Don't Leave Securing Email to End Users

Regardless of who you vote for on November 8th, one occurrence in the campaign has shaken every email administrator to their core, namely the WikiLeaks dump of John Podesta’s emails. While the details of how the hack occurred are scarce, clearly Podesta’s entire mailbox was accessed and subsequently dumped. The only detail known is that […]
3 Overlooked Microsoft Tools That Can Better Secure Emails

Experts estimate that 2.4 million emails were sent every second last year. Take that figure and stretch it across an eight-hour workday and that comes to roughly 69 billion emails between the hours of 9-5 each day. That is a lot of email. Each one of those 69 billion messages isn’t just an opportunity for […]
Remove the Fog of Unknown Cloud Applications

As a technology professional, security has always been at the forefront of my thought process. I’ve been interested in security since I started in the industry in 2007. Back then, security was present, but much less complex than it is today. Most companies had the majority of their IP and other resources locked in an […]
Why the Cloud Means No More Security Excuses

A new study from NIST suggests that security fatigue could be putting businesses at risk. There is something futile in an end user’s attempt to keep your computing environment safe. After all, what could a non-technical knowledge worker possibly do to protect themselves and the company’s data against a hacker? The fatigue and frustration comes […]
Highlights from Microsoft Ignite Day 1

Microsoft’s Ignite conference got underway earlier this morning and it didn’t take long for the updates to start flying in. Couldn’t make it to Atlanta to experience Ignite for yourself? Don’t worry. A few members of Arraya’s Microsoft Practice are in attendance and we’ll be posting updates right here all week to keep you in […]
What About Cybersecurity Drives IT Craziest?

Several of our team members made the trek last week from Arraya headquarters to Harrisburg. Drawing them towards central Pennsylvania was the promise of some good conversation around one of the hottest of hot button IT topics: cybersecurity. The venue for this discussion? The PA Chamber of Business and Industry’s IT Security for Executive Leaders […]
Microsoft Ends ‘Pick-a-Patch’: What Should You Do Now?

Big changes are coming to the patching process for Windows 7 and 8.1 this fall. Microsoft recently announced that, starting in October 2016, admins will no longer be able to pick and choose which patches they want to apply. Instead, patching will be conducted using a cumulative, Windows 10-inspired approach. The list of pros far […]
Top 5 Risks Featured in Cisco 2016 Midyear Cybersecurity Report

A couple of dangerous truths are spotlighted in the Cisco 2016 Midyear Cybersecurity Report. The first is that many businesses are making cybercriminals’ jobs easy by sticking with aging, sometimes poorly-maintained infrastructure. That leads to the second truth, which is cybercriminals don’t need the help. Their methods are paying off at record rates already […]
Cybersecurity's Little Things Make a Big Difference

Modern cybersecurity is often referred to as an arms race. In one corner are the organizations seeking to keep their data safe in their data center or in the cloud. In the other are the cybercriminals and hackers who look at that data and see dollar signs. Just like with any race, this one can’t […]
EMC’s Isolated Recovery Solution: 5 Things You Need to Know

Routine backups are an excellent way to minimize the impact of ransomware or malware infections – unless the backups themselves are comprised. As their techniques advance, cyber criminals are better able to probe more deeply into the networks they invade, putting backups at greater risk. Should they manage to cut that cybersecurity safety net, organizations […]