|
Blog
|
Cyber Crime

Ransomware Attacks Spike Against Healthcare Facilities: How to Keep Yours Safe

Arraya Insights| December 14, 2020

Already bracing for a potentially long winter due to spiking COVID-19 cases, those in the healthcare industry could soon be forced to fight a battle on a different front. Last month, a trio of government agencies warned of “an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” This comes as multiple institutions […]

Read More >

Feds Warn of Sophisticated Cyber Threat: 5 Steps to Take Now

Arraya Insights| June 22, 2017

Do you know where your administrator credentials are? Hopefully, the answer to that is “With my administrators.” However, it may not be the only answer as per a recent warning issued by the federal government. The National Cybersecurity and Communications Integration Center (NCCIC) has uncovered what it calls an “emerging, sophisticated campaign,” one that uses […]

Read More >

Arraya Protects Managed Services Customers from WannaCry

Thomas York| June 2, 2017

A fair amount of digital ink has been spent recounting the ransomware attack known as WannaCry and its effects on the global market.  Ransomware attacks are nothing new; revenues obtained from these attacks exceed 1 billion annually, with previous examples such as 2015’s CryptoWall earning $325 million alone.  What is new is IT’s acknowledgement of […]

6 Proven Hacker-Repelling Ways for Manufacturers to Secure an ICS

Arraya Insights| May 10, 2017

Even though they don’t provide the same immediate financial payoff as businesses in other industries, manufacturers remain a favorite target of cyber criminals. Rather than directly stealing money, attacks may focus on disabling systems and causing damage to critical infrastructure. Criminals may also have their eyes on intellectual property or internal operational information as part […]

Read More >

Policy-based Networking Made Easy with Cisco’s ISE

Arraya Insights| September 22, 2015

Most things in business are governed by policies. There are detailed sets of rules surrounding everything from PTO usage to intra-office relationships and beyond. Historically, one area that has been tougher to lock down with policies has been the corporate network. Often this stems from poor visibility into the network itself, a misalignment of IT […]

Read More >