variety of milestones for owners and operators of environments like power plants. It makes recommendations for how…

Blog

MOST POPULAR

Phishing Deep Dive: Spear Phishing

Spear phishing and classic phishing are not one and the same. Discover how spear phishing emails differ from their classic counterparts and how to protect your company from spear phishing scams. Spear phishing and classic phishing email attacks are not one and the same. From a bird’s eye view, they look remarkably similar. That’s because in both types of scams,…
Outsourced cybersecurity for business

The Privacy Paradox: 5 Places we Give Up Privacy Online — and Don’t Know It

When we set good intentions — whether it’s in our careers or personal pursuits — there’s always the chance that we’ll fall short sometimes.   This is especially true in the instance of our online lives and how, despite our best intentions and sincerest concerns, we compromise our privacy online.   This is called the privacy paradox, meaning that we believe online privacy…

That Text Message You Received is Smishing

You may have been the victim of an SMS-based phishing, or smishing, attack if you’ve ever received a text message that claimed there was a problem with one of your accounts and asked you to click on a link to resolve the issue. Smishing is one of the easiest ways for hackers to steal your data because you’re literally giving…

FINRA Issues Updated Vendor Supervision Guidance, Seeks Feedback on Cloud Computing; Warns of New Phishing Scam

By The Bates Group, LLC FINRA remained busy through the end of Summer with several important regulatory actions. New actions included issuing updated guidance on supervision of third-party vendors, requesting feedback on a report by the Office of Financial Innovation (“OFI”) concerning broker-dealer approaches to cloud computing, and raising additional alarms about a phishing campaign using fraudulent FINRA email domains. The actions reinforce important compliance objectives as new…

Strategic, Reliable, and Secure. Learn more about our services.

Outsourced cybersecurity for business

T-Mobile Breach Exposed the Personal Data of 54 Million Customers

On August 15, 2021, the world first learned about the massive T-Mobile data breach. The disclosure came from a most unusual source — the hackers who pulled off the data heist. The cybercriminals told BleepingComputer that they hacked into T-Mobile’s production, staging, and development servers and stole the personal data of millions of T-Mobile customers. A day later, T-Mobile confirmed that its systems had…

Secure Digital Transformation with Microsoft

Read time: 45 seconds
Integrated security solutions from Microsoft provide comprehensive protection against cyberattacks. With Microsoft 365, you have an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch this video to learn more and contact Xantrion with any…
Protect your sensitive data from a breach

The Latest Data Breach & Why It Keeps Happening

The growing value of information is increasing the incentive of hackers to obtain data from both individuals and organizations. These incidents include ransomware attacks in which the perpetrator encrypts the victim’s data or threatens to publish that data unless the victim pays a ransom. Another tactic is to simply sell the information, either to a specific party or the highest…

Introducing the Windows 365 Cloud PC

Read time: 90 seconds
Microsoft has rolled out Windows 365, which provides the Windows 10 and Windows 11 operating systems as a cloud service. Discover how these “Cloud PCs” are enabling employees to work wherever they want using just about any device. The COVID-19 pandemic has changed the way many companies operate. One notable development is an increase in the number of businesses adopting…

The Massive Costs of Ransomware Attacks

Read time: 90 seconds
Ransomware attacks have continued to increase in 2021, creating challenges for individuals and organizations throughout the world. Major victims of recent attacks include Apple, Colonial Pipeline and the Washington DC Metropolitan Police Department. Many individuals have also been victims of ransomware attacks, resulting in very high costs, both in the ransoms themselves and the disruption of services they cause. Ransomware…

Senate & House Using Bills to Combat Cyberattacks. Is it Working?

Read time: 90 seconds
The U.S. House of Representatives has recently passed multiple bills to support cybersecurity requirements for state and local governments as of July 2021. This legislation would also strengthen defenses of critical infrastructure and improve remediation measures for security measures. Analysts expect these bills to have far-reaching effects in the way managed detection and response (MDR), managed service providers (MSPs) and…

Secure Hybrid Environments Effectively

Read time: 45 seconds
Every day, BP manages the difficult business of finding, producing, marketing, and moving energy around the globe. Core to success is the modernization and digitization of the business, while being able to defend a vast digital perimeter against cyberattacks. This video shows how BP is migrating its work environment to Microsoft 365 Enterprise E5 to take advantage of a platform…

Navigate Data Protection and Risk in the Cloud Era

Microsoft invests in compliance and risk management to help your customers more easily protect and govern their data, address regulations and standards, and mitigate insider risks. This how-to guidance article announces new capabilities in Microsoft 365 that use machine learning and intelligence to help your customers address compliance and risk management in their organizations.  Digital transformation in the cloud era…

The Seven Pillars of Microsoft’s Advanced Threat Protection

Threat and vulnerability management is a game changer. It’s also the first of the seven pillars of security that define Microsoft Defender Advanced Threat Protection. In this video overview of those pillars, learn how ATP delivers preventative protection, post-breach detection, automated investigation, and response for enterprise networks.  When you’re ready to harness decades of security experience with Microsoft Advanced Threat…

Fortify your Data Against Threats

Maximize threat detection during attack stages with Microsoft’s comprehensive suite of security solutions. Unmatched volumes of data inform Microsoft security solutions. Check out this infographic to learn how you can harness decades of security experience with Microsoft Advanced Threat Protection. Have questions about Microsoft 365 products or features? If so, contact Xantrion, we’re here to help.

Security Beyond Microsoft Products

With Microsoft, security can be simple once again. Microsoft 365 provides an intelligent security hub that works seamlessly across platforms, going far beyond Microsoft—to Linux and Mac, to AWS and beyond, so you can manage mission critical workloads with the right tools at your fingertips. Watch the video to learn more and contact Xantrion with any questions.

Why Invest in Integrated Threat Protection?

With data growing increasingly more valuable and harder to protect, digital security has become infinitely complex. Check out our infographic below to learn why an investment in Microsoft Threat Protection provides the built-in intelligence, automation, and integration to coordinate protection, detection, response, and prevention that organizations need to stay secure. Contact us to learn how Xantrion’s managed service offerings can…

Microsoft Threat Protection is a Best-In-Class, Intelligent Security Solution

Cyber-attackers will cross multiple domains like email, identity, endpoints, and applications to find the point of least resistance. Today’s defense solutions have been designed to protect, detect, and block threats for each domain separately, allowing attackers to exploit the seams and threshold differences between solutions—leaving the business vulnerable to attack. Microsoft Threat Protection stops attack sprawl and auto-heals enterprise assets with…

New Bills on Capitol Hill After the Colonial Pipeline Attack

The recent ransomware attack against the Colonial Pipeline illustrates the need for a plan to protect the economy in the event of a major cyber-attack, according to members of the House’s Homeland Security Committee (HSC). The Colonial Pipeline shut down operations last week as a result of the attack, leaving 45 percent of the U.S. East Coast without its normal fuel supply.…

The U.S. Government’s Plan to Deter Cyberattacks

The Biden administration wants to help power plants and other electric utilities protect their networks from cyberattacks. The following is an overview of their plan. The new initiative was announced in April by the United States Department of Energy, and it includes a variety of milestones for owners and operators of environments like power plants. It makes recommendations for how…
Menu