|
Blog

Looking at the How and Why of Windows 10 Migrations

Arraya Insights Arraya Insights| August 10, 2017

Drama-free has been a good way to describe the list of the world’s most used operating systems over the last several years. The most recent figures have Windows 7 comfortably in the top spot with just over 49% of the desktop market, according to research conducted by NetMarketShare. This is a position Windows 7 has […]

Read More >

5 Takeaways from Arraya's 2017 Service Desk Strategy Report

Arraya Insights Arraya Insights| August 8, 2017

Earlier this summer, Arraya Solutions held our 3rd Annual Tech Summit. The motivation behind this event, as it is every year, is to introduce attendees to the latest IT solutions as well as strategies they can use to get more from their preexisting environments. While this year’s Tech Summit has come and gone, the learning […]

Read More >

Victim No More: Put Your Data Out of Ransomware’s Reach

Arraya Insights Arraya Insights| July 31, 2017

Now that the dust has settled on Petya (NotPetya, etc.), businesses and countries are attempting to come to terms with the malware outbreak, which began in Ukraine before spreading to an estimated 65 countries globally. Petya was initially believed to be a ransomware campaign similar to WannaCry. However, security experts later came to see Petya […]

Read More >

What the Feds' Healthcare Security Moves Mean For the Rest of Us

Tom Clerici Tom Clerici| July 21, 2017

The healthcare industry is under cyber assault.  Few industries have been impacted by recent security incidents quite like healthcare companies.  In May, WannaCry shut down emergency rooms and other medical services for 16 National Health System facilities in the U.K.  Last month, the drug manufacturer Merck experienced a ransomware attack that affected all of their offices […]

Read More >

10 Ways You May Not Be Using Log Analytics (But Should Be)

Arraya Insights Arraya Insights| July 19, 2017

Not seeing a problem isn’t the same as not having a problem. Hackers and bad actors have gotten very good at carrying out their crimes without arousing suspicion. As such, malicious activity can go on for months or even longer without drawing attention to itself. By the time someone does notice – or the attackers […]

Read More >

Microsoft Inspire Recap: Inspiring the Future of IT

Matthew Sekol Matthew Sekol| July 14, 2017

Over the past few years, Microsoft has been touting the features and capabilities of Office 365, Azure, Windows 10 and Enterprise Mobility + Security. Each product has transformed how businesses operate and has contributed to collaboration, security, and innovation. At Microsoft Inspire 2017, the annual Microsoft partner conference, the messaging was clear. While businesses need […]

Read More >

Shining a Light on Shadow IT and Taking Back Control of the Cloud

Michael Pocock Michael Pocock| July 11, 2017

In the beginning there was the firewall . . . Several years back, organizations did not even think about users signing up for their own applications. This is because each application required access to resources that were beyond their control. Storage, compute, and network configurations were all IT’s domain and so IT needed to be […]

Read More >

Cisco Live 2017: Everything Your Business Needs to Know

Dan Clarke Dan Clarke| July 7, 2017

The evolution of networking is all about the DNA. Cisco Live, the company’s yearly tech summer camp, wrapped up last Thursday amidst the sweltering summer heat of Las Vegas. Cisco used this opportunity to showcase the evolution of the security, scale, and simplicity inherent to the next generation network. The key platform launched last week […]

Read More >

North Korea, Russia and Their Effect on Your Cyber Security

Arraya Insights Arraya Insights| July 5, 2017

Names like “Sandworm” and “Hidden Cobra” may sound as though they were pulled from the pages of an epic sci-fi novel, however, the threats they pose are very real. These fantastical monikers actually refer to a pair of shadowy – and allegedly state-sponsored – global cybercrime initiatives. Upon closer inspection, the tactics and endgames employed […]

Read More >

Petya, WannaCry Defense Should Be Easy – Here’s Why

Tom Clerici Tom Clerici| June 29, 2017

The dust hasn’t even settled on WannaCry and yet there’s already a new global ransomware epidemic making headlines. Just last week, Australian police discovered WannaCry, the malware strain that dominated tech coverage back in May, in some of their traffic cameras. This WannaCry aftershock was upstaged this week, however, by Petya (also known by several […]

Read More >