October 23, 2025

What Cyber Liability Insurance Really Covers — and When It Makes Sense

When a cyber incident strikes, most business owners worry: “What do I do now?” Access Point CIO Anthony Rivera and Couch Braunsdorf Insurance Group CIO Eric Wistrand explore how cyber liability insurance can help fill the gap between technical readiness and financial recovery. Following are key takeaways from the recording— and the reasons why this topic deserves a closer look for small and mid-sized organizations.

Read more
CyberWatch
|
3 min read
October 6, 2025

Security Culture Still Matters in 2025

Sloppy security practices in the workplace can undermine a company’s investments in tools and technology. Even the most advanced firewalls, intrusion detection systems, or encryption protocols cannot compensate for employees who are unaware of risks or uninformed about best practices.

Read more
CyberWatch
|
3 min read
September 29, 2025

Insights from this Year's IBM Report

Each year, IBM releases its Cost of a Data Breach Report, one of the most widely cited studies on the financial and operational impact of cyber incidents. The latest edition shows that while costs continue to rise — now averaging $4.88 million globally per breach, with U.S. organizations facing even higher averages — the story is about preparation and discipline. The numbers remind us that breaches are not rare, isolated events. They are part of the operating environment organizations must manage. The question isn’t if an incident will occur, but how ready your team will be when it does.

Read more
CyberWatch
|
3 min read
September 8, 2025

Navigating the Double-Edged Sword of AI

How generative AI is already being used for fraud, impersonation, and cybercrime—and what your organization can do about it.

Read more

The Latest

Spoofed LinkedIn Profiles — and How External Monitoring Protects Your Business
July 2, 2025

Spoofed LinkedIn Profiles — and How External Monitoring Protects Your Business

LinkedIn is a powerful platform for building relationships and finding opportunities — and attackers know it. Increasingly, threat actors are creating spoofed LinkedIn profiles to target job seekers and employees, using the trust we place in professional networks against us.

Find out more
Modernizing Applications for Better Performance and Stronger Security
July 1, 2025

Modernizing Applications for Better Performance and Stronger Security

In many organizations, outdated applications slow down daily operations and introduce security risks. Modernizing these systems can be difficult, but clear strategies and reliable practices can streamline the effort. Learn how a well-planned modernization journey yields tangible results for both users and the bottom line.

Find out more
Crafting a Resilient Cloud Backup Strategy
July 1, 2025

Crafting a Resilient Cloud Backup Strategy

Most organizations focus on agility and scale when it comes to cloud solutions, yet a reliable backup plan remains the backbone of a stable environment. Even small oversights in your backup process can turn into bigger complications, which we’d like to see you avoid. Here, we offer our experience-based insights on the fundamental steps businesses can take to bolster their backup strategy, drawing on our combined backgrounds in IT, security, and DevOps.

Find out more
Cloud IAM Best Practices – Simplifying Security Without Compromising Access
July 1, 2025

Cloud IAM Best Practices – Simplifying Security Without Compromising Access

Managing access in the cloud can be stressful. Who should be granted access? What if credentials get exposed? Should you err on the side of security or usability? If you work in Identity and Access Management (IAM), you are likely familiar with these stressors. But there’s good news: Following a few key principles can simplify navigating IAM while at the same time strengthening your organization’s security.

Find out more
Building and Applying an SMB-Friendly Incident Response Plan
July 1, 2025

Building and Applying an SMB-Friendly Incident Response Plan

Cybersecurity isn’t just a corporate giant’s concern. Small and medium-sized businesses (SMBs) frequently land in the crosshairs of cybercriminals, often because they lack the resources to put robust defenses in place. Here’s a quick look at how you can begin preparing a flexible, cost-conscious Incident Response Plan (IRP) to help your business limit damage and recover more quickly from the most common cyber threats.

Find out more
Shared Responsibility in the Divided Cloud
July 1, 2025

Shared Responsibility in the Divided Cloud

In the cloud computing space, it’s important to understand that using a cloud service provider (CSP) isn’t a “set it and forget it” relationship. The shared responsibility model clearly divides security, compliance, and operational tasks between CSPs and the organizations that use their services. However, nothing solidifies these concepts like seeing them in real-world examples. This article explores three brief case studies—each drawn from a different cloud service model (IaaS, PaaS, and SaaS)—to highlight how responsibilities shift across the spectrum.

Find out more
How to Build a Third-Party Risk Management Program
July 1, 2025

How to Build a Third-Party Risk Management Program

Every business works with vendors, suppliers, and other third parties to get things done. But these relationships come with risks—especially when it comes to cybersecurity. If a vendor gets breached, your data or systems could be exposed. This is why third-party risk management (TPRM) matters.

Find out more
Rethinking Phishing Defenses in the Age of AI
July 1, 2025

Rethinking Phishing Defenses in the Age of AI

As part of Cybersecurity Awareness Month, we're featuring expert insights from our team at Access Point Consulting. Today, Clayton Smith reports on the psychology and tactics behind phishing attacks. Discover how threat actors manipulate their victims and learn practical tips to protect yourself and your organization.

Find out more
Expert Insights on Cloud Security
June 26, 2025

Expert Insights on Cloud Security

As cloud adoption accelerates, so do the stakes for keeping data and systems secure. In early 2025, a major tech conglomerate suffered a high-profile breach when a misconfigured cloud firewall exposed sensitive data from millions of customers across multiple continents. Investigations revealed that overly broad access permissions and poor visibility into their overall security posture contributed to the incident—underscoring the fact that, despite sophisticated tools, even a single gap in configuration can unravel an entire security program. Below, Anthony Rivera and Kevin Hartwig explain how to prevent such missteps by strengthening identity controls, segmenting networks, guarding data, ensuring compliance, managing your security posture, and creating a culture of awareness. 

Find out more