Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

Are you subject to the California Consumer Privacy Act (CCPA)?

Read time: 45 seconds
On January 1st, 2020 the California Consumer Privacy Act (CCPA) went into effect. This law helps consumers protect their personal information. Click here to discover if your company is affected by this law, and steps you can take to become compliant.

Things to Know when Applying to Tech Jobs

Read time: 20 seconds
2020 has arrived, and if the new year has got you thinking about transitioning to a new job, keep these 5 things in mind when applying to new positions.  If you are ready to make the leap, please check out our current openings.

January 28th is Data Privacy Day

Read time: 20 seconds
Join us on January 28 for the Data Privacy Day 2020 event live from LinkedIn! Experts will discuss the changes GDPR has had on the privacy landscape across the globe.  Register by clicking here.

SEC Announces 2020 Examination Priorities

Read time: 45 seconds
The SEC recently released their 2020 examination priorities. These are the areas the examination branch of the SEC (OCIE) will be focused on during exams this year. The SEC specifically calls out RIAs in this year’s priorities: “Specific to RIAs, OCIE will continue to focus its examinations on assessing RIAs’ protection of clients’ personal financial information. Particular focus areas will…

Disaster Recovery Takes Teamwork

Read time: 60 seconds
Preparing in advance for a disaster is the best way to make sure you get back to work promptly when one happens – and having a team focused on disaster recovery (DR) is the best way to minimize response time and damages. Some of the people you might want to have on your DR team are:   a team lead who supervises the…

IT Security is a Long-Term Investment

Read time: 60 seconds
According to Canon’s latest Office of the Future Survey, the same digital transformations that are making companies more productive, efficient, and innovative are also unearthing security vulnerabilities. For example, nearly half (46%) of survey respondents say they’re spending less than 5% of their IT budget on security. Only 25% have state-of-the-art disaster recovery procedures in place. An astonishing 40% have no security agenda…

Review Who Gets to See What

IT isn’t like a rock festival – you don’t want to give anyone an all-access pass. Complying with regulations like CCPA, HIPAA, PCI DSS, and Sarbanes-Oxley, requires you to control who can access what data and applications across your company. You also have to monitor, manage, and audit every single user account, from creation to termination, and keep a record…

Small Businesses Offer Big Career Opportunities

Read time: 45 seconds
At Xantrion, we’re partial to smaller companies. We specialize in meeting their IT outsourcing needs so they can focus on what they actually do best. We understand the small business environment – the streamlined decision-making process, the attention to work-life balance, the opportunity to build close relationships with colleagues, the ability to make a disproportionately big impact – and as…

How to Manage AutoPlay Clips in Microsoft Edge

Read time: 60 seconds
If you regularly use the Internet, you have probably encountered those annoying video clips that automatically start playing when you open certain web pages. Because these clips play without warning, they can startle you. Even worse, they can be disruptive, especially at work. If a clip grabs your attention, chances are you will end up watching it rather than working.…

It’s a New Era for Privacy Compliance

Read time: 50 seconds
As new data privacy regulations like the California Consumer Privacy Act (CCPA) roll out, organizations concerned about compliance are changing how they handle sensitive customer information. One interesting trend we’ve noted is that companies are creating committees to handle customer requests about their personal information, often including someone from the privacy office, someone from the security office, and someone from…

The iPhone 11 Is Here but Is It Worth the Upgrade?

Read time: 45 seconds
Apple has rolled out the new iPhone 11, but many iPhone users are wondering whether its enhancements are worth the cost of an upgrade. Click here to learn how the phone compares to its predecessor.

It’s Everyone’s Job to Ensure Online Safety at Work

Read time: 30 seconds
The lines between our work and daily lives are becoming increasingly blurred, and it is more important than ever to be certain that smart cybersecurity practices carry over between the two. When you are on the job – whether it’s at a corporate office, local restaurant, healthcare provider, academic institution or government agency – your organization’s online security is a…

Always on Privacy Basics

Read time: 30 seconds
Your mobile devices – including smartphones, laptops and wearables – are always within reach everywhere you go, and they share substantial information about you and your habits, such as your contacts, photos, videos, location, health and financial data. Follow these basic privacy tips to help you manage your privacy in an always-on world. To learn more about other ways to improve security,…

Prepare for the CCPA

Read time: 60 seconds
The California Consumer Privacy Act (CCPA), modeled in part on GDPR and passed in June 2018, is scheduled to come into effect in January 2020. Although some provisions are still being negotiated, it seems clear at this point that the CCPA will protect the personal data of people within a defined geographic area (in this case California) even when that…

Business App Upgrades to Consider for your 2020 IT Budget

Read time: 60 seconds
Running into unanticipated expenses can blow a business’s IT budget. For this reason, it helps to know about business apps that are reaching the end of their lifecycles. When apps reach this point, the software developers typically stop providing security updates. Running programs that do not receive security updates puts companies at greater risk of cyberattacks. Click here to learn which…

You Don’t Need a Degree to Succeed in IT

Read time: 20 seconds
Some of the biggest names in tech are no longer requiring job candidates to have degrees in computer science. Why? Because there are so many other ways now for people to learn technology skills. We couldn’t agree more with this article arguing that a four-year degree is no longer critical to breaking into a technology career, and that in fact…

Keep Tabs on Your Apps

Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved – gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of…

Never Click and Tell

Limit what information you post on social media – from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all criminals need to target you, your loved ones, and your physical belongings – online and in the physical world. Keep Social Security numbers, account numbers, and passwords private,…

Blog

MOST POPULAR

Are you subject to the California Consumer Privacy Act (CCPA)?

Read time: 45 seconds
On January 1st, 2020 the California Consumer Privacy Act (CCPA) went into effect. This law helps consumers protect their personal information. Click here to discover if your company is affected by this law, and steps you can take to become compliant.

Things to Know when Applying to Tech Jobs

Read time: 20 seconds
2020 has arrived, and if the new year has got you thinking about transitioning to a new job, keep these 5 things in mind when applying to new positions.  If you are ready to make the leap, please check out our current openings.

Strategic, Reliable, and Secure. Learn more about our services.

January 28th is Data Privacy Day

Read time: 20 seconds
Join us on January 28 for the Data Privacy Day 2020 event live from LinkedIn! Experts will discuss the changes GDPR has had on the privacy landscape across the globe.  Register by clicking here.

SEC Announces 2020 Examination Priorities

Read time: 45 seconds
The SEC recently released their 2020 examination priorities. These are the areas the examination branch of the SEC (OCIE) will be focused on during exams this year. The SEC specifically calls out RIAs in this year’s priorities: “Specific to RIAs, OCIE will continue to focus its examinations on assessing RIAs’ protection of clients’ personal financial information. Particular focus areas will…

Disaster Recovery Takes Teamwork

Read time: 60 seconds
Preparing in advance for a disaster is the best way to make sure you get back to work promptly when one happens – and having a team focused on disaster recovery (DR) is the best way to minimize response time and damages. Some of the people you might want to have on your DR team are:   a team lead who supervises the…

IT Security is a Long-Term Investment

Read time: 60 seconds
According to Canon’s latest Office of the Future Survey, the same digital transformations that are making companies more productive, efficient, and innovative are also unearthing security vulnerabilities. For example, nearly half (46%) of survey respondents say they’re spending less than 5% of their IT budget on security. Only 25% have state-of-the-art disaster recovery procedures in place. An astonishing 40% have no security agenda…

Review Who Gets to See What

IT isn’t like a rock festival – you don’t want to give anyone an all-access pass. Complying with regulations like CCPA, HIPAA, PCI DSS, and Sarbanes-Oxley, requires you to control who can access what data and applications across your company. You also have to monitor, manage, and audit every single user account, from creation to termination, and keep a record…

Small Businesses Offer Big Career Opportunities

Read time: 45 seconds
At Xantrion, we’re partial to smaller companies. We specialize in meeting their IT outsourcing needs so they can focus on what they actually do best. We understand the small business environment – the streamlined decision-making process, the attention to work-life balance, the opportunity to build close relationships with colleagues, the ability to make a disproportionately big impact – and as…

How to Manage AutoPlay Clips in Microsoft Edge

Read time: 60 seconds
If you regularly use the Internet, you have probably encountered those annoying video clips that automatically start playing when you open certain web pages. Because these clips play without warning, they can startle you. Even worse, they can be disruptive, especially at work. If a clip grabs your attention, chances are you will end up watching it rather than working.…

It’s a New Era for Privacy Compliance

Read time: 50 seconds
As new data privacy regulations like the California Consumer Privacy Act (CCPA) roll out, organizations concerned about compliance are changing how they handle sensitive customer information. One interesting trend we’ve noted is that companies are creating committees to handle customer requests about their personal information, often including someone from the privacy office, someone from the security office, and someone from…

The iPhone 11 Is Here but Is It Worth the Upgrade?

Read time: 45 seconds
Apple has rolled out the new iPhone 11, but many iPhone users are wondering whether its enhancements are worth the cost of an upgrade. Click here to learn how the phone compares to its predecessor.

It’s Everyone’s Job to Ensure Online Safety at Work

Read time: 30 seconds
The lines between our work and daily lives are becoming increasingly blurred, and it is more important than ever to be certain that smart cybersecurity practices carry over between the two. When you are on the job – whether it’s at a corporate office, local restaurant, healthcare provider, academic institution or government agency – your organization’s online security is a…

Always on Privacy Basics

Read time: 30 seconds
Your mobile devices – including smartphones, laptops and wearables – are always within reach everywhere you go, and they share substantial information about you and your habits, such as your contacts, photos, videos, location, health and financial data. Follow these basic privacy tips to help you manage your privacy in an always-on world. To learn more about other ways to improve security,…

Prepare for the CCPA

Read time: 60 seconds
The California Consumer Privacy Act (CCPA), modeled in part on GDPR and passed in June 2018, is scheduled to come into effect in January 2020. Although some provisions are still being negotiated, it seems clear at this point that the CCPA will protect the personal data of people within a defined geographic area (in this case California) even when that…

Business App Upgrades to Consider for your 2020 IT Budget

Read time: 60 seconds
Running into unanticipated expenses can blow a business’s IT budget. For this reason, it helps to know about business apps that are reaching the end of their lifecycles. When apps reach this point, the software developers typically stop providing security updates. Running programs that do not receive security updates puts companies at greater risk of cyberattacks. Click here to learn which…

You Don’t Need a Degree to Succeed in IT

Read time: 20 seconds
Some of the biggest names in tech are no longer requiring job candidates to have degrees in computer science. Why? Because there are so many other ways now for people to learn technology skills. We couldn’t agree more with this article arguing that a four-year degree is no longer critical to breaking into a technology career, and that in fact…

Keep Tabs on Your Apps

Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved – gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of…

Never Click and Tell

Limit what information you post on social media – from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all criminals need to target you, your loved ones, and your physical belongings – online and in the physical world. Keep Social Security numbers, account numbers, and passwords private,…
Menu