Resources

Refine your skills, enhance your expertise, and bolster your professional credibility with Access Point Consulting's expansive set of resources. Browse our catalog of articles and bulletins for expert cybersecurity guidance, best practices, timely vulnerability and incident reports, breaking industry news, and more.

July 17, 2024

Signal Jammed: Data Stolen from 109M AT&T Customers

In April of 2024, AT&T suffered a significant data breach where threat actors illegally downloaded call and text records of approximately 109 million customer accounts.The AT&T data breach was the result of compromised credentials used to access the company's Snowflake account. Snowflake, a cloud-based database provider, allows customers to perform data warehousing and analytics on large volumes of data. This breach is part of a broader wave of data theft attacks targeting Snowflake customers, attributed to the financially motivated threat actor UNC5537, who used credentials stolen via infostealer malware.

Find out more
July 17, 2024

Best Practices for Password Hygiene and Multi-Factor Authentication

Implementing strong passwords is essential to protect your online accounts from unauthorized access. This article explains why.

Find out more
July 16, 2024

Best Practices to Mitigate the Impact of Phishing

Understanding Phishing Phishing is a form of social engineering where cybercriminals aim to trick individuals into revealing sensitive information or downloading malware. This type of attack typically involves sending an email that appears to come from a legitimate, trusted source. The email often contains a brief message followed by a link or attachment. Clicking the link usually redirects the victim to a fake login page that requests their credentials, while attachments may contain malware. Cybercriminals seek information such as login credentials, bank account details, and credit card information to commit identity theft and financial fraud.

Find out more

Expert Insights

View all articles
The Power of Templates: From Crayons to Incident Response

The Power of Templates: From Crayons to Incident Response

In the business world, particularly cybersecurity, organizations often struggle to respond efficiently and effectively to incidents. The lack of standardized processes can lead to chaos, delays, and significant impacts on business operations.

Find out more
369631b0-ee94-46c3-a98d-3a8cea4c97c9
Virtual
Live

How to Implement Basic Security Controls in Your Organization

Tue, August 6, 2024 | 12:00 PM
Live
Virtual

Join Access Point at Coca-Cola Park

Sun, July 14, 2024 | 1:05 PM
Live
Virtual

Reception at Top Golf | SecureWorld Philadelphia

Wed, April 17, 2024 | 4:30 PM-7:30 PM
Live
Virtual

Join Access Point at HIMSS24

Tue, March 12, 2024 - Fri, March 15, 2024