Why You Can’t Do Without a Cybersecurity Partner

Arraya Insights Arraya Insights| October 25, 2016

Confidence around a cybersecurity topic is usually a good thing – but not in this case. More than six-out-of-10 (65%) organizations are confident they will suffer a data breach of some kind in the next year, according to research by Okta. There’s no question that’s the kind of confidence businesses could do without. Staying out […]

Read More >

Don't Leave Securing Email to End Users

Arraya Insights Arraya Insights| October 19, 2016

Regardless of who you vote for on November 8th, one occurrence in the campaign has shaken every email administrator to their core, namely the WikiLeaks dump of John Podesta’s emails. While  the details of how the hack occurred are scarce, clearly Podesta’s entire mailbox was accessed and subsequently dumped. The only detail known is that […]

Read More >

3 Overlooked Microsoft Tools That Can Better Secure Emails

Arraya Insights Arraya Insights| October 17, 2016

Experts estimate that 2.4 million emails were sent every second last year. Take that figure and stretch it across an eight-hour workday and that comes to roughly 69 billion emails between the hours of 9-5 each day. That is a lot of email. Each one of those 69 billion messages isn’t just an opportunity for […]

Why the Cloud Means No More Security Excuses

Arraya Insights Arraya Insights| October 11, 2016

A new study from NIST suggests that security fatigue could be putting businesses at risk. There is something futile in an end user’s attempt to keep your computing environment safe. After all, what could a non-technical knowledge worker possibly do to protect themselves and the company’s data against a hacker? The fatigue and frustration comes […]

Read More >

4 User Mistakes That Will Have You Wishing for Dell EMC Spanning

Arraya Insights Arraya Insights| October 4, 2016

Cloud vendors typically have your back when they make a mistake that puts your data in jeopardy, but what if that mistake comes from inside your company? According to Dell EMC, human error is responsible for 64% of data loss. That’s a lot of damage being chalked up to employee carelessness or them just plain […]

Read More >

Highlights from Microsoft Ignite Day 1

Arraya Insights Arraya Insights| September 26, 2016

Microsoft’s Ignite conference got underway earlier this morning and it didn’t take long for the updates to start flying in. Couldn’t make it to Atlanta to experience Ignite for yourself? Don’t worry. A few members of Arraya’s Microsoft Practice are in attendance and we’ll be posting updates right here all week to keep you in […]

Read More >

What About Cybersecurity Drives IT Craziest?

Arraya Insights Arraya Insights| September 21, 2016

Several of our team members made the trek last week from Arraya headquarters to Harrisburg. Drawing them towards central Pennsylvania was the promise of some good conversation around one of the hottest of hot button IT topics: cybersecurity. The venue for this discussion? The PA Chamber of Business and Industry’s IT Security for Executive Leaders […]

Read More >

Microsoft Ends ‘Pick-a-Patch’: What Should You Do Now?

Arraya Insights Arraya Insights| August 25, 2016

Big changes are coming to the patching process for Windows 7 and 8.1 this fall. Microsoft recently announced that, starting in October 2016, admins will no longer be able to pick and choose which patches they want to apply. Instead, patching will be conducted using a cumulative, Windows 10-inspired approach. The list of pros far […]

Top 5 Risks Featured in Cisco 2016 Midyear Cybersecurity Report

Arraya Insights Arraya Insights| August 24, 2016

A couple of dangerous truths are spotlighted in the Cisco 2016 Midyear Cybersecurity Report. The first is that many businesses are making cybercriminals’ jobs easy by sticking with   aging, sometimes poorly-maintained infrastructure. That leads to the second truth, which is cybercriminals don’t need the help. Their methods are paying off at record rates already […]

Cybersecurity's Little Things Make a Big Difference

Dan Lifshutz Dan Lifshutz| August 11, 2016

Modern cybersecurity is often referred to as an arms race. In one corner are the organizations seeking to keep their data safe in their data center or in the cloud. In the other are the cybercriminals and hackers who look at that data and see dollar signs. Just like with any race, this one can’t […]

Read More >