• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Cyber Security Month Recap

October has come and gone and with it so has another National Cyber Security Awareness Month. The month-long celebration sponsored by the US Department of Homeland Security, in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center was designed to bring digital security issues to the forefront.

Throughout the month, Arraya posted a series of tips and news stories which IT leaders could use as a way to kick start a conversation with end users and their teams about security best practices which can sometimes be overlooked.

Arraya’s first post in the series covered how employees can stay safe while using email. It included four steps employees should and shouldn’t take if they encounter an email they didn’t request or that seems a little fishy, including not interacting with it and using another point of contact to confirm the legitimacy of the email. That way they won’t put the company’s data in harm’s way by falling into a phisher’s trap.

Next, Arraya touched on the topic of password security. This post came in the wake of an alleged hack on file-sharing service Dropbox, which allowed attackers to get their hands on user log-in info. It turned out Dropbox hadn’t been hacked and that the log-in info had been obtained during attacks on other services. The hackers responsible were simply trying out the info on multiple sites, including Dropbox, to see if any users had broken the cardinal rule of password security: never use the same password more than once. Arraya also included five other top password tips, including using varying patterns and keeping them random.

From there, we shared some insight on the recently-announced SSL 3.0 encryption software vulnerability known as “Poodle.” This could give hackers access to and the ability to decrypt small data files known as cookies. Once they have that info, hackers can then use it to take control of a person’s accounts. The good news was, this vulnerability wasn’t a huge threat as SSL 3.0 is pretty much obsolete at this point. However, it was still recommended that IT leaders lock SSL 3.0 out of their network and move users towards more modern encryption techniques.

The cost of containing and resolving a cyber-attack was also explored in the series. According to research done by Ponemon Institute, it takes companies an average of 31 days to contain a cyber-attack, costing them $639,462 in the process. That comes out to $20,758 per day on containment and resolution. That’s an increase of 23% from last year’s total. To avoid those costs and to combat system downtime, Arraya recommended its Manage 365+ product. This managed infrastructure product provides round-the-clock, 24/7 monitoring for supported devices, ensuring health, availability and performance. In addition, users can decrease IT costs and increase efficiency by automating lower level parts of the job, allowing IT staffers to focus on what matters most to companies.   

The last post in the series covered enterprise mobility management suites. As the divide between “work computer” and “personal computer” gets harder to spot, adding an enterprise mobility management suite could be just the thing to help balance employees’ desire to work on the go with IT’s responsibility to ensure security. In this post, Arraya ran down some of the ways to build an airtight sales pitch for making the change.

Want to see just how successful your Cyber Security Month efforts were and where things stand at your company now? Contact your Arraya Account Executive or click here to set-up a free security architecture consultation.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}