
Xiologix is Proud to Support Fastpitch Cares
For the third year in a row, Xiologix has supported the efforts of Fastpitch Cares to raise funds for Doernbecher Children’s Hospital. This year, Fastpitch Cares will be supporting the purchase of a Plate Reader for Doernbecher Children’s Hospital...5 Steps You Should Take To Protect Yourself After Massive Equifax Hack
With almost half of the US population affected by the Equifax hack, there’s a good chance your security has been compromised. Here’s five steps everyone should take to protect themselves from possible identity theft. Read More…Proactively Combat Security Breaches – Strive to Thrive Business Workshop and Expo
Proactively Combat Security Breaches September is National Preparedness Month, and in support of this national effort, the Tualatin Chamber of Commerce invites you to attend the 2nd Annual Strive to Thrive Business Workshop & Expo. This year’s theme, Turning...Xiologix – Your Local VMware Experts
Updated 10/30/2017 – Christopher Kusek earns VMware Cloud 2017! No matter where you are in your cloud journey, know that Xiologix is your local resource for superior VMware expertise and service. Holistic Approach – Xiologix looks at your business needs...Cybersecurity in an Internet Minute
The Internet of Things (IoT) and mobile devices have made life easier—and a little less secure. Yet the convenience of on-the-go computing and interconnectivity of devices comes at a cost; risk. According to a recent Symantec Internet Security Threat Report, there are...
How Does the C-Suite View Cybersecurity?
Traditionally all things technology have been exclusively limited to the IT department in most organizations. Due to the increased number of security breaches and the latest ransomware attacks, though, technology has brought cybersecurity front-of-mind for the...Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions
According to a report posted by the Office of the National Coordinator for Health Information Technology, 87 percent of office-based physicians had adopted some form of electronic health record (EHR) as of 2015. This is more than double the 42 percent that had done so...9-Point SMB Guide for Expanding into the Cloud
In a year, 80% of all IT budgets will be committed to cloud solutions. With the need to reduce IT costs while increasing flexibility and scalability, this shouldn’t come as a shock. The rise of hybrid clouds has served to increase this adoption. Organizations can now...
New Book Release – vSphere High Performance Cookbook
We are excited to announce the release of Kevin Elder and Christopher Kusek’s new book, vSphere High Performance Cookbook! Xiologix engineer, Kevin Elder, and Xiologix CTO, Christopher Kusek, have teamed up as author’s in their latest book: vSphere High...
The Dark Web – Dark Side of the Internet
We have heard of the Dark Web but what actually is it? What happens there? As this great graphic from CartwrightKing Solicitors explains, “The Dark Web is the hidden side of the internet. Although a public space, special access and software is required to reach...