What we’re seeing out in the boundless world of IT and how you can make the most of it

Access Tech: Does your company use Microsoft Teams?

Microsoft removing Teams from bundles

Announced on April 1st, Microsoft Teams will no longer be included with Microsoft 365 Enterprise and Office 365 Enterprise licensing.   As per an email sent to Access ...
Read more
Access Tech: Have you been affected by these breaches?

Security Advisory: Citrix, PAN, and Fortinet Recent Vulnerabilities

Over the past week, Access Tech has been addressing many of our clients about the following zero-day vulnerabilities: Citrix: XenServer and Citrix Hypervisor Security Update Two issues have been ...
Read more
Access Tech: Is your organization committed to integrating security into network products?

SASE: Navigating the Convergence

Organizations have long been faced with issues about high-speed connectivity to applications for users on and off network, how to secure their networks from threats both inside and ...
Read more
Access Tech: Do you utilize zero-trust?

Zero-trust made simple

Zero-trust is undoubtedly a buzzword in today’s tech landscape, and for good reason. It offers a strategy to prevent breaches and minimize their impact. By focusing on controllable ...
Read more
Access Tech: Choosing the right security platform is crucial for organizations, considering both needs and IT team skillsets. Threat detection and response solutions, such as EDR, MDR and XDR play vital roles. Which should your business choose?

EDR vs MDR vs XDR: What’s best for your business?

Selecting a security platform that provides the right level of protection based on the organization’s needs and their IT team’s skillset is vital. A determined attacker can find ...
Read more
Access Tech: As ransomware has evolved, attackers have shifted their focus from mere encryption to extortion for financial gain. How can you protect your organization’s data?

Tips to lock down your backup infrastructure

Ransomware that’s aimed at backup infrastructure can put critical backups at risk as well as expose sensitive corporate data. Ransomware has unfortunately matured in recent years. Attackers have ...
Read more

Portland Ice Storm: Pipe burst

President Trey Lackey had been out of town during the weekend ice storm in January. He had two families holed up in his house because of power outages. ...
Read more
Access Tech: How is your IoT ecosystem?

What is IoT? The internet of things explained

The internet of things (IoT) is a catch-all term for the growing number of electronics that aren’t traditional computing devices, but are connected to the internet to send ...
Read more