December 8, 2025

Reclaiming Value from the Cloud: Smart Spending Starts with Visibility

Optimizing cloud spend is a priority for organizations of all sizes. Without proactive management, on-demand resources can unexpectedly inflate monthly bills, leading to unnecessary expenses. In a recent webinar, Access Point’s CIO Anthony Rivera and Director of Infrastructure Services Kevin Hartwig, shared their expertise on practical ways to control and reduce cloud costs. In this article, we share some of their insights.

Read more
CyberWatch
|
3 min read
November 24, 2025

Zero Trust in Practice—Lessons from the APC x Fortinet Discussion

In our recent session with Fortinet, we explored why achieving Zero Trust remains so challenging, realizing that success depends less on technology and more on adopting a continuous, people-centered approach that prioritizes visibility, integration, and adaptive security across today’s hybrid environments.

Read more
CyberWatch
|
3 min read
November 18, 2025

Translating Technical Depth into a Clear Security Story

When Anthony Rivera, Access Point’s CIO, and Stephen Watkins, Fortinet’s Principal Cybersecurity Advisor sat down to talk about endpoint detection and response, the goal wasn’t to out-nerd the audience. It was to make sense of the alphabet soup—EDR, MDR, XDR—for the people who actually rely on it.

Read more
CyberWatch
|
3 min read
November 18, 2025

Why Choose a Virtual CISO over a Full-Time Hire

In our recent webinar, “The Role of the Virtual CISO,” Susan Woyton and Michael Caruso explained how organizations can benefit from strategic security leadership without hiring a full-time executive. Their discussion touched on the growing demand for vCISO services, the range of responsibilities a vCISO covers, and how Access Point tailors each engagement to client needs. To build on that conversation, here are five reasons more organizations are turning to Virtual CISOs.

Read more

The Latest

Shared Responsibility in the Divided Cloud
July 1, 2025

Shared Responsibility in the Divided Cloud

In the cloud computing space, it’s important to understand that using a cloud service provider (CSP) isn’t a “set it and forget it” relationship. The shared responsibility model clearly divides security, compliance, and operational tasks between CSPs and the organizations that use their services. However, nothing solidifies these concepts like seeing them in real-world examples. This article explores three brief case studies—each drawn from a different cloud service model (IaaS, PaaS, and SaaS)—to highlight how responsibilities shift across the spectrum.

Find out more
How to Build a Third-Party Risk Management Program
July 1, 2025

How to Build a Third-Party Risk Management Program

Every business works with vendors, suppliers, and other third parties to get things done. But these relationships come with risks—especially when it comes to cybersecurity. If a vendor gets breached, your data or systems could be exposed. This is why third-party risk management (TPRM) matters.

Find out more
Rethinking Phishing Defenses in the Age of AI
July 1, 2025

Rethinking Phishing Defenses in the Age of AI

As part of Cybersecurity Awareness Month, we're featuring expert insights from our team at Access Point Consulting. Today, Clayton Smith reports on the psychology and tactics behind phishing attacks. Discover how threat actors manipulate their victims and learn practical tips to protect yourself and your organization.

Find out more
Expert Insights on Cloud Security
June 26, 2025

Expert Insights on Cloud Security

As cloud adoption accelerates, so do the stakes for keeping data and systems secure. In early 2025, a major tech conglomerate suffered a high-profile breach when a misconfigured cloud firewall exposed sensitive data from millions of customers across multiple continents. Investigations revealed that overly broad access permissions and poor visibility into their overall security posture contributed to the incident—underscoring the fact that, despite sophisticated tools, even a single gap in configuration can unravel an entire security program. Below, Anthony Rivera and Kevin Hartwig explain how to prevent such missteps by strengthening identity controls, segmenting networks, guarding data, ensuring compliance, managing your security posture, and creating a culture of awareness. 

Find out more
The Best Cyber Defense Is Security Awareness
December 19, 2024

The Best Cyber Defense Is Security Awareness

As Cybersecurity Awareness Month winds down, we're pleased to share one last feature from Pierre Reed, the Chief of Staff at Access Point Consulting. He explores the importance of fostering a security awareness culture within organizations. Discover how building this culture can empower your team to better protect against cyber threats.

Find out more
Ransomware Readiness: Navigating the Threat to Your Business
December 19, 2024

Ransomware Readiness: Navigating the Threat to Your Business

As we conclude our 'ransomware readiness week' of this Cybersecurity Awareness Month, it's time to take a critical look at your organization's defenses. Ransomware attacks are becoming more sophisticated, and no business is immune. In our latest article, we explore essential strategies to bolster your ransomware preparedness. Don't miss this vital information to help protect your business from emerging threats.

Find out more
Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity
October 21, 2024

Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity

This week's Cybersecurity Awareness Month article features insights from Michael Caruso, Access Point's Director of Supply Chain Risk Management, on the recent pager and two-way radio attacks targeting Hezbollah. Michael provides his perspective on these incidents, highlighting the importance of securing communication channels against such threats.

Find out more
Patch Management Basics
October 18, 2024

Patch Management Basics

October is recognized as Cybersecurity Awareness Month by the National Cybersecurity Alliance (NCA) and the Cybersecurity and Infrastructure Security Agency (CISA). To celebrate and promote online security , we're posting a series of articles throughout the month. Each week, one of our cybersecurity experts weights in on a foundational cybersecurity topic. This week it's Access Point CIO Anthony Rivera on patch management. Enjoy, and stay tuned for next week's Expert Insight.

Find out more
The Impact of Cyberattacks on Hospital Patients
August 30, 2024

The Impact of Cyberattacks on Hospital Patients

Hospitals and healthcare providers have increasingly become targets of cyberattacks, which pose significant risks to patient care and safety. This document examines the various ways in which cyberattacks can disrupt hospital operations, compromise patient data security, and ultimately affect the quality of patient care. It also explores strategies and best practices that hospitals can implement to mitigate these risks and enhance their cybersecurity posture.

Find out more