July 30, 2025

Proven Strategies for Cloud Cost Optimization

Optimizing cloud spend is a priority for organizations of all sizes. Without proactive management, on-demand resources can unexpectedly inflate monthly bills, leading to unnecessary expenses. In a recent webinar, Access Point’s CIO Anthony Rivera and Director of Infrastructure Services Kevin Hartwig, shared their expertise on practical ways to control and reduce cloud costs. In this article, we share some of their insights.

Read more
CyberWatch
|
3 min read
July 28, 2025

The Hidden Risks of Domain-Based Threats — and How to Defend Against Them

Domain-based threats have become one of the most persistent and underestimated risks organizations face. From lookalike domains designed to deceive, to infrastructure missteps that invite attackers, the danger is real — and growing. During a recent webinar hosted by Access Point Consulting, we explored these threats, why they matter, and what you can do to protect your brand, customers, and employees.

Read more
CyberWatch
|
3 min read
July 21, 2025

The Timeless Threat of Impersonation — and Why External Monitoring Matters

How fraudsters exploit technology, from fake profiles to fraudulent domains, and what organizations can do to protect their brand and people.

Read more
CyberWatch
|
3 min read
July 2, 2025

Spoofed LinkedIn Profiles — and How External Monitoring Protects Your Business

LinkedIn is a powerful platform for building relationships and finding opportunities — and attackers know it. Increasingly, threat actors are creating spoofed LinkedIn profiles to target job seekers and employees, using the trust we place in professional networks against us.

Read more

The Latest

Rethinking Phishing Defenses in the Age of AI
July 1, 2025

Rethinking Phishing Defenses in the Age of AI

As part of Cybersecurity Awareness Month, we're featuring expert insights from our team at Access Point Consulting. Today, Clayton Smith reports on the psychology and tactics behind phishing attacks. Discover how threat actors manipulate their victims and learn practical tips to protect yourself and your organization.

Find out more
Expert Insights on Cloud Security
June 26, 2025

Expert Insights on Cloud Security

As cloud adoption accelerates, so do the stakes for keeping data and systems secure. In early 2025, a major tech conglomerate suffered a high-profile breach when a misconfigured cloud firewall exposed sensitive data from millions of customers across multiple continents. Investigations revealed that overly broad access permissions and poor visibility into their overall security posture contributed to the incident—underscoring the fact that, despite sophisticated tools, even a single gap in configuration can unravel an entire security program. Below, Anthony Rivera and Kevin Hartwig explain how to prevent such missteps by strengthening identity controls, segmenting networks, guarding data, ensuring compliance, managing your security posture, and creating a culture of awareness. 

Find out more
How a PMO Transforms Cybersecurity Initiatives
June 26, 2025

How a PMO Transforms Cybersecurity Initiatives

A Project Management Office (PMO) can strengthen cybersecurity initiatives by applying structured processes, resource coordination, and risk management best practices to compliance requirements. Below are key examples of how Access Point’s PMO provides concrete, day-to-day benefits in typical security projects such as PCI DSS, HIPAA, SOC certifications, and other security enhancements.

Find out more
The Best Cyber Defense Is Security Awareness
December 19, 2024

The Best Cyber Defense Is Security Awareness

As Cybersecurity Awareness Month winds down, we're pleased to share one last feature from Pierre Reed, the Chief of Staff at Access Point Consulting. He explores the importance of fostering a security awareness culture within organizations. Discover how building this culture can empower your team to better protect against cyber threats.

Find out more
Ransomware Readiness: Navigating the Threat to Your Business
December 19, 2024

Ransomware Readiness: Navigating the Threat to Your Business

As we conclude our 'ransomware readiness week' of this Cybersecurity Awareness Month, it's time to take a critical look at your organization's defenses. Ransomware attacks are becoming more sophisticated, and no business is immune. In our latest article, we explore essential strategies to bolster your ransomware preparedness. Don't miss this vital information to help protect your business from emerging threats.

Find out more
Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity
October 21, 2024

Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity

This week's Cybersecurity Awareness Month article features insights from Michael Caruso, Access Point's Director of Supply Chain Risk Management, on the recent pager and two-way radio attacks targeting Hezbollah. Michael provides his perspective on these incidents, highlighting the importance of securing communication channels against such threats.

Find out more
Patch Management Basics
October 18, 2024

Patch Management Basics

October is recognized as Cybersecurity Awareness Month by the National Cybersecurity Alliance (NCA) and the Cybersecurity and Infrastructure Security Agency (CISA). To celebrate and promote online security , we're posting a series of articles throughout the month. Each week, one of our cybersecurity experts weights in on a foundational cybersecurity topic. This week it's Access Point CIO Anthony Rivera on patch management. Enjoy, and stay tuned for next week's Expert Insight.

Find out more
The Impact of Cyberattacks on Hospital Patients
August 30, 2024

The Impact of Cyberattacks on Hospital Patients

Hospitals and healthcare providers have increasingly become targets of cyberattacks, which pose significant risks to patient care and safety. This document examines the various ways in which cyberattacks can disrupt hospital operations, compromise patient data security, and ultimately affect the quality of patient care. It also explores strategies and best practices that hospitals can implement to mitigate these risks and enhance their cybersecurity posture.

Find out more
Protecting Healthcare Legacy Systems with Micro-Segmentation
August 14, 2024

Protecting Healthcare Legacy Systems with Micro-Segmentation

Segmentation in network environments is nothing new. It’s common for administrators to segment the network based on logical functions and security controls. For example, the finance department is one segment, and the sales department is another segment. All segments can send traffic to email servers (for example), but user traffic does not enter finance or sales segments unless the user is authorized to access them.

Find out more