Why Hackers Hack

By | Security | No Comments


One does not need to look very hard for news of recent cyber attacks. As 2017 numbers come into focus, the problem is continuing to grow.  According to the ITRC Breach Report 2017 breaches increased at about 21% over 2016.   Most of the breaches fell into the Business sector followed by the medical/healthcare sector.  Some big names were involved such as Equifax,  Yahoo, Verizon and more. But notably, over 50% of cyber attacks are aimed at small -mid-sized business that don’t make the national headlines.

Check out the Real Time Threat Map to get a visual on current threat activity.

While the actual numbers are still be tallied, let’s take a look Raconteur’s infographic on what motives cyber attacks. Why do hackers hack? Who is behind the data breaches?

why hackers hack
Courtesy of: Visual Capitalist

Citrix Cloud – Never Upgrade Your Citrix Infrastructure Again

By | Cloud, Virtualization & Mobility | No Comments
citrix cloud

Citrix Cloud

If you’re still running XenApp v6.5, you know you need to develop a migration plan. XenApp v6.5 hits “End of Maintenance” – after which there will be no further code maintenance – at the end of calendar year 2017, and End of Life on June 30, 2018. So if you don’t have a migration plan in place, you don’t have a lot of time to develop one. Furthermore, if you’ve been tracking the evolution of the XenApp and XenDesktop products, you’ve probably noticed that new releases are coming more frequently these days as new and enhanced functionality is added to the products. That’s both good news and bad news: good news because the products are getting better and better, bad news because upgrading your Citrix infrastructure can involve a significant work effort. It is not unusual for a XenApp or XenDesktop infrastructure upgrade to take 100 to 120 hours of work effort on the part of your own IT team, if you have the skill set in-house to do it, or on the part of your Citrix consulting partner if you don’t. Read More

Three Questions to Ask about Identity Management

By | Security, SIEM | No Comments

Identity ManagementSome years ago, we knew RSA as the company that made those key fob tokens for dual-factor authentication. Indeed, they were pioneers in the multi-factor authentication space, and to my knowledge, no one has ever found a way to successfully beat their SecurID token-based authentication. But RSA is so much more than that these days. Even the venerable SecurID product has grown into a powerful and flexible Identity Management solution.

Unfortunately, “powerful and flexible” can sometimes translate into “I’m not sure where to start with this.” So here are three questions that may help you get on the right track: Read More

Cylance Just May Be the Tool You’ve Been Waiting For

By | Security | No Comments

The cyberwar over who will control your PC and the data on it has been dragging on for literally decades, with no end in sight. Malware is big business. It isn’t about just wreaking havoc for the heck of it anymore – it’s about monetization: incorporating your system into a botnet that can then be rented out on the Dark Web, stealing your identity and sensitive financial information, or encrypting your data and holding it for ransom. This latter version, so-called “ransomware,” rakes in tens of millions of dollars annually from its victims, and, as we’ve stated previously, has proven to be one of the most challenging forms of malware to protect against. Read More

Veeam and Cloud Replication

Veeam and Cloud Replication – Better Together

By | Backup, Disaster Recovery | No Comments
Sid Herron

Sid Herron

Veeam and Cloud Replication

If you’re using Veeam to back up your virtualized server environment, congratulations! You’re using one of the best products on the market for enabling the “always on” enterprise. But what are you doing for disaster recovery? Do you have an automated process for getting a copy of your most critical data out of the building, and a way to run critical applications somewhere else if your data center is destroyed or rendered inoperable by fire, flood, or other disaster? Read More


Two Xiologix employees are now also on the CERT Team!

By | Xiologix in the Community | No Comments

CERT MembersXiologix is proud to announce that two of our employees recently completed the Tualatin CERT Training Program. Account Executive Cathy Wurgler and Marketing Manager Dawn Woodward both dedicated over 24 hours as part of the nine week training program designed to help our neighborhoods and workplaces when professional responders are not immediately available to help.  The Community Emergency Response Team (CERT) program is a way for people from all walks of life to learn valuable basic skills used during disaster response. Some of the skills include things such as fire safety, light search and rescue, team organization, and disaster medical operations. This is just another example of how Xiologix employees care.   Cathy and Dawn spent four hours out in the driving rain to complete their final this past Saturday out at TVF&R. They put out fires, cribbed and did search and rescue training. Read More

3 PCI Security Essentials to Beef-up Payment Card Security Defenses

By | Security | No Comments

3 PCI Security EssentialsNo matter your business—whether you’re a startup or enterprise business—if you collect customers financial data, you have a responsibility to safeguard this information.

Verizon recently released its 2017 Payment Card Security Report, which unfortunately shows that too many businesses are not set up to sufficiently ensure the security of payment card data on an ongoing basis.

There were some bright spots in the report. Verizon found that last year, just over 55 percent had full compliance with the Payment Card Industry Data Security Standard (PCI DSS). That’s an all-time high, but work still needs to be done. The report also found that within a year, almost half had fallen out of compliance.

Compliance is undeniably important. Out of the 300 payment card data breaches, Verizon found between 2010 and 2016; none were fully compliant with PCI DSS. But compliance only tells part of the story. Read More

National Health IT Week – 2017

By | Security | No Comments
NHITWeekXiologix is a Proud Partner in National Health IT Week
This October, Xiologix — as a partner in the advancement of health information technology to help improve healthcare —is a Proud Partner in National Health IT Week.  NHITWeek is an awareness week offering all healthcare stakeholders an opportunity to unite under one banner, expressing the benefits that health information technology (IT) brings to U.S. healthcare. “The Value of Health IT.” Read More

5 Reasons Retail Analytics is a Win for Buyers and Sellers

By | Security | No Comments

Retail AnalyticsRetailers are closing their doors at an alarming rate. Competition is fierce, and not all will survive.

Does this mean retail is dead?  Of course, not.

Consumers haven’t stopped buying things—they’ve just changed how they make purchases. Today, people aren’t limited to nearby stores. They can hop online to compare prices or look for a more appealing shopping experience.

By harnessing the power of retail analytics, both retailers and consumers will see benefits—a more pleasing experience for shoppers and pumped up sales for retailers.

Read More

Call Now Button