October 27, 2025

Why Choose a Virtual CISO over a Full-Time Hire

In our recent webinar, “The Role of the Virtual CISO,” Susan Woyton and Michael Caruso explained how organizations can benefit from strategic security leadership without hiring a full-time executive. Their discussion touched on the growing demand for vCISO services, the range of responsibilities a vCISO covers, and how Access Point tailors each engagement to client needs. To build on that conversation, here are five reasons more organizations are turning to Virtual CISOs.

Read more
CyberWatch
|
3 min read
October 23, 2025

What Cyber Liability Insurance Really Covers — and When It Makes Sense

When a cyber incident strikes, most business owners worry: “What do I do now?” Access Point CIO Anthony Rivera and Couch Braunsdorf Insurance Group CIO Eric Wistrand explore how cyber liability insurance can help fill the gap between technical readiness and financial recovery. Following are key takeaways from the recording— and the reasons why this topic deserves a closer look for small and mid-sized organizations.

Read more
CyberWatch
|
3 min read
October 6, 2025

Security Culture Still Matters in 2025

Sloppy security practices in the workplace can undermine a company’s investments in tools and technology. Even the most advanced firewalls, intrusion detection systems, or encryption protocols cannot compensate for employees who are unaware of risks or uninformed about best practices.

Read more
CyberWatch
|
3 min read
September 29, 2025

Insights from this Year's IBM Report

Each year, IBM releases its Cost of a Data Breach Report, one of the most widely cited studies on the financial and operational impact of cyber incidents. The latest edition shows that while costs continue to rise — now averaging $4.88 million globally per breach, with U.S. organizations facing even higher averages — the story is about preparation and discipline. The numbers remind us that breaches are not rare, isolated events. They are part of the operating environment organizations must manage. The question isn’t if an incident will occur, but how ready your team will be when it does.

Read more

The Latest

Expert Insights on Cloud Security
June 26, 2025

Expert Insights on Cloud Security

As cloud adoption accelerates, so do the stakes for keeping data and systems secure. In early 2025, a major tech conglomerate suffered a high-profile breach when a misconfigured cloud firewall exposed sensitive data from millions of customers across multiple continents. Investigations revealed that overly broad access permissions and poor visibility into their overall security posture contributed to the incident—underscoring the fact that, despite sophisticated tools, even a single gap in configuration can unravel an entire security program. Below, Anthony Rivera and Kevin Hartwig explain how to prevent such missteps by strengthening identity controls, segmenting networks, guarding data, ensuring compliance, managing your security posture, and creating a culture of awareness. 

Find out more
The Best Cyber Defense Is Security Awareness
December 19, 2024

The Best Cyber Defense Is Security Awareness

As Cybersecurity Awareness Month winds down, we're pleased to share one last feature from Pierre Reed, the Chief of Staff at Access Point Consulting. He explores the importance of fostering a security awareness culture within organizations. Discover how building this culture can empower your team to better protect against cyber threats.

Find out more
Ransomware Readiness: Navigating the Threat to Your Business
December 19, 2024

Ransomware Readiness: Navigating the Threat to Your Business

As we conclude our 'ransomware readiness week' of this Cybersecurity Awareness Month, it's time to take a critical look at your organization's defenses. Ransomware attacks are becoming more sophisticated, and no business is immune. In our latest article, we explore essential strategies to bolster your ransomware preparedness. Don't miss this vital information to help protect your business from emerging threats.

Find out more
Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity
October 21, 2024

Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity

This week's Cybersecurity Awareness Month article features insights from Michael Caruso, Access Point's Director of Supply Chain Risk Management, on the recent pager and two-way radio attacks targeting Hezbollah. Michael provides his perspective on these incidents, highlighting the importance of securing communication channels against such threats.

Find out more
Patch Management Basics
October 18, 2024

Patch Management Basics

October is recognized as Cybersecurity Awareness Month by the National Cybersecurity Alliance (NCA) and the Cybersecurity and Infrastructure Security Agency (CISA). To celebrate and promote online security , we're posting a series of articles throughout the month. Each week, one of our cybersecurity experts weights in on a foundational cybersecurity topic. This week it's Access Point CIO Anthony Rivera on patch management. Enjoy, and stay tuned for next week's Expert Insight.

Find out more
The Impact of Cyberattacks on Hospital Patients
August 30, 2024

The Impact of Cyberattacks on Hospital Patients

Hospitals and healthcare providers have increasingly become targets of cyberattacks, which pose significant risks to patient care and safety. This document examines the various ways in which cyberattacks can disrupt hospital operations, compromise patient data security, and ultimately affect the quality of patient care. It also explores strategies and best practices that hospitals can implement to mitigate these risks and enhance their cybersecurity posture.

Find out more
Protecting Healthcare Legacy Systems with Micro-Segmentation
August 14, 2024

Protecting Healthcare Legacy Systems with Micro-Segmentation

Segmentation in network environments is nothing new. It’s common for administrators to segment the network based on logical functions and security controls. For example, the finance department is one segment, and the sales department is another segment. All segments can send traffic to email servers (for example), but user traffic does not enter finance or sales segments unless the user is authorized to access them.

Find out more
Operationalizing Cyber Resilience in Healthcare
August 14, 2024

Operationalizing Cyber Resilience in Healthcare

The healthcare sector faced a staggering 156% increase in breached records in 2023. The concern goes beyond just alarming statistics: Breaches pose a direct risk to patient safety by disrupting essential healthcare services, including eligibility verification, prescription processing, and hospital discharge procedures.

Find out more
Taking an Executive Approach to Cyber Risks
August 14, 2024

Taking an Executive Approach to Cyber Risks

Network administrators, security analysts, and software developers have a technical approach to risk management, whereas executives and a business’ board of directors have an economic one. The board of directors wants to know the monetary impact and responsibilities surrounding threats and risk management.

Find out more