|
Blog
|
It Security
|
Page
|
5

Encryption-Based Cyber Attacks Are Increasing: How to Stay Safe

Arraya Insights| July 26, 2018

Encryption’s popularity has gone through the roof over the past few years, however, it may not be the cyber security silver bullet some hope. The volume of encrypted traffic traversing the web has increased roughly 90% each year since 2015. If those year-over-year growth patterns hold true, Gartner forecasts that, come 2019, 80% of all […]

Overconfidence and 7 Other Deadly SMB Cyber Security Sins

Arraya Insights| July 20, 2018

A gap seems to be forming between what businesses believe about their cyber resiliency and the reality of the situation. Actually, calling it a gap may be underselling it. In its report titled Cyber Security: Can Overconfidence Lead to an Extinction Event?, Solar Winds found 87% of businesses rate their cyber security defenses as “average or […]

Read More >

Coming to America? California Passes GDPR Copycat Bill

Arraya Insights| July 12, 2018

GDPR only went into effect in late May, but it’s already inspired like-minded data privacy legislation on this side of the Atlantic. California, America’s technological heartland, recently signed off on a law that will give consumers greater control over their personal data. Much like GDPR before it, the new law’s impact could be widespread. While […]

Read More >

3 Cyber Security Fundamentals Often Overlooked During M&As

Arraya Insights| June 29, 2018

Businesses have made cyber security an integral part of their M&A processes – so why are so many issues going unnoticed? Consider one study in which the vast majority (80%) of businesses agreed cyber security had become a critical part of M&A due diligence 1. However, in that same survey, more than one-third of businesses admitted […]

Read More >

Cyber Security Worst Practices – 9 Must-Break User Habits

Arraya Insights| June 5, 2018

People can be a business’s greatest asset, but they can also be its biggest cyber security liability. Cyber criminals are drawn to the path of least resistance and, when compared to today’s highly advanced security solutions, that’s often what users represent. Unfortunately, users have done little to diminish that reputation. Instead, many have developed bad […]

Read More >

6 Ways Duo MFA Helps You Be More Secure and User-Friendly

Arraya Insights| May 22, 2018

Rolling out a multifactor authentication (MFA) solution such as the one offered by Duo is a good way to reinforce a cyber security weak point: end users. That is, of course, unless users find this added security to be a productivity roadblock. Should that happen, they may attempt to circumvent it or petition upper management […]

Read More >

GDPR May Very Well Impact You – Are You Ready?

Arraya Insights| May 16, 2018

GDPR takes effect on May 25, 2018.  Fines for non-compliance can go as high as 4% of annual global turnover or $20M, whichever is higher.  The two-year transition period started on April 14,  2016, but like most regulations, it’s been easy to push off until later … well later is now.  With just under two […]

5 Things Businesses Demand From End User Computing & How to Deliver Them

Arraya Insights| May 10, 2018

Digital transformation has had an impact on all facets of modern businesses and end user computing (EUC) is no exception. In recent years, end users have begun to rethink their work tools and what constitutes a workspace. They’ve called for greater flexibility and the responsibility for delivering that has fallen on IT. Should IT come […]

Read More >

4 Calling Cards of a World Class Incident Response Plan

Arraya Insights| April 24, 2018

One of the great truths in cyber security, just like in life, is that there’s nothing wrong with expecting the best – as long as you make sure to prepare for the worst. Recent research by The Ponemon Institute, however, suggests far too many businesses are expecting the best cyber security-wise and simply leaving it at that. […]

Read More >

How Not to Respond to a Cyber Security Vulnerability

Arraya Insights| April 19, 2018

The worst way to find out about a cyber security problem is from somebody outside of your organization. We’re paraphrasing the words of Tom Clerici, Director of our Cyber Security Practice, who wrote something similar in a blog from early last year in which he stressed both the increasing inevitability of cyber attacks and the need for […]

Read More >