|
Blog
|
Cybersecurity
|
Page
|
5

Security Now: Using Azure MFA Server to Protect Existing Resources

Arraya Insights| November 14, 2016

Lately it has been hard not to notice news about accounts being hacked. The number of major companies that have been hacked has grown extremely long. When an average person hears about hacking, images of people hiding in the shadows with laptops, rapidly typing lines of code and fighting firewalls come to the front of […]

Read More >

Exchange 2007 Nears End of Life: What Comes Next?

Arraya Insights| November 2, 2016

Five short months are all that remain until Exchange Server 2007 goes end of life. As the April 11, 2017 expiration date for Exchange extended support nears, businesses still using it face a fork in the road. They can assume the risks of using outdated and unsupported technology and press on with Exchange 2007 (not […]

White Paper: What's Working (& What Isn't) in Cybersecurity

Arraya Insights| October 31, 2016

National Cybersecurity Awareness Month, or as it’s also known, October, is typically a big deal here at Arraya. Sure, cybersecurity has really come to dominate the technology conversation year-round, however, there’s nothing wrong with giving it a little extra attention for 31 days. All month long, we’ve posted stories on our blog and on social […]

Read More >

5 Steps to Easier, More Effective Cybersecurity Conversations

Arraya Insights| October 27, 2016

Cybersecurity is complex and it’s only getting more so each day. This is true of the methods used by cybercriminals to break in to corporate networks and of the methods used by businesses to keep them out. While there may never be such a thing as highly-simple and highly-effective cybersecurity, there is a way to […]

Read More >

Identity is the New Security Perimeter

Arraya Insights| October 26, 2016

Today we live in a post-information age. One where people and businesses are driven to a new way of communicating, working, and well… living. A large amount of the credit for this change can be attributed to the internet and apps, both web and mobile. Convenience was a big driver for the success of these […]

Read More >

Why You Can’t Do Without a Cybersecurity Partner

Arraya Insights| October 25, 2016

Confidence around a cybersecurity topic is usually a good thing – but not in this case. More than six-out-of-10 (65%) organizations are confident they will suffer a data breach of some kind in the next year, according to research by Okta. There’s no question that’s the kind of confidence businesses could do without. Staying out […]

Read More >

Don't Leave Securing Email to End Users

Arraya Insights| October 19, 2016

Regardless of who you vote for on November 8th, one occurrence in the campaign has shaken every email administrator to their core, namely the WikiLeaks dump of John Podesta’s emails. While  the details of how the hack occurred are scarce, clearly Podesta’s entire mailbox was accessed and subsequently dumped. The only detail known is that […]

Read More >

3 Overlooked Microsoft Tools That Can Better Secure Emails

Arraya Insights| October 17, 2016

Experts estimate that 2.4 million emails were sent every second last year. Take that figure and stretch it across an eight-hour workday and that comes to roughly 69 billion emails between the hours of 9-5 each day. That is a lot of email. Each one of those 69 billion messages isn’t just an opportunity for […]

Why the Cloud Means No More Security Excuses

Arraya Insights| October 11, 2016

A new study from NIST suggests that security fatigue could be putting businesses at risk. There is something futile in an end user’s attempt to keep your computing environment safe. After all, what could a non-technical knowledge worker possibly do to protect themselves and the company’s data against a hacker? The fatigue and frustration comes […]

Read More >

4 User Mistakes That Will Have You Wishing for Dell EMC Spanning

Arraya Insights| October 4, 2016

Cloud vendors typically have your back when they make a mistake that puts your data in jeopardy, but what if that mistake comes from inside your company? According to Dell EMC, human error is responsible for 64% of data loss. That’s a lot of damage being chalked up to employee carelessness or them just plain […]

Read More >