Safety & Security in Schools: Looking Beyond Closed Doors

Safety & Security in Schools: Looking Beyond Closed Doors Featured Image

Safety & Security in Schools: Looking Beyond Closed Doors

Safety and security in schools are constantly evolving. By Aspire Technology Partners Security Practice Experts Parents and the community demand safe schools, whether it’s a single building, a multiple-building campus, or multiple campuses across the region. Recent events only reinforce the need to secure, monitor, and protect students, faculty, and staff. Protecting people and property […]

Navigating a Hybrid, Modernized Work World Featured Image

Navigating a Hybrid, Modernized Work World

A Four-Part Checklist for Hybrid Work Success By Joe Latessa, Senior Account Manager at Aspire Technology Partners For much of the business world, the term hybrid has come to mean more than a car that runs on gas and EV. Instead, it has come to represent the way that the business now works. Employees who […]

How do you steal 1 million Facebook account credentials? Featured Image

How do you steal 1 million Facebook account credentials?

A large-scale phishing scam used Facebook Messenger to potentially impact millions of Facebook users. by Aspire Technology Partners Cybersecurity Team We see unusual emails in our inboxes daily.  Many are easily identified when we see poor grammar or incorrect spelling.  Yet phishing attacks are still successful, providing access to secure accounts every day. In some […]

Solving the Cybersecurity Conundrum Featured Image

Solving the Cybersecurity Conundrum

Combining the Right Tools and Talent To Manage Risk By Doug Stevens, Vice President of Managed Services at Aspire Technology Partners Security tools that protect the perimeter, endpoints and cloud are a critical part of your security architecture, but without the resources or wherewithal to monitor events on a consistent basis, your network is still […]

Wi-Fi 6 Has Changed the Way We Connect Featured Image

Wi-Fi 6 Has Changed the Way We Connect

BY Cody Harris, Director, Digital Architectures Nearly every device we use, whether it’s our cell phone, watch, tablet or computer connects using Wi-Fi. Historically, workspaces needed to be pre-wired to facilitate connections from user devices to the applications and data required to perform their job. This was done by running various cables through the walls […]

The Inherent Risks of the Roblox Game and Its Impact on Students Featured Image

The Inherent Risks of the Roblox Game and Its Impact on Students

By Aspire Security Operations Center (SOC) Team Roblox is a free-to-play online game for Windows, Mac, iOS, Android, and Xbox. It is also a game creation platform that allows users to create their own games and play games created by other users. Roblox has a massive global player base. In 2021 alone, the game’s authors […]

Living in the Cloud and Modernizing Your Data Center – Part 1 Featured Image

Living in the Cloud and Modernizing Your Data Center – Part 1

Modernizing your data center — the right way — with a focus on the Cloud. By Christian Chavez, Data Center Cloud Solutions Architect The Cloud is a term often thrown around but rarely nailed down. But it’s essential to do so because of its ubiquity in today’s world. Businesses and consumers use the Cloud every […]

An Insider’s Guide to the New Webex App Featured Image

An Insider’s Guide to the New Webex App

Are you ready to make the move? By Stephen Howard, Solutions Engineer Cisco Webex has begun transitioning organizations from the older Webex Meetings App (Desktop App) to the Webex App. The Webex app is an all-inclusive collaboration platform with meetings, messaging, and calling rolled into a single application. Cisco started the migration process in January […]

Latest Guidance for Ongoing Cyber Attacks in Ukraine Featured Image

Latest Guidance for Ongoing Cyber Attacks in Ukraine

By Aspire Security Operations Center (SOC) Team INTRODUCTION In the past 20 years, there has been a massive shift in geopolitical conflict from traditional kinetic, “symmetric” warfare to what is now known as “asymmetric” warfare. Asymmetric warfare refers to conflicts between smaller factions and larger nation states, or groups that have disparate capabilities and strategies.1 […]

Trust Nothing Until Proven Trustworthy Featured Image

Trust Nothing Until Proven Trustworthy

The Case for Zero Trust Infrastructure By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Zero trust is a concept that has been around for some time but gaining momentum as many organizations are starting to take the approach more seriously. It addresses the challenges of today’s business, including securing remote workers and hybrid […]