April 17, 2025

Shared Responsibility in the Divided Cloud

In the cloud computing space, it’s important to understand that using a cloud service provider (CSP) isn’t a “set it and forget it” relationship. The shared responsibility model clearly divides security, compliance, and operational tasks between CSPs and the organizations that use their services. However, nothing solidifies these concepts like seeing them in real-world examples. This article explores three brief case studies—each drawn from a different cloud service model (IaaS, PaaS, and SaaS)—to highlight how responsibilities shift across the spectrum.

Read more
CyberWatch
|
3 min read
April 11, 2025

Employing the Concept of “Continuity of Care” in Cybersecurity

My wife, Kelly, was a pediatric nurse, having worked in healthcare for over 30 years. I'm biased, but she always got high marks in her profession, from both her peers and from patients for whom she provided care. She provided a level of care that was absolutely critical to ensure patients receive consistent, high-quality treatment across all stages of care. The importance of documentation, communication and a continuity of care was imperative – children’s lives depended on it. But what does continuity of care look like outside the world of healthcare? In the realm of cybersecurity consulting, the principle of continuity is just as vital and plays a pivotal role in safeguarding organizations from evolving cyber threats.

Read more
CyberWatch
|
3 min read
April 8, 2025

Cloud IAM Best Practices – Simplifying Security Without Compromising Access

Managing access in the cloud can be stressful. Who should be granted access? What if credentials get exposed? Should you err on the side of security or usability? If you work in Identity and Access Management (IAM), you are likely familiar with these stressors. But there’s good news: Following a few key principles can simplify navigating IAM while at the same time strengthening your organization’s security.

Read more
CyberWatch
|
3 min read
April 8, 2025

Building and Applying an SMB-Friendly Incident Response Plan

Cybersecurity isn’t just a corporate giant’s concern. Small and medium-sized businesses (SMBs) frequently land in the crosshairs of cybercriminals, often because they lack the resources to put robust defenses in place. Here’s a quick look at how you can begin preparing a flexible, cost-conscious Incident Response Plan (IRP) to help your business limit damage and recover more quickly from the most common cyber threats.

Read more

The Latest

How a PMO Transforms Cybersecurity Initiatives
March 25, 2025

How a PMO Transforms Cybersecurity Initiatives

A Project Management Office (PMO) can strengthen cybersecurity initiatives by applying structured processes, resource coordination, and risk management best practices to compliance requirements. Below are key examples of how Access Point’s PMO provides concrete, day-to-day benefits in typical security projects such as PCI DSS, HIPAA, SOC certifications, and other security enhancements.

Find out more
How to Build a Third-Party Risk Management Program
February 20, 2025

How to Build a Third-Party Risk Management Program

Every business works with vendors, suppliers, and other third parties to get things done. But these relationships come with risks—especially when it comes to cybersecurity. If a vendor gets breached, your data or systems could be exposed. This is why third-party risk management (TPRM) matters.

Find out more
Simple, Cost-Effective Ways for SMBs to Achieve Compliance
February 5, 2025

Simple, Cost-Effective Ways for SMBs to Achieve Compliance

For small and medium-sized businesses (SMBs), regulatory and industry compliance can feel like more of a burden than necessary. Many of the most critical compliance measures are also the most straightforward to implement. Below are 5 practical steps any SMB can take to meet regulatory demands without breaking the bank.

Find out more
Why a Virtual CISO (vCISO) Is a Game-Changer for Small and Mid-Sized Businesses
January 31, 2025

Why a Virtual CISO (vCISO) Is a Game-Changer for Small and Mid-Sized Businesses

Small and mid-sized businesses (SMBs) often struggle with cybersecurity because they have limited budgets and limited internal expertise. Hiring a full-time Chief Information Security Officer (CISO) isn’t always practical—or affordable. That’s where a Virtual CISO (vCISO) comes in.

Find out more
The Best Cyber Defense Is Security Awareness
December 19, 2024

The Best Cyber Defense Is Security Awareness

As Cybersecurity Awareness Month winds down, we're pleased to share one last feature from Pierre Reed, the Chief of Staff at Access Point Consulting. He explores the importance of fostering a security awareness culture within organizations. Discover how building this culture can empower your team to better protect against cyber threats.

Find out more
Ransomware Readiness: Navigating the Threat to Your Business
December 19, 2024

Ransomware Readiness: Navigating the Threat to Your Business

As we conclude our 'ransomware readiness week' of this Cybersecurity Awareness Month, it's time to take a critical look at your organization's defenses. Ransomware attacks are becoming more sophisticated, and no business is immune. In our latest article, we explore essential strategies to bolster your ransomware preparedness. Don't miss this vital information to help protect your business from emerging threats.

Find out more
Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity
October 21, 2024

Hezbollah Walkie-Talkie Attacks: An Urgent Lesson in Supply Chain Cybersecurity

This week's Cybersecurity Awareness Month article features insights from Michael Caruso, Access Point's Director of Supply Chain Risk Management, on the recent pager and two-way radio attacks targeting Hezbollah. Michael provides his perspective on these incidents, highlighting the importance of securing communication channels against such threats.

Find out more
Patch Management Basics
October 18, 2024

Patch Management Basics

October is recognized as Cybersecurity Awareness Month by the National Cybersecurity Alliance (NCA) and the Cybersecurity and Infrastructure Security Agency (CISA). To celebrate and promote online security , we're posting a series of articles throughout the month. Each week, one of our cybersecurity experts weights in on a foundational cybersecurity topic. This week it's Access Point CIO Anthony Rivera on patch management. Enjoy, and stay tuned for next week's Expert Insight.

Find out more
Rethinking Phishing Defenses in the Age of AI
October 4, 2024

Rethinking Phishing Defenses in the Age of AI

As part of Cybersecurity Awareness Month, we're featuring expert insights from our team at Access Point Consulting. Today, Clayton Smith reports on the psychology and tactics behind phishing attacks. Discover how threat actors manipulate their victims and learn practical tips to protect yourself and your organization.

Find out more