Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

The Increasing Challenges of Cloud Security

Cloud-based threats and risks continue to evolve as attackers focus on the growing footprint of vulnerabilities and attack surfaces across the cloud landscape. Cybersecurity threats today are also increasingly sophisticated – and are intensified by the complexity of hybrid and multi-cloud environments. Integrated protection for your multi-cloud resources, apps, and data is more important than ever. If you would like…

Using Technology to Streamline Compliance 

Throughout 2022, threat actors will likely still view healthcare organizations as worthy targets — especially small and mid-sized providers and their associates. To minimize the risk of healthcare cyberattacks, organizations should look to pursue relevant audits and adhere to compliance standards, partner with organizations who can assist during incidents, and bolster internal resources via key hires or the development of…

Flexibility Defines the Future Workplace

The greatest challenge that leaders face in the new hybrid work reality is the loss of meaningful in-person connection.  Can Microsoft Teams provide the digital equivalent of the “hallway” conversation?  According to the Microsoft 2022 Work Trend Index, “Unscheduled, ad hoc calls have risen 8% in the past two years and now make up 64% of all Teams meetings. And…

The Importance of DEI in Building a Prosperous 100 Person IT Services Company

By Anne Bisagno, President, Xantrion Inc. It was such an enormous pleasure to be interviewed by Sarah Tenisi, CEO of TenisiTech.  It was a rare opportunity for us both as there’s simply not a lot of woman-owned IT companies which highlights the point of our conversation- the importance of implementing a diversity, equity, and inclusion (DEI) program to further our…

How to Build a Strong Cloud Strategy

In this short clip, Xantrion CTO, Christian Kelly, discusses why it is good to have your IT service provider help evaluate the features as well as security and identity management capabilities of new Software-as-a-Service (SaaS) applications, to help you choose the right solutions and build a strong cloud-strategy foundation. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here…

The Benefits of a Cloud Only Model

In this short clip, Xantrion CTO, Christian Kelly, explains why Xantrion security services are cloud-based and the benefits this approach brings to the table. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here to help.

The Impact of Working from Home

In this short clip, Xantrion CTO, Christian Kelly, explains how companies that have successfully migrated to the cloud can feel confident in the security protecting the data and systems their remote team members are using. He’ll also share how cloud-based systems better position companies for future challenges. Don’t hesitate to contact us if you’d like to learn more about how we are…

How to Obtain a Strong Security Model

In this short clip, Xantrion CTO, Christian Kelly, explains how companies can obtain a strong security model when the basics are taken care of first. He’ll also share Xantrion’s approach to understanding each client’s unique security situation – identifying risks and prioritizing risk mitigation tactics. And if you’d like to dive into your company’s specific security posture, contact Xantrion, we’re here…

What are HIPAA Technical Safeguards?

According to the HIPAA Security Rule, technical safeguards are “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” Essentially, a covered entity must implement security measures that allow it to reasonably and appropriately maintain the necessary standards for protection. Moreover, a covered entity must determine which security measures and…

Stay Up-to-Date with HIPAA to Avoid Issues

The Department of Health and Human Services (HHS) has proactively updated those who fall under HIPAA coverage (aka, “covered entities”). Here’s what the HHS has to say about the increase in telehealth options:  “A covered health care provider that wants to use audio or video communication technology to provide telehealth to patients during the COVID-19 nationwide public health emergency can…

What is HIPAA Compliance?

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Covered entities (anyone providing treatment, payment, and operations in healthcare) and business associates (anyone who has access to patient…

What are Some Tips for Storage of Sensitive Data?

Loss or theft of sensitive data can lead to legal, compliance and business consequences. Be sure to take proper precautions to securely store that data.  Most organizations generate data that, if lost, could be detrimental to business operations, reputation, financial security or competitive position. This is generally considered sensitive data, and its mishandling can lead to business or legal repercussions. …

The American Data Privacy and Protection Act Stands to Improve Users’ Data Privacy

By Alexandra Kelley, Staff Correspondent, Nextgov    A team of bipartisan lawmakers unveiled new data privacy legislation that stands to finally implement a federal set of regulations to protect Americans’ online information.  Led by Reps. Frank Pallone, D-N.J., and Cathy McMorris Rodgers, R-Wash., as well as Sen. Roger Wicker, R-Miss., the bill, titled the American Data Privacy and Protection Act, has…

Are your Hybrid Teams Connecting and Collaborating Effectively?

Sustaining a hybrid workplace can be challenging. Employees need ongoing ways to connect, collaborate, and co-create with their colleagues and customers, which can be difficult when not everyone can gather in person. State-of-the-art technology solutions are available to help organizations overcome the challenges of a hybrid workplace to enable their employees to succeed in three specific ways: Inclusivity: Dissolve physical…

What is Risk Management and Why is it Important?

Risk management, the process of developing a strategy for addressing risk throughout its lifecycle, normally involves four phases: risk identification, assessment, response, and monitoring and reporting. Risk management plays a critical role in helping organizations with their security posture enhancement. Taking insider incidents as an example, they are not only costly to organizations but also time-consuming to be contained. Given…

Finance Firm Invests in Secure Remote Work with a Zero Trust Model

As a strategic partner for some of the world’s most sophisticated global institutional investors—such as central banks, sovereign wealth funds, pension funds, and foundations—Bridgewater Associates has long been a leader in the world of alternative asset management. The firm has achieved success through a tireless drive to understand macroeconomic trends in global economies and markets. Bridgewater uses this research to…

This World Password Day Consider Ditching Passwords Altogether

Did you know that May 5, 2022, was World Password Day? Created by cybersecurity professionals in 2013 and designated as the first Thursday every May, World Password Day is meant to foster good password habits that help keep our online lives secure. It might seem strange to have a day set aside to honor something almost no one wants to…

Multifactor Authentication FAQs

Multifactor authentication (MFA) is one of the best, yet often misunderstood tools that companies can use to fend off cybercriminals trying to compromise business accounts. It blocks 99.9% of account compromise attacks. It also helps thwart automated bot, phishing, and targeted attacks.  To jumpstart your learning curve, here are the answers to some frequently asked questions about MFA.  What is MFA? MFA is…

Blog

MOST POPULAR

Investment Management Firm Uses Vulnerability Monitoring to Strengthen Security

With 180 clients and $800 million under management, this San Francisco Bay Area investment management firm was acutely aware that hackers considered it an appealing target, because the number of cyberattacks on employees and clients began ticking upwards. Learn how they took control of this challenge as well as kept pace with evolving regulatory requirements.

The Four Phases of a Ransomware Attack

Understanding ransomware – its evolution, its phases, and the economic engine behind it – and then learning how to stop it are crucial to keeping your business safe from bad actors. Learn about the criminal players of the underground ransomware economy and the motivations and mechanics of ransomware attacks with this detailed infographic. Even more important, learn the best practices…

The Increasing Challenges of Cloud Security

Cloud-based threats and risks continue to evolve as attackers focus on the growing footprint of vulnerabilities and attack surfaces across the cloud landscape. Cybersecurity threats today are also increasingly sophisticated – and are intensified by the complexity of hybrid and multi-cloud environments. Integrated protection for your multi-cloud resources, apps, and data is more important than ever. If you would like…

Using Technology to Streamline Compliance 

Throughout 2022, threat actors will likely still view healthcare organizations as worthy targets — especially small and mid-sized providers and their associates. To minimize the risk of healthcare cyberattacks, organizations should look to pursue relevant audits and adhere to compliance standards, partner with organizations who can assist during incidents, and bolster internal resources via key hires or the development of…

Strategic, Reliable, and Secure. Learn more about our services.

Flexibility Defines the Future Workplace

The greatest challenge that leaders face in the new hybrid work reality is the loss of meaningful in-person connection.  Can Microsoft Teams provide the digital equivalent of the “hallway” conversation?  According to the Microsoft 2022 Work Trend Index, “Unscheduled, ad hoc calls have risen 8% in the past two years and now make up 64% of all Teams meetings. And…

The Importance of DEI in Building a Prosperous 100 Person IT Services Company

By Anne Bisagno, President, Xantrion Inc. It was such an enormous pleasure to be interviewed by Sarah Tenisi, CEO of TenisiTech.  It was a rare opportunity for us both as there’s simply not a lot of woman-owned IT companies which highlights the point of our conversation- the importance of implementing a diversity, equity, and inclusion (DEI) program to further our…

How to Build a Strong Cloud Strategy

In this short clip, Xantrion CTO, Christian Kelly, discusses why it is good to have your IT service provider help evaluate the features as well as security and identity management capabilities of new Software-as-a-Service (SaaS) applications, to help you choose the right solutions and build a strong cloud-strategy foundation. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here…

The Benefits of a Cloud Only Model

In this short clip, Xantrion CTO, Christian Kelly, explains why Xantrion security services are cloud-based and the benefits this approach brings to the table. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here to help.

The Impact of Working from Home

In this short clip, Xantrion CTO, Christian Kelly, explains how companies that have successfully migrated to the cloud can feel confident in the security protecting the data and systems their remote team members are using. He’ll also share how cloud-based systems better position companies for future challenges. Don’t hesitate to contact us if you’d like to learn more about how we are…

How to Obtain a Strong Security Model

In this short clip, Xantrion CTO, Christian Kelly, explains how companies can obtain a strong security model when the basics are taken care of first. He’ll also share Xantrion’s approach to understanding each client’s unique security situation – identifying risks and prioritizing risk mitigation tactics. And if you’d like to dive into your company’s specific security posture, contact Xantrion, we’re here…

What are HIPAA Technical Safeguards?

According to the HIPAA Security Rule, technical safeguards are “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” Essentially, a covered entity must implement security measures that allow it to reasonably and appropriately maintain the necessary standards for protection. Moreover, a covered entity must determine which security measures and…

Stay Up-to-Date with HIPAA to Avoid Issues

The Department of Health and Human Services (HHS) has proactively updated those who fall under HIPAA coverage (aka, “covered entities”). Here’s what the HHS has to say about the increase in telehealth options:  “A covered health care provider that wants to use audio or video communication technology to provide telehealth to patients during the COVID-19 nationwide public health emergency can…

What is HIPAA Compliance?

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Covered entities (anyone providing treatment, payment, and operations in healthcare) and business associates (anyone who has access to patient…

What are Some Tips for Storage of Sensitive Data?

Loss or theft of sensitive data can lead to legal, compliance and business consequences. Be sure to take proper precautions to securely store that data.  Most organizations generate data that, if lost, could be detrimental to business operations, reputation, financial security or competitive position. This is generally considered sensitive data, and its mishandling can lead to business or legal repercussions. …

The American Data Privacy and Protection Act Stands to Improve Users’ Data Privacy

By Alexandra Kelley, Staff Correspondent, Nextgov    A team of bipartisan lawmakers unveiled new data privacy legislation that stands to finally implement a federal set of regulations to protect Americans’ online information.  Led by Reps. Frank Pallone, D-N.J., and Cathy McMorris Rodgers, R-Wash., as well as Sen. Roger Wicker, R-Miss., the bill, titled the American Data Privacy and Protection Act, has…

Are your Hybrid Teams Connecting and Collaborating Effectively?

Sustaining a hybrid workplace can be challenging. Employees need ongoing ways to connect, collaborate, and co-create with their colleagues and customers, which can be difficult when not everyone can gather in person. State-of-the-art technology solutions are available to help organizations overcome the challenges of a hybrid workplace to enable their employees to succeed in three specific ways: Inclusivity: Dissolve physical…

What is Risk Management and Why is it Important?

Risk management, the process of developing a strategy for addressing risk throughout its lifecycle, normally involves four phases: risk identification, assessment, response, and monitoring and reporting. Risk management plays a critical role in helping organizations with their security posture enhancement. Taking insider incidents as an example, they are not only costly to organizations but also time-consuming to be contained. Given…

Finance Firm Invests in Secure Remote Work with a Zero Trust Model

As a strategic partner for some of the world’s most sophisticated global institutional investors—such as central banks, sovereign wealth funds, pension funds, and foundations—Bridgewater Associates has long been a leader in the world of alternative asset management. The firm has achieved success through a tireless drive to understand macroeconomic trends in global economies and markets. Bridgewater uses this research to…

This World Password Day Consider Ditching Passwords Altogether

Did you know that May 5, 2022, was World Password Day? Created by cybersecurity professionals in 2013 and designated as the first Thursday every May, World Password Day is meant to foster good password habits that help keep our online lives secure. It might seem strange to have a day set aside to honor something almost no one wants to…

Multifactor Authentication FAQs

Multifactor authentication (MFA) is one of the best, yet often misunderstood tools that companies can use to fend off cybercriminals trying to compromise business accounts. It blocks 99.9% of account compromise attacks. It also helps thwart automated bot, phishing, and targeted attacks.  To jumpstart your learning curve, here are the answers to some frequently asked questions about MFA.  What is MFA? MFA is…
Menu