Insights

What we’re seeing out in the boundless world of IT and how you can make the most of it

Insights focusing on: Cyber security

Access Tech: Is your company using multi-cloud? How has that affected your IT department?

The fall and rise of IT: Multi-cloud

A 2022 survey of 1,000 technology practitioners suggests that as more organizations embrace multi-cloud computing, the number of challenges being encountered is starting to multiply as well.   ...
Read more
Access Tech: Do you rely on a medical device? How secure is your device?

IT departments must ensure security of medical devices

Industry experts have been apprehensive about the cybersecurity vulnerabilities posed by the increasing number of IoT medical devices. ...
Read more
Access Tech: Phishing schemes are more rampant as people continue to rely on technology for their personal and work lives. Don't get phished, check on your security today.

One phish, two phish – Phishing attacks continue to grow  

The 2021 FBI Internet Crime Report reveals that spear phishing scams snagged more victims than any other type of internet scam last year. Phishing and related tactics are attempts to trick victims into disclosing their credentials and other sensitive information. ...
Read more
Access Tech: Do you have the foundations right for your security system? Have you set up barriers for the basics before diving into more complex security?

Cybersecurity: Do you have the basics right?

A common thread to cybersecurity is getting the basics right. There are “low-hanging fruit” that could make a positive impact on your organization’s risk profile with relatively little time, effort, and expense. ...
Read more
Access Tech: IT Departments who work within healthcare must keep up with healthcare regulations and address the ever-growing onslaught of security threats.

IT Departments must keep cybersecurity in line with healthcare regulations 

For healthcare organizations, when it comes to IT, there is an ever-growing and sometimes onerous list of rules, regulations, and laws that must be followed. Failure to do so can result in reputational ruin, hefty penalties, or both.   ...
Read more
Image

Combining SD-WAN and ZTNA for a security dream team 

Like many of the most valuable advances, SD-WAN was the right solution at the right time. It enabled organizations to accelerate their digital transformation efforts by providing flexible, optimized access to critical applications and resources to workers in remote offices. ...
Read more
Image

Cybersecurity Warning: OpenSSL vulnerability

Two vulnerabilities were discovered in OpenSSL version 3.0.4 that impacts RSA Private Keys and AES OCB Encryption operations ...
Read more
Image

Cybersecurity warning: Mitel VoIP vulnerability

A known remote code execution vulnerability, CVE-2022-29499, was discovered with the Linux-based Mitel VoIP (Voice over Internet Protocol) application ...
Read more