May 1, 2025

Modernizing Applications for Better Performance and Stronger Security

In many organizations, outdated applications slow down daily operations and introduce security risks. Modernizing these systems can be difficult, but clear strategies and reliable practices can streamline the effort. Learn how a well-planned modernization journey yields tangible results for both users and the bottom line.

Read more
CyberWatch
|
3 min read
April 17, 2025

Shared Responsibility in the Divided Cloud

In the cloud computing space, it’s important to understand that using a cloud service provider (CSP) isn’t a “set it and forget it” relationship. The shared responsibility model clearly divides security, compliance, and operational tasks between CSPs and the organizations that use their services. However, nothing solidifies these concepts like seeing them in real-world examples. This article explores three brief case studies—each drawn from a different cloud service model (IaaS, PaaS, and SaaS)—to highlight how responsibilities shift across the spectrum.

Read more
CyberWatch
|
3 min read
April 11, 2025

Employing the Concept of “Continuity of Care” in Cybersecurity

My wife, Kelly, was a pediatric nurse, having worked in healthcare for over 30 years. I'm biased, but she always got high marks in her profession, from both her peers and from patients for whom she provided care. She provided a level of care that was absolutely critical to ensure patients receive consistent, high-quality treatment across all stages of care. The importance of documentation, communication and a continuity of care was imperative – children’s lives depended on it. But what does continuity of care look like outside the world of healthcare? In the realm of cybersecurity consulting, the principle of continuity is just as vital and plays a pivotal role in safeguarding organizations from evolving cyber threats.

Read more
CyberWatch
|
3 min read
April 8, 2025

Cloud IAM Best Practices – Simplifying Security Without Compromising Access

Managing access in the cloud can be stressful. Who should be granted access? What if credentials get exposed? Should you err on the side of security or usability? If you work in Identity and Access Management (IAM), you are likely familiar with these stressors. But there’s good news: Following a few key principles can simplify navigating IAM while at the same time strengthening your organization’s security.

Read more

The Latest

Rethinking Phishing Defenses in the Age of AI
October 4, 2024

Rethinking Phishing Defenses in the Age of AI

As part of Cybersecurity Awareness Month, we're featuring expert insights from our team at Access Point Consulting. Today, Clayton Smith reports on the psychology and tactics behind phishing attacks. Discover how threat actors manipulate their victims and learn practical tips to protect yourself and your organization.

Find out more
The Impact of Cyberattacks on Hospital Patients
August 30, 2024

The Impact of Cyberattacks on Hospital Patients

Hospitals and healthcare providers have increasingly become targets of cyberattacks, which pose significant risks to patient care and safety. This document examines the various ways in which cyberattacks can disrupt hospital operations, compromise patient data security, and ultimately affect the quality of patient care. It also explores strategies and best practices that hospitals can implement to mitigate these risks and enhance their cybersecurity posture.

Find out more
Protecting Healthcare Legacy Systems with Micro-Segmentation
August 14, 2024

Protecting Healthcare Legacy Systems with Micro-Segmentation

Segmentation in network environments is nothing new. It’s common for administrators to segment the network based on logical functions and security controls. For example, the finance department is one segment, and the sales department is another segment. All segments can send traffic to email servers (for example), but user traffic does not enter finance or sales segments unless the user is authorized to access them.

Find out more
Operationalizing Cyber Resilience in Healthcare
August 14, 2024

Operationalizing Cyber Resilience in Healthcare

The healthcare sector faced a staggering 156% increase in breached records in 2023. The concern goes beyond just alarming statistics: Breaches pose a direct risk to patient safety by disrupting essential healthcare services, including eligibility verification, prescription processing, and hospital discharge procedures.

Find out more
Taking an Executive Approach to Cyber Risks
August 14, 2024

Taking an Executive Approach to Cyber Risks

Network administrators, security analysts, and software developers have a technical approach to risk management, whereas executives and a business’ board of directors have an economic one. The board of directors wants to know the monetary impact and responsibilities surrounding threats and risk management.

Find out more
Protecting Your Customers from Spoofed and Modified Email Messages
August 14, 2024

Protecting Your Customers from Spoofed and Modified Email Messages

Email protocols and the system that allows us to communicate with electronic messaging have been around for decades. The original system built in the 1970s wasn’t created with spoofing and phishing in mind. Weak communication protocols between sender and receiver have led to numerous critical data breaches from email-based attacks. The success of attacks stems from the way email protocols work, but businesses can protect themselves using DMARC policies set up as DNS entries.

Find out more
HIPAA Compliance Checklist
August 14, 2024

HIPAA Compliance Checklist

Whether you’re a healthcare provider or a third-party contractor storing protected health information (PHI), you likely wrestle with HIPAA compliance. HIPAA is one of the more strict compliance regulations and it’s difficult to navigate...

Find out more
The Power of Templates: From Crayons to Incident Response
August 2, 2024

The Power of Templates: From Crayons to Incident Response

In the business world, particularly cybersecurity, organizations often struggle to respond efficiently and effectively to incidents. The lack of standardized processes can lead to chaos, delays, and significant impacts on business operations.

Find out more
Dangers of Unpatched Healthcare IoT and Network Systems
August 1, 2024

Dangers of Unpatched Healthcare IoT and Network Systems

It’s not uncommon for large healthcare organizations to support patients via thousands of systems––servers, network hardware, and Internet of Things (IoT) devices particular to the medical practice. Healthcare organizations are primary targets for attackers and are required to follow strict regulations to stop data breaches. HIPAA violations are costly, and unpatched hardware leaves healthcare systems vulnerable to numerous threats including malware, ransomware, security bypasses, and possible remote code execution. Patching systems with the latest update is critical to data protection and risk management, and it keeps the company compliant with HIPAA guidelines.

Find out more