CyberWatch
|
3 min read
September 5, 2025

How Pen Testing and Continuous Attack Surface Management Work Together

As the digital perimeter continues to dissolve, security leaders are rethinking how they manage cyber risk. Penetration testing and vulnerability management remain essential—but they’re no longer enough on their own. Today’s attackers exploit what lies beyond your defined scope: misconfigured cloud buckets, forgotten subdomains, exposed APIs, and rogue SaaS apps. To stay ahead, organizations need not just testing, but visibility. That’s where continuous Attack Surface Management (ASM) comes in.

Read more
CyberWatch
|
3 min read
September 5, 2025

Beyond Domains: The Expanding External Threat Landscape

As organizations strengthen their internal security, attackers are shifting their focus — exploiting what’s outside your firewall. The external threat landscape has evolved far beyond just domains and IP addresses. Today, it includes employee data on data broker sites, leaked credentials on the dark web, chatter on adversarial forums, and impersonations through ads and decentralized platforms. In this article, we highlight what you need to know about these risks and how to improve your visibility. 

Read more
CyberWatch
|
3 min read
September 5, 2025

How a PMO Transforms Cybersecurity Initiatives

A Project Management Office (PMO) can strengthen cybersecurity initiatives by applying structured processes, resource coordination, and risk management best practices to compliance requirements. Below are key examples of how Access Point’s PMO provides concrete, day-to-day benefits in typical security projects such as PCI DSS, HIPAA, SOC certifications, and other security enhancements.

Read more

The Latest

Patch Management Basics
October 18, 2024

Patch Management Basics

October is recognized as Cybersecurity Awareness Month by the National Cybersecurity Alliance (NCA) and the Cybersecurity and Infrastructure Security Agency (CISA). To celebrate and promote online security , we're posting a series of articles throughout the month. Each week, one of our cybersecurity experts weights in on a foundational cybersecurity topic. This week it's Access Point CIO Anthony Rivera on patch management. Enjoy, and stay tuned for next week's Expert Insight.

Find out more
The Impact of Cyberattacks on Hospital Patients
August 30, 2024

The Impact of Cyberattacks on Hospital Patients

Hospitals and healthcare providers have increasingly become targets of cyberattacks, which pose significant risks to patient care and safety. This document examines the various ways in which cyberattacks can disrupt hospital operations, compromise patient data security, and ultimately affect the quality of patient care. It also explores strategies and best practices that hospitals can implement to mitigate these risks and enhance their cybersecurity posture.

Find out more
Protecting Healthcare Legacy Systems with Micro-Segmentation
August 14, 2024

Protecting Healthcare Legacy Systems with Micro-Segmentation

Segmentation in network environments is nothing new. It’s common for administrators to segment the network based on logical functions and security controls. For example, the finance department is one segment, and the sales department is another segment. All segments can send traffic to email servers (for example), but user traffic does not enter finance or sales segments unless the user is authorized to access them.

Find out more
Operationalizing Cyber Resilience in Healthcare
August 14, 2024

Operationalizing Cyber Resilience in Healthcare

The healthcare sector faced a staggering 156% increase in breached records in 2023. The concern goes beyond just alarming statistics: Breaches pose a direct risk to patient safety by disrupting essential healthcare services, including eligibility verification, prescription processing, and hospital discharge procedures.

Find out more
Taking an Executive Approach to Cyber Risks
August 14, 2024

Taking an Executive Approach to Cyber Risks

Network administrators, security analysts, and software developers have a technical approach to risk management, whereas executives and a business’ board of directors have an economic one. The board of directors wants to know the monetary impact and responsibilities surrounding threats and risk management.

Find out more
Protecting Your Customers from Spoofed and Modified Email Messages
August 14, 2024

Protecting Your Customers from Spoofed and Modified Email Messages

Email protocols and the system that allows us to communicate with electronic messaging have been around for decades. The original system built in the 1970s wasn’t created with spoofing and phishing in mind. Weak communication protocols between sender and receiver have led to numerous critical data breaches from email-based attacks. The success of attacks stems from the way email protocols work, but businesses can protect themselves using DMARC policies set up as DNS entries.

Find out more
HIPAA Compliance Checklist
August 14, 2024

HIPAA Compliance Checklist

Whether you’re a healthcare provider or a third-party contractor storing protected health information (PHI), you likely wrestle with HIPAA compliance. HIPAA is one of the more strict compliance regulations and it’s difficult to navigate...

Find out more
The Power of Templates: From Crayons to Incident Response
August 2, 2024

The Power of Templates: From Crayons to Incident Response

In the business world, particularly cybersecurity, organizations often struggle to respond efficiently and effectively to incidents. The lack of standardized processes can lead to chaos, delays, and significant impacts on business operations.

Find out more
Dangers of Unpatched Healthcare IoT and Network Systems
August 1, 2024

Dangers of Unpatched Healthcare IoT and Network Systems

It’s not uncommon for large healthcare organizations to support patients via thousands of systems––servers, network hardware, and Internet of Things (IoT) devices particular to the medical practice. Healthcare organizations are primary targets for attackers and are required to follow strict regulations to stop data breaches. HIPAA violations are costly, and unpatched hardware leaves healthcare systems vulnerable to numerous threats including malware, ransomware, security bypasses, and possible remote code execution. Patching systems with the latest update is critical to data protection and risk management, and it keeps the company compliant with HIPAA guidelines.

Find out more