Insights

What we’re seeing out in the boundless world of IT and how you can make the most of it

Insights focusing on: Cyber security

Access Tech: Phishing schemes are more rampant as people continue to rely on technology for their personal and work lives. Don't get phished, check on your security today.

One phish, two phish – Phishing attacks continue to grow  

The 2021 FBI Internet Crime Report reveals that spear phishing scams snagged more victims than any other type of internet scam last year. Phishing and related tactics are attempts to trick victims into disclosing their credentials and other sensitive information. ...
Read more
Access Tech: Do you have the foundations right for your security system? Have you set up barriers for the basics before diving into more complex security?

Cybersecurity: Do you have the basics right?

A common thread to cybersecurity is getting the basics right. There are “low-hanging fruit” that could make a positive impact on your organization’s risk profile with relatively little time, effort, and expense. ...
Read more
Access Tech: IT Departments who work within healthcare must keep up with healthcare regulations and address the ever-growing onslaught of security threats.

IT Departments must keep cybersecurity in line with healthcare regulations 

For healthcare organizations, when it comes to IT, there is an ever-growing and sometimes onerous list of rules, regulations, and laws that must be followed. Failure to do so can result in reputational ruin, hefty penalties, or both.   ...
Read more
Image

Combining SD-WAN and ZTNA for a security dream team 

Like many of the most valuable advances, SD-WAN was the right solution at the right time. It enabled organizations to accelerate their digital transformation efforts by providing flexible, optimized access to critical applications and resources to workers in remote offices. ...
Read more
Image

Cybersecurity Warning: OpenSSL vulnerability

Two vulnerabilities were discovered in OpenSSL version 3.0.4 that impacts RSA Private Keys and AES OCB Encryption operations ...
Read more
Image

Cybersecurity warning: Mitel VoIP vulnerability

A known remote code execution vulnerability, CVE-2022-29499, was discovered with the Linux-based Mitel VoIP (Voice over Internet Protocol) application ...
Read more
Insights from Access Tech

Tomorrow is Change Your Password Day!

Do you have that one great password that you love? It’s your go-to when creating a new account. You love it because it’s reliable and usually tied to ...
Read more
Access Tech: With the new year comes new hacks. Is your business prepared for what hackers have in store for 2022?

Cybersecurity in 2022: Are you protected? 

Who trusts you with their data? In 2022, improve your cybersecurity system. Hackers and their tactics are developing ...
Read more