|
Blog
|
Hackers
|
Page
|
4

Improve Network Access Control with Cisco’s ISE Portal Builder

Arraya Insights| August 28, 2015

How’s this for a balancing act? A company’s network must be an impenetrable fortress to the wrong people (hackers and cyber crooks) while being easily accessible and user-friendly to the right ones (employees, guests and all of their devices). That’s the security tightrope today’s IT pros must walk. However, there is a solution: Cisco’s Identity […]

Read More >

4 Ways IT Vendors May Be Coming Up Short for Healthcare

Arraya Insights| August 25, 2015

Extended care facilities put a lot of faith in their IT vendors to supply the advanced, secure technologies they need to ensure residents receive a high level of care and service. However, the very same vendors those facilities are counting on could inadvertently be leaving sensitive data – including resident’s protected health information (PHI) – […]

Cisco's Midyear Security Report Shines Light on Emerging Threats

Arraya Insights| August 14, 2015

The first half of the year saw security pros and cybercrooks locked in a veritable arms race according to Cisco’s 2015 Midyear Security Report. The brand new report explored the latest threats, gave updates on some old favorites of attackers and looked at the ways in which they’re adapting their methods and tools to evade […]

Read More >

Healthcare's Top IT Mobility Risk - And What You Can Do About It

Arraya Insights| August 11, 2015

A mobile, untethered workforce is becoming essential in order for extended care facilities to deliver the highest level of care possible to residents. The flexibility and freedom that are hallmarks of IT mobility make it easier to communicate with residents, solve and report problems as they happen and to closely monitor critical health data. Staffers […]

Read More >

Too Small to be Targeted by Hackers? New Study Says No

Arraya Insights| June 26, 2015

No IT pro worth his or her salt takes digital security lightly. Despite that, it’s still tempting to grow at least a little comfortable with the notion that: “Hackers aren’t going to bother with my company. We’re too small. They’re only interested in things like big companies with a lot of name recognition, popular data […]

Read More >

'Venom' Bug Puts VMs in Hackers' Crosshairs

Arraya Insights| May 21, 2015

There’s a new vulnerability with a scary name in town and it’s causing some in IT to question the security of their virtual machines (VMs). This new bug, which has been dubbed “Venom” (short for “Virtualized Environment Neglected Operations Manipulation”), could allow attackers to roam freely among all of the VMs running on a server. […]

Read More >

Hackers Find Way to Bypass Windows Security Feature

Arraya Insights| January 21, 2015

Typically the saying “everything old is new again” gives a person a reason to hang on to possibly embarrassing old clothes or CDs. Unfortunately, that saying also has implications in other areas, such as digital security. For example, pros who take their eyes off a threat they thought they’d bested may just have it come […]

Read More >