Tabletop Exercises: How These Practice Sessions Improve Your Incident Response Plan & Ready Your Team

Cyber attacks continue to pose a major concern for businesses and organizations worldwide. As ransomware attacks show no signs of slowing down, it’s likely that we’ll see more regulatory compliance actions in the future to protect consumer data. A common requirement is regular security assessments to monitor, test, and report on your company’s current cyber […]
Improve Your Security & Employee Experience with a VDI Monitoring Solution

Numerous industries continue to grapple with supply chain shortages and PC sales are facing significant delays. Shipping issues and semiconductor shortages are leading to back orders, sometimes for up to four months. As businesses and employees simply can’t operate without PCs, many businesses have turned to the bring your own device (BYOD) method. This allows […]
VMware News: End of General Support Dates to Take Note Of

Spring cleaning is upon us and that includes your IT environment. Now is the time to take account of your existing solutions, platforms, and networks, and get organized. In this blog, our Hybrid Infrastructure team got together to create a list of VMware software that will be reaching it’s end of support dates in 2022. […]
Dell Technologies World 2022 Recap: Securing, Managing & Harnessing Your Data

Dell Tech World 2022 kicked off last week. While virtual events were still offered, over 5,500 people attended in-person in Las Vegas for the first time since 2019. The event offered over 150 breakout sessions, hands-on labs that explored the latest technologies, interactive sessions with Dell’s leading technology experts, and more. Coming off of Dell’s […]
How to Take Your Cyber Security from Good to Great

Cyber security can be an unsatisfying experience. While there are certainly good, better, and best cyber security methods, there is no solution or practice that will be able to prevent all cyber attacks. At Arraya, we’ve found that our clients often look for reassurance or confirmation that they’re protected from the various cyber threats we […]
Expert Q&A: When Should You Move to SharePoint Online?

In this Expert Q&A, Chris Bovasso, Arraya’s Director, Application Services, and Mike Wishnefsky, Solutions Engineer, discuss when organizations should consider moving to SharePoint Online. In addition, they outline the top reasons to move SharePoint to the cloud, the benefits of doing so, and highlight what users can achieve through integrations and customizations with the online […]
Amid Increased Cyber Attacks, It’s Time to Harden Your Backups

Cyber attacks are a high priority for business owners in today’s climate. As a result, data protection is more important than ever. Backing up data is a fundamental part of a business continuity plan and has an enormous impact on a business’s ability to recover from a disaster, including a ransomware attack. However, the security […]
Arraya Insights Vodcast: A Candid Conversation with Fortinet's Global Field CISO

On this episode of the Arraya Insights Vodcast, Scott Brion, Arraya’s Cyber Security Director, welcomes special guest Jonathan Nguyen-Duy, Vice President and Global Field CISO at Fortinet. As a global security advisor and executive lead for strategy and analytics, Jonathan’s work at Fortinet is focused on strategy, data analytics and helping enterprises with digital transformation […]
How to Offer Employees Remote Flexibility Without Sacrificing Security Using Intune

2022 is shaping up to be an interesting time for both employers and employees as the remote world of work endures. We’re now over two years into the pandemic and many employees are still logging in from home, even as pandemic-related restrictions soften. While some employers appear eager to bring their people back into the […]
Penetration Testing: How to Make the Most of This Compliance Requirement

As we continue our deep dive into security assessments, we’re turning our attention to penetration tests. Many business owners, including some of our clients, understand that penetration tests are a common compliance requirement. However, they don’t always understand the specifics of these security assessments, when to conduct them, and how to get the most out […]