Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

The Importance of DEI in Building a Prosperous 100 Person IT Services Company

By Anne Bisagno, President, Xantrion Inc. It was such an enormous pleasure to be interviewed by Sarah Tenisi, CEO of TenisiTech.  It was a rare opportunity for us both as there’s simply not a lot of woman-owned IT companies which highlights the point of our conversation- the importance of implementing a diversity, equity, and inclusion (DEI) program to further our…

How to Build a Strong Cloud Strategy

In this short clip, Xantrion CTO, Christian Kelly, discusses why it is good to have your IT service provider help evaluate the features as well as security and identity management capabilities of new Software-as-a-Service (SaaS) applications, to help you choose the right solutions and build a strong cloud-strategy foundation. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here…

The Benefits of a Cloud Only Model

In this short clip, Xantrion CTO, Christian Kelly, explains why Xantrion security services are cloud-based and the benefits this approach brings to the table. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here to help.

The Impact of Working from Home

In this short clip, Xantrion CTO, Christian Kelly, explains how companies that have successfully migrated to the cloud can feel confident in the security protecting the data and systems their remote team members are using. He’ll also share how cloud-based systems better position companies for future challenges. Don’t hesitate to contact us if you’d like to learn more about how we are…

How to Obtain a Strong Security Model

In this short clip, Xantrion CTO, Christian Kelly, explains how companies can obtain a strong security model when the basics are taken care of first. He’ll also share Xantrion’s approach to understanding each client’s unique security situation – identifying risks and prioritizing risk mitigation tactics. And if you’d like to dive into your company’s specific security posture, contact Xantrion, we’re here…

What are HIPAA Technical Safeguards?

According to the HIPAA Security Rule, technical safeguards are “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” Essentially, a covered entity must implement security measures that allow it to reasonably and appropriately maintain the necessary standards for protection. Moreover, a covered entity must determine which security measures and…

Stay Up-to-Date with HIPAA to Avoid Issues

The Department of Health and Human Services (HHS) has proactively updated those who fall under HIPAA coverage (aka, “covered entities”). Here’s what the HHS has to say about the increase in telehealth options:  “A covered health care provider that wants to use audio or video communication technology to provide telehealth to patients during the COVID-19 nationwide public health emergency can…

What is HIPAA Compliance?

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Covered entities (anyone providing treatment, payment, and operations in healthcare) and business associates (anyone who has access to patient…

What are Some Tips for Storage of Sensitive Data?

Loss or theft of sensitive data can lead to legal, compliance and business consequences. Be sure to take proper precautions to securely store that data.  Most organizations generate data that, if lost, could be detrimental to business operations, reputation, financial security or competitive position. This is generally considered sensitive data, and its mishandling can lead to business or legal repercussions. …

The American Data Privacy and Protection Act Stands to Improve Users’ Data Privacy

By Alexandra Kelley, Staff Correspondent, Nextgov    A team of bipartisan lawmakers unveiled new data privacy legislation that stands to finally implement a federal set of regulations to protect Americans’ online information.  Led by Reps. Frank Pallone, D-N.J., and Cathy McMorris Rodgers, R-Wash., as well as Sen. Roger Wicker, R-Miss., the bill, titled the American Data Privacy and Protection Act, has…

Are your Hybrid Teams Connecting and Collaborating Effectively?

Sustaining a hybrid workplace can be challenging. Employees need ongoing ways to connect, collaborate, and co-create with their colleagues and customers, which can be difficult when not everyone can gather in person. State-of-the-art technology solutions are available to help organizations overcome the challenges of a hybrid workplace to enable their employees to succeed in three specific ways: Inclusivity: Dissolve physical…

What is Risk Management and Why is it Important?

Risk management, the process of developing a strategy for addressing risk throughout its lifecycle, normally involves four phases: risk identification, assessment, response, and monitoring and reporting. Risk management plays a critical role in helping organizations with their security posture enhancement. Taking insider incidents as an example, they are not only costly to organizations but also time-consuming to be contained. Given…

Finance Firm Invests in Secure Remote Work with a Zero Trust Model

As a strategic partner for some of the world’s most sophisticated global institutional investors—such as central banks, sovereign wealth funds, pension funds, and foundations—Bridgewater Associates has long been a leader in the world of alternative asset management. The firm has achieved success through a tireless drive to understand macroeconomic trends in global economies and markets. Bridgewater uses this research to…

This World Password Day Consider Ditching Passwords Altogether

Did you know that May 5, 2022, was World Password Day? Created by cybersecurity professionals in 2013 and designated as the first Thursday every May, World Password Day is meant to foster good password habits that help keep our online lives secure. It might seem strange to have a day set aside to honor something almost no one wants to…

Multifactor Authentication FAQs

Multifactor authentication (MFA) is one of the best, yet often misunderstood tools that companies can use to fend off cybercriminals trying to compromise business accounts. It blocks 99.9% of account compromise attacks. It also helps thwart automated bot, phishing, and targeted attacks.  To jumpstart your learning curve, here are the answers to some frequently asked questions about MFA.  What is MFA? MFA is…

How Microsoft 365 can Help Complete your Zero Trust Security Model

Zero Trust is a newer security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to “never trust, always verify.” Watch this video to learn how Microsoft 365 Business Premium can help keep your company’s sensitive…

The Future of Compliance and Data Governance is Here

The worldwide shift to a hybrid workplace has pushed us all to embrace ubiquitous connectivity. Those new connections have helped us become more collaborative; routinely editing and sharing documents in real-time from wherever we happen to be working. Instant messaging went from being a tool of convenience to a cornerstone of communication. People in business, operations, and technical roles became…

Secure your Systems with Smart Solutions from Microsoft

Securing your systems with a data driven, human-guided security approach allows your business to detect and respond to attacks more quickly and accurately. Check out this latest infographic from Microsoft, it outlines how the global network of real-time threat intelligence continues to evolve, anticipate, and stay ahead of risks while delivering on four key security pillars that ensure enterprise-grade security. Have…

Blog

MOST POPULAR

Using Technology to Streamline Compliance 

Throughout 2022, threat actors will likely still view healthcare organizations as worthy targets — especially small and mid-sized providers and their associates. To minimize the risk of healthcare cyberattacks, organizations should look to pursue relevant audits and adhere to compliance standards, partner with organizations who can assist during incidents, and bolster internal resources via key hires or the development of…

Flexibility Defines the Future Workplace

The greatest challenge that leaders face in the new hybrid work reality is the loss of meaningful in-person connection.  Can Microsoft Teams provide the digital equivalent of the “hallway” conversation?  According to the Microsoft 2022 Work Trend Index, “Unscheduled, ad hoc calls have risen 8% in the past two years and now make up 64% of all Teams meetings. And…

The Importance of DEI in Building a Prosperous 100 Person IT Services Company

By Anne Bisagno, President, Xantrion Inc. It was such an enormous pleasure to be interviewed by Sarah Tenisi, CEO of TenisiTech.  It was a rare opportunity for us both as there’s simply not a lot of woman-owned IT companies which highlights the point of our conversation- the importance of implementing a diversity, equity, and inclusion (DEI) program to further our…

How to Build a Strong Cloud Strategy

In this short clip, Xantrion CTO, Christian Kelly, discusses why it is good to have your IT service provider help evaluate the features as well as security and identity management capabilities of new Software-as-a-Service (SaaS) applications, to help you choose the right solutions and build a strong cloud-strategy foundation. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here…

Strategic, Reliable, and Secure. Learn more about our services.

The Benefits of a Cloud Only Model

In this short clip, Xantrion CTO, Christian Kelly, explains why Xantrion security services are cloud-based and the benefits this approach brings to the table. And if you’d like to dive into your company’s specific security solutions, contact Xantrion, we’re here to help.

The Impact of Working from Home

In this short clip, Xantrion CTO, Christian Kelly, explains how companies that have successfully migrated to the cloud can feel confident in the security protecting the data and systems their remote team members are using. He’ll also share how cloud-based systems better position companies for future challenges. Don’t hesitate to contact us if you’d like to learn more about how we are…

How to Obtain a Strong Security Model

In this short clip, Xantrion CTO, Christian Kelly, explains how companies can obtain a strong security model when the basics are taken care of first. He’ll also share Xantrion’s approach to understanding each client’s unique security situation – identifying risks and prioritizing risk mitigation tactics. And if you’d like to dive into your company’s specific security posture, contact Xantrion, we’re here…

What are HIPAA Technical Safeguards?

According to the HIPAA Security Rule, technical safeguards are “the technology and the policy and procedures for its use that protect electronic protected health information and control access to it.” Essentially, a covered entity must implement security measures that allow it to reasonably and appropriately maintain the necessary standards for protection. Moreover, a covered entity must determine which security measures and…

Stay Up-to-Date with HIPAA to Avoid Issues

The Department of Health and Human Services (HHS) has proactively updated those who fall under HIPAA coverage (aka, “covered entities”). Here’s what the HHS has to say about the increase in telehealth options:  “A covered health care provider that wants to use audio or video communication technology to provide telehealth to patients during the COVID-19 nationwide public health emergency can…

What is HIPAA Compliance?

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA Compliance. Covered entities (anyone providing treatment, payment, and operations in healthcare) and business associates (anyone who has access to patient…

What are Some Tips for Storage of Sensitive Data?

Loss or theft of sensitive data can lead to legal, compliance and business consequences. Be sure to take proper precautions to securely store that data.  Most organizations generate data that, if lost, could be detrimental to business operations, reputation, financial security or competitive position. This is generally considered sensitive data, and its mishandling can lead to business or legal repercussions. …

The American Data Privacy and Protection Act Stands to Improve Users’ Data Privacy

By Alexandra Kelley, Staff Correspondent, Nextgov    A team of bipartisan lawmakers unveiled new data privacy legislation that stands to finally implement a federal set of regulations to protect Americans’ online information.  Led by Reps. Frank Pallone, D-N.J., and Cathy McMorris Rodgers, R-Wash., as well as Sen. Roger Wicker, R-Miss., the bill, titled the American Data Privacy and Protection Act, has…

Are your Hybrid Teams Connecting and Collaborating Effectively?

Sustaining a hybrid workplace can be challenging. Employees need ongoing ways to connect, collaborate, and co-create with their colleagues and customers, which can be difficult when not everyone can gather in person. State-of-the-art technology solutions are available to help organizations overcome the challenges of a hybrid workplace to enable their employees to succeed in three specific ways: Inclusivity: Dissolve physical…

What is Risk Management and Why is it Important?

Risk management, the process of developing a strategy for addressing risk throughout its lifecycle, normally involves four phases: risk identification, assessment, response, and monitoring and reporting. Risk management plays a critical role in helping organizations with their security posture enhancement. Taking insider incidents as an example, they are not only costly to organizations but also time-consuming to be contained. Given…

Finance Firm Invests in Secure Remote Work with a Zero Trust Model

As a strategic partner for some of the world’s most sophisticated global institutional investors—such as central banks, sovereign wealth funds, pension funds, and foundations—Bridgewater Associates has long been a leader in the world of alternative asset management. The firm has achieved success through a tireless drive to understand macroeconomic trends in global economies and markets. Bridgewater uses this research to…

This World Password Day Consider Ditching Passwords Altogether

Did you know that May 5, 2022, was World Password Day? Created by cybersecurity professionals in 2013 and designated as the first Thursday every May, World Password Day is meant to foster good password habits that help keep our online lives secure. It might seem strange to have a day set aside to honor something almost no one wants to…

Multifactor Authentication FAQs

Multifactor authentication (MFA) is one of the best, yet often misunderstood tools that companies can use to fend off cybercriminals trying to compromise business accounts. It blocks 99.9% of account compromise attacks. It also helps thwart automated bot, phishing, and targeted attacks.  To jumpstart your learning curve, here are the answers to some frequently asked questions about MFA.  What is MFA? MFA is…

How Microsoft 365 can Help Complete your Zero Trust Security Model

Zero Trust is a newer security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to “never trust, always verify.” Watch this video to learn how Microsoft 365 Business Premium can help keep your company’s sensitive…

The Future of Compliance and Data Governance is Here

The worldwide shift to a hybrid workplace has pushed us all to embrace ubiquitous connectivity. Those new connections have helped us become more collaborative; routinely editing and sharing documents in real-time from wherever we happen to be working. Instant messaging went from being a tool of convenience to a cornerstone of communication. People in business, operations, and technical roles became…

Secure your Systems with Smart Solutions from Microsoft

Securing your systems with a data driven, human-guided security approach allows your business to detect and respond to attacks more quickly and accurately. Check out this latest infographic from Microsoft, it outlines how the global network of real-time threat intelligence continues to evolve, anticipate, and stay ahead of risks while delivering on four key security pillars that ensure enterprise-grade security. Have…
Menu