Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

The iPhone 11 Is Here but Is It Worth the Upgrade?

Read time: 45 seconds
Apple has rolled out the new iPhone 11, but many iPhone users are wondering whether its enhancements are worth the cost of an upgrade. Click here to learn how the phone compares to its predecessor.

It’s Everyone’s Job to Ensure Online Safety at Work

Read time: 30 seconds
The lines between our work and daily lives are becoming increasingly blurred, and it is more important than ever to be certain that smart cybersecurity practices carry over between the two. When you are on the job – whether it’s at a corporate office, local restaurant, healthcare provider, academic institution or government agency – your organization’s online security is a…

Always on Privacy Basics

Read time: 30 seconds
Your mobile devices – including smartphones, laptops and wearables – are always within reach everywhere you go, and they share substantial information about you and your habits, such as your contacts, photos, videos, location, health and financial data. Follow these basic privacy tips to help you manage your privacy in an always-on world. To learn more about other ways to improve security,…

Prepare for the CCPA

Read time: 60 seconds
The California Consumer Privacy Act (CCPA), modeled in part on GDPR and passed in June 2018, is scheduled to come into effect in January 2020. Although some provisions are still being negotiated, it seems clear at this point that the CCPA will protect the personal data of people within a defined geographic area (in this case California) even when that…

Business App Upgrades to Consider for your 2020 IT Budget

Read time: 60 seconds
Running into unanticipated expenses can blow a business’s IT budget. For this reason, it helps to know about business apps that are reaching the end of their lifecycles. When apps reach this point, the software developers typically stop providing security updates. Running programs that do not receive security updates puts companies at greater risk of cyberattacks. Click here to learn which…

You Don’t Need a Degree to Succeed in IT

Read time: 20 seconds
Some of the biggest names in tech are no longer requiring job candidates to have degrees in computer science. Why? Because there are so many other ways now for people to learn technology skills. We couldn’t agree more with this article arguing that a four-year degree is no longer critical to breaking into a technology career, and that in fact…

Keep Tabs on Your Apps

Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved – gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of…

Never Click and Tell

Limit what information you post on social media – from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all criminals need to target you, your loved ones, and your physical belongings – online and in the physical world. Keep Social Security numbers, account numbers, and passwords private,…

Play Hard to get With Strangers

The 2019 Verizon Data Breach Investigations Report found that more than 90 percent of malware is distributed via email. Email remains a fairly well-known and popular exploit for cybercriminals because quite simply, it works. Cybercriminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from – even if the details appear accurate – or…

If you Connect, you Must Protect

Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software. For help with getting your company’s devices up-to-date and protected, contact us. To learn…

5 Tips for Staying Safe in the Public Cloud

By now, you’ve probably heard about the former Amazon system engineer who took advantage of a misconfigured firewall to steal 106 million Capital One credit card applications stored on AWS. It probably helped that the hacker had inside knowledge, but nonetheless, it was a kind of attack that’s of particular concern to companies using the public cloud. Some experts say…

Shake Up your Password Protocol

According to National Institute for Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cybercriminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for…

Manage your Privacy Settings

At the end of 2018, the number of devices connected to the internet reached 22 billion worldwide. That’s an incomprehensible inventory of PCs, wearables, smart TVs, connected cars, smartphones and mobile devices. That said, it is more critical than ever to better understand the connected devices and applications we use daily in order to help keep our personal information safe…

Double your Login Protection

Enable Multi-Factor Authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token. For help setting…

10 Common Cybersecurity Challenges in Healthcare

The digital transformation of the healthcare industry holds a lot of promise for improving the quality of care – as well as a lot of risk of exposing sensitive and highly regulated data. Given our experience with healthcare companies, we created an infographic about the top 10 security challenges in the healthcare industry and what to do about them. Download it…

IT Security is a Long-Term Investment

According to Canon’s latest Office of the Future Survey, the same digital transformations that are making companies more productive, efficient, and innovative are also unearthing security vulnerabilities. For example, nearly half (46%) of survey respondents say they’re spending less than 5% of their IT budget on security. Only 25% have state-of-the-art disaster recovery procedures in place. An astonishing 40% have…

Brush Up Your Customer Service Skills

A career in IT isn’t just about applications and infrastructure. At least half your work will involve listening to clients, understanding their problems, and addressing their issues, often when they’re frustrated, anxious, or angry. So if you want your career to thrive, you need to be able to defuse tense situations. At Xantrion, we’re always looking for employees whose customer…

First Breach of NY State Cybersecurity Regulations

Well, that didn’t take long. New York State implemented new cybersecurity regulations in March 2019. Two months later, on May 24, 2019, a real estate title insurance company called First American Financial Corporation announced that it had become aware of a massive security breach. The New York Department of Financial Services sent a letter to First American that same day…

Blog

MOST POPULAR

How to Manage AutoPlay Clips in Microsoft Edge

Read time: 60 seconds
If you regularly use the Internet, you have probably encountered those annoying video clips that automatically start playing when you open certain web pages. Because these clips play without warning, they can startle you. Even worse, they can be disruptive, especially at work. If a clip grabs your attention, chances are you will end up watching it rather than working.…

It’s a New Era for Privacy Compliance

Read time: 50 seconds
As new data privacy regulations like the California Consumer Privacy Act (CCPA) roll out, organizations concerned about compliance are changing how they handle sensitive customer information. One interesting trend we’ve noted is that companies are creating committees to handle customer requests about their personal information, often including someone from the privacy office, someone from the security office, and someone from…

The iPhone 11 Is Here but Is It Worth the Upgrade?

Read time: 45 seconds
Apple has rolled out the new iPhone 11, but many iPhone users are wondering whether its enhancements are worth the cost of an upgrade. Click here to learn how the phone compares to its predecessor.

It’s Everyone’s Job to Ensure Online Safety at Work

Read time: 30 seconds
The lines between our work and daily lives are becoming increasingly blurred, and it is more important than ever to be certain that smart cybersecurity practices carry over between the two. When you are on the job – whether it’s at a corporate office, local restaurant, healthcare provider, academic institution or government agency – your organization’s online security is a…

Strategic, Reliable, and Secure. Learn more about our services.

Always on Privacy Basics

Read time: 30 seconds
Your mobile devices – including smartphones, laptops and wearables – are always within reach everywhere you go, and they share substantial information about you and your habits, such as your contacts, photos, videos, location, health and financial data. Follow these basic privacy tips to help you manage your privacy in an always-on world. To learn more about other ways to improve security,…

Prepare for the CCPA

Read time: 60 seconds
The California Consumer Privacy Act (CCPA), modeled in part on GDPR and passed in June 2018, is scheduled to come into effect in January 2020. Although some provisions are still being negotiated, it seems clear at this point that the CCPA will protect the personal data of people within a defined geographic area (in this case California) even when that…

Business App Upgrades to Consider for your 2020 IT Budget

Read time: 60 seconds
Running into unanticipated expenses can blow a business’s IT budget. For this reason, it helps to know about business apps that are reaching the end of their lifecycles. When apps reach this point, the software developers typically stop providing security updates. Running programs that do not receive security updates puts companies at greater risk of cyberattacks. Click here to learn which…

You Don’t Need a Degree to Succeed in IT

Read time: 20 seconds
Some of the biggest names in tech are no longer requiring job candidates to have degrees in computer science. Why? Because there are so many other ways now for people to learn technology skills. We couldn’t agree more with this article arguing that a four-year degree is no longer critical to breaking into a technology career, and that in fact…

Keep Tabs on Your Apps

Most connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background or using default permissions you never realized you approved – gathering your personal information without your knowledge while also putting your identity and privacy at risk. Check your app permissions and use the “rule of…

Never Click and Tell

Limit what information you post on social media – from personal addresses to where you like to grab coffee. What many people don’t realize is that these seemingly random details are all criminals need to target you, your loved ones, and your physical belongings – online and in the physical world. Keep Social Security numbers, account numbers, and passwords private,…

Play Hard to get With Strangers

The 2019 Verizon Data Breach Investigations Report found that more than 90 percent of malware is distributed via email. Email remains a fairly well-known and popular exploit for cybercriminals because quite simply, it works. Cybercriminals use phishing tactics, hoping to fool their victims. If you’re unsure who an email is from – even if the details appear accurate – or…

If you Connect, you Must Protect

Whether it’s your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software. For help with getting your company’s devices up-to-date and protected, contact us. To learn…

5 Tips for Staying Safe in the Public Cloud

By now, you’ve probably heard about the former Amazon system engineer who took advantage of a misconfigured firewall to steal 106 million Capital One credit card applications stored on AWS. It probably helped that the hacker had inside knowledge, but nonetheless, it was a kind of attack that’s of particular concern to companies using the public cloud. Some experts say…

Shake Up your Password Protocol

According to National Institute for Standards and Technology (NIST) guidance, you should consider using the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cybercriminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for…

Manage your Privacy Settings

At the end of 2018, the number of devices connected to the internet reached 22 billion worldwide. That’s an incomprehensible inventory of PCs, wearables, smart TVs, connected cars, smartphones and mobile devices. That said, it is more critical than ever to better understand the connected devices and applications we use daily in order to help keep our personal information safe…

Double your Login Protection

Enable Multi-Factor Authentication (MFA) to ensure that the only person who has access to your account is you. Use it for email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, an authenticator app, or a secure token. For help setting…

10 Common Cybersecurity Challenges in Healthcare

The digital transformation of the healthcare industry holds a lot of promise for improving the quality of care – as well as a lot of risk of exposing sensitive and highly regulated data. Given our experience with healthcare companies, we created an infographic about the top 10 security challenges in the healthcare industry and what to do about them. Download it…

IT Security is a Long-Term Investment

According to Canon’s latest Office of the Future Survey, the same digital transformations that are making companies more productive, efficient, and innovative are also unearthing security vulnerabilities. For example, nearly half (46%) of survey respondents say they’re spending less than 5% of their IT budget on security. Only 25% have state-of-the-art disaster recovery procedures in place. An astonishing 40% have…

Brush Up Your Customer Service Skills

A career in IT isn’t just about applications and infrastructure. At least half your work will involve listening to clients, understanding their problems, and addressing their issues, often when they’re frustrated, anxious, or angry. So if you want your career to thrive, you need to be able to defuse tense situations. At Xantrion, we’re always looking for employees whose customer…

First Breach of NY State Cybersecurity Regulations

Well, that didn’t take long. New York State implemented new cybersecurity regulations in March 2019. Two months later, on May 24, 2019, a real estate title insurance company called First American Financial Corporation announced that it had become aware of a massive security breach. The New York Department of Financial Services sent a letter to First American that same day…
Menu