How to Offer Employees Remote Flexibility Without Sacrificing Security Using Intune

2022 is shaping up to be an interesting time for both employers and employees as the remote world of work endures. We’re now over two years into the pandemic and many employees are still logging in from home, even as pandemic-related restrictions soften. While some employers appear eager to bring their people back into the […]
Penetration Testing: How to Make the Most of This Compliance Requirement

As we continue our deep dive into security assessments, we’re turning our attention to penetration tests. Many business owners only have one reason to conduct penetration tests: compliance. However, they’re not taking advantage of the full value of these assessments. In this blog, we’re going to be putting penetration testing under the microscope so businesses […]
Steps to Consider to Boost Endpoint Security

We’re living through an interesting time for the world of work. Digital security is now more important than ever, yet we’re working miles apart from one another and transmitting data all over the place. Employees are logging onto their company network through their personal WIFI, the same WIFI their teenager may be using to download […]
Expert Q&A: What is Microsoft Dataverse and How Can You Use It?

Chris Bovasso, Arraya’s Director, Application Services, and Mike Wishnefsky, Solutions Engineer, discuss Microsoft Dataverse in this Expert Q&A video. They dive into what the Dataverse is, as well as its benefits and use cases.
How the Financial Sector Can Leverage IT to Stay Ahead

Technology changes at a lightning pace and with recent developments, including the advent of virtualization and shared infrastructure, the last few years have transformed every industry. Maintaining a current IT infrastructure has become a necessity for remaining relevant among a competitive market. However, the never-ending journey of staying current within IT can be demanding. […]
Application Modernization Strategy: How to Prepare

Once businesses make the journey to the cloud, their focus then shifts to the performance of their applications and the costs associated with them. Modernizing your workloads means customizing them to fit your business’s individual needs. Application modernization takes your existing applications and programs them to align with your company’s current and changing business needs. […]
Arraya Insights Vodcast: Prioritizing Endpoint Security in the New World of Work

In this episode of the Arraya Insights Vodcast, our panel discusses the importance of endpoint security in today’s “New World of Work”. Now that users are more connected to their business networks from their homes than ever before, what can and should be done to protect home networks? And should organizations have a say in […]
Understanding Microsoft 365 Security: Do You Need a 3rd Party to Backup Your Data?

Microsoft 365 is a suite of office apps, including Word, Excel, PowerPoint, Teams, Outlook, OneDrive, and more. Millions of users from small businesses to large enterprises rely on these apps for both productivity and collaboration tools. With the recent increase in cyber attacks, specifically ransomware, there’s been discussion surrounding M365 security and whether users should […]
A Closer Look at Business Impact Assessments (BIA)

In late February, our Cyber Team put together a blog highlighting the various types of security assessments. As nearly every industry relies on technology in some form, most businesses must factor cyber compliance into their strategic plan. Those who gather consumer PII (personally identifiable information) and process payments must follow strict compliance regulations to ensure […]
2022 InfoSec Conventions: What to Expect, How to Attend & Some of Our Cyber Team’s Favorites

As cyber attacks increase in severity and frequency, it’s more difficult than ever for businesses to stay ahead of their vulnerability. Staying up to date in cyber is key to ensuring your business has the best available defenses and is equipped to face the latest series of cyber attacks. While the term “hacker” may have […]