Ransomware Attacks Spike Against Healthcare Facilities: How to Keep Yours Safe

Already bracing for a potentially long winter due to spiking COVID-19 cases, those in the healthcare industry could soon be forced to fight a battle on a different front. Last month, a trio of government agencies warned of “an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” This comes as multiple institutions […]
Feds Warn of Sophisticated Cyber Threat: 5 Steps to Take Now

Do you know where your administrator credentials are? Hopefully, the answer to that is “With my administrators.” However, it may not be the only answer as per a recent warning issued by the federal government. The National Cybersecurity and Communications Integration Center (NCCIC) has uncovered what it calls an “emerging, sophisticated campaign,” one that uses […]
Arraya Protects Managed Services Customers from WannaCry

A fair amount of digital ink has been spent recounting the ransomware attack known as WannaCry and its effects on the global market. Ransomware attacks are nothing new; revenues obtained from these attacks exceed 1 billion annually, with previous examples such as 2015’s CryptoWall earning $325 million alone. What is new is IT’s acknowledgement of […]
6 Proven Hacker-Repelling Ways for Manufacturers to Secure an ICS

Even though they don’t provide the same immediate financial payoff as businesses in other industries, manufacturers remain a favorite target of cyber criminals. Rather than directly stealing money, attacks may focus on disabling systems and causing damage to critical infrastructure. Criminals may also have their eyes on intellectual property or internal operational information as part […]
Policy-based Networking Made Easy with Cisco’s ISE

Most things in business are governed by policies. There are detailed sets of rules surrounding everything from PTO usage to intra-office relationships and beyond. Historically, one area that has been tougher to lock down with policies has been the corporate network. Often this stems from poor visibility into the network itself, a misalignment of IT […]