Why Phishing Campaigns Succeed - And How to Fight Back

Here’s an encouraging stat: Nearly all (99%) of email-based threats like phishing are totally harmless in and of themselves. In order to become dangerous, they require some type of user interaction, whether that’s clicking on a link, opening an attachment, etc. Yet, email remains a highly popular and lucrative attack vector. In fact, phishing ranks […]
Arraya Insights Radio: Cyber Security Incidents: An Audio Survival Guide

Arraya Insights Radio Episode 15: Cyber Security Incidents: An Audio Survival Guide Cyber Security incidents have become dangerously common. There’s plenty of research supporting that statement, but perhaps the most meaningful proof can be found by scanning recent industry headlines. On this episode of Arraya Insights Radio, we speak to two of our in-house security experts: […]
Cisco Threat Grid: Keeping Malware Defense On-Prem

Every organization should be concerned about malware – although it seems some should be a little more concerned than others. Certain industries seem to land in its crosshairs far more often. Unfortunately for organizations in malware’s favorite verticals, building an effective cyber security plan can be complicated by the realities of life within those industries. […]
Fact Checking Cyber Security’s 7 Scariest Urban Legends

The weeks leading up to Halloween have always been perfect for retelling urban legends and other scary tales. Since October is also National Cyber Security Awareness Month, these stories don’t only have to focus on creeping monsters and vengeful spirits. Instead, they can be about truly terrifying things, like the hacker who, it turns out, was […]
Cisco AMP Optimization Checklist: 7 Steps to Take Now

Let’s say you have Cisco’s Advanced Malware Protection (AMP) keeping an eye on your corporate network – so you’re good, right? After all, AMP promises to be a cyber security difference-maker, catching the 1% of threats legacy defensive tools miss. Here’s the thing, even though AMP can absolutely be the missing piece that helps your […]
Is Your Disaster Recovery Strategy Tuned to Modern Threats?

If your organization’s disaster recovery strategy received a grade, what score would it get? As we referenced in a recent blog (5 Signs a Data Center Modernization Project is in Your Future), a sizable number of businesses might not be happy with their marks. According to the research featured in that post, only 27% of […]
4 Calling Cards of a World Class Incident Response Plan

One of the great truths in cyber security, just like in life, is that there’s nothing wrong with expecting the best – as long as you make sure to prepare for the worst. Recent research by The Ponemon Institute, however, suggests far too many businesses are expecting the best cyber security-wise and simply leaving it at that. […]
‘Heroic’ NotPetya Recovery and the Case for Prevention Over Cures

New details have emerged concerning one company’s efforts to recover from last summer’s NotPetya attacks and they definitely call to mind that old cliché about an ounce of prevention equaling a pound of cure. Maersk, the world’s largest shipping company, was one of many organizations that fell victim to the outbreak, which initially appeared to […]
Worse than Ransomware? CISOs Share their Biggest 2018 Concern

Data breaches, cyber attacks, ransomware – these things undoubtedly weigh heavily on the minds of modern day CISOs, but not as heavily as one might think. All three of those perennial hot button issues fell short of the top spot in a recent study by The Ponemon Institute of the biggest concerns security and technology […]
5 Sneaky Security Trends That Demand IT's Attention

There’s a positive moment at the top of Cisco’s 2017 Midyear Cybersecurity Report, one which acknowledges the advances security pros have made regarding preventing and recovering from attacks. Unfortunately – and predictably – this new report isn’t all pats on the back. Instead, the conversation shifts to a number of trends observed by Cisco, each […]