• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

White Paper: What’s Working (& What Isn’t) in Cybersecurity

National Cybersecurity Awareness Month, or as it’s also known, October, is typically a big deal here at Arraya. Sure, cybersecurity has really come to dominate the technology conversation year-chess-and-target-concept_fk1biswdround, however, there’s nothing wrong with giving it a little extra attention for 31 days. All month long, we’ve posted stories on our blog and on social media about topics we believe can further the overall cybersecurity conversation. As the National Cybersecurity Awareness Month festivities come to a close, we do have one last trick up our sleeve.

Today, we’re proud to release our 2016 Cybersecurity Tactics Snapshot. This white paper is the first of its kind from Arraya Solutions. It has its roots in the idea that one of the most effective ways to defend against cybercrime is to learn from the experiences of others. With that in mind, we put together a survey we hoped would shed some light on what works and what doesn’t when it comes to security for businesses.

We distributed this survey to attendees of our 2016 Tech Summit back in June. This day-long educational event brought together IT professionals from a wide sampling of different industries, including healthcare, manufacturing, higher education, and more. The diverse group of industries was appealing. So too was the idea of, in many cases, hearing from the folks positioned directly on the frontlines of their organization’s cybersecurity efforts.

Once we had our data, we began sorting through it to see what it told us about the state of cybersecurity. We crunched the numbers, analyzed the deeper meanings, and, when we were finished, we had a document we believe can prove very beneficial in today’s IT climate.

Some of the more interesting tidbits we uncovered are:

  • How confident organizations are overall in their ability to withstand a cybersecurity attack
  • How often organizations should review their cybersecurity policies in order to feel highly confident in their ability to bounce back following a security incident
  • The frequency in which organizations should review their cybersecurity policies with end users in order to feel highly confident in their ability to recovery quickly from a security incident
  • The effect that a data breach can have on a business’ cybersecurity strategy once the dust has settled
  • The percentage of organizations who say they have suffered a data breach or incident in the past 12 months – and the severity of that incident

Keeping cybersecurity goals top of mind

One of the main takeaways from our 2016 Cybersecurity Tactics Snapshot? A best-of-breed approach to cybersecurity doesn’t solely refer to deploying the latest and greatest technology solutions – although that is certainly part of it. That same energy must be applied to developing and adhering to internal policies, which keep cybersecurity top of mind for all facets of the business.

As we mentioned above, National Cybersecurity Awareness Month may be over, but that doesn’t mean the conversation has to end. Be sure to check out our full 2016 Cybersecurity Tactics Snapshot. Then, start a dialogue with our security team by visiting: www.arrayasolutions.com/contact-us. Our engineers are well-versed in helping organizations assess their existing cybersecurity environment, spotting weaknesses, and architecting solutions capable of going toe-to-toe with the methods favored by modern cybercriminals, including ransomware and malware.

Arraya – and our team – can also be reached through social media: Twitter, LinkedIn, and Facebook. Stop by, send us a message, and follow us to keep up with all of our latest blogs, special events, and industry insights.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}