Offer Secure Flexibility: Device Management with Microsoft Intune

Maintaining the flexible work arrangements that employees have come to know has become necessary to both retain existing talent and broaden the search for new talent. While the added benefits of remote collaboration provide many perks for employees and their productivity, it also increases attack surface and risk. As there are no signs of cyber […]
Azure AD MFA Enhancements Begin in February 2023: Plan Your Transition

Multi-factor authentication has become a de facto technology for enhancing security for all types of applications from online apps to desktop apps to VPNs. We’ve all experienced receiving phone calls, text messages, and notifications after providing a username and password. However, the experience of MFA within the Microsoft Authenticator app has been limited for Microsoft […]
MFA & PAM: How These Security Methods Work Together to Provide Layered Protection

Providing convenient, remote access to employees is now considered status quo rather than a bonus. As the workplace continues to shift and the dust around the pandemic starts to (hopefully) settle, remote work is going to remain. Corporate IT environments have never been more complex, and the security landscape is more threatening than ever. Businesses […]
Safeguard Data & Bolster Incident Response Capabilities with Cohesity FortKnox

While cyber attacks in general remain top of mind for IT teams and CIOs, ransomware continues as the true stand out. No security measures are 100% effective in preventing ransomware, which is why we put such a focus on hardening your data backups at Arraya. Without a secure, fast, and reliable backup system in place, […]
How to Take Your Cyber Security from Good to Great

Cyber security can be an unsatisfying experience. While there are certainly good, better, and best cyber security methods, there is no solution or practice that will be able to prevent all cyber attacks. At Arraya, we’ve found that our clients often look for reassurance or confirmation that they’re protected from the various cyber threats we […]
How to Offer Employees Remote Flexibility Without Sacrificing Security Using Intune

2022 is shaping up to be an interesting time for both employers and employees as the remote world of work endures. We’re now over two years into the pandemic and many employees are still logging in from home, even as pandemic-related restrictions soften. While some employers appear eager to bring their people back into the […]
Watering Hole Attacks Named Top Cyber Threat for 2022: Here’s What You Should Know

Most of us are familiar with the common cyber attacks that are launched every day. We’re wary of unfamiliar emails and texts to avoid phishing attacks, and we keep our software up to date to prevent malware. Cyber crime is always evolving as bad actors seek new ways to trick users and overtake your email, […]
4 Reasons Multi-Factor Authentication is One of the Most Important Security Practices to Implement

Technology continues to infiltrate our lives in new ways. With every advancement in technology, new cyber threats follow. While many of these advancements impact our lives for the better, they also open another door for a potential cyber vulnerability. As we move into the end of the year, there are high hopes for better times ahead. […]
Microsoft to Disable Basic Authentication in October 2022: Here's How to Prepare

Microsoft has announced that they’ll be turning off Basic Authentication permanently, as of October 1, 2022. This will be turned off for all protocols in all tenants for Exchange Online. Your Exchange account hosts your work emails, contacts, and calendar. Basic authentication (also known as proxy authentication) requires only a username and a password for client access requests. The username and password are often stored locally on the device. While […]
The Top 8 Security Fails to Avoid to #BeCyberSmart

Cyber Security Awareness Month was launched in 2004 by the National Cyber Security Alliance and the U.S. Department of Homeland Security (DHS). Since then, this topic has become even more important as cyber-attacks continue to surge in recent years. A combination of our growing reliance on technology, the worldwide pandemic, and lucrative ransom demands are contributing to this increase. Continued education and awareness are key […]