Solving the Cybersecurity Conundrum

Solving the Cybersecurity Conundrum Featured Image

Solving the Cybersecurity Conundrum

Combining the Right Tools and Talent To Manage Risk By Doug Stevens, Vice President of Managed Services at Aspire Technology Partners Security tools that protect the perimeter, endpoints and cloud are a critical part of your security architecture, but without the resources or wherewithal to monitor events on a consistent basis, your network is still […]

Wi-Fi 6 Has Changed the Way We Connect Featured Image

Wi-Fi 6 Has Changed the Way We Connect

BY Cody Harris, Director, Digital Architectures Nearly every device we use, whether it’s our cell phone, watch, tablet or computer connects using Wi-Fi. Historically, workspaces needed to be pre-wired to facilitate connections from user devices to the applications and data required to perform their job. This was done by running various cables through the walls […]

The Inherent Risks of the Roblox Game and Its Impact on Students Featured Image

The Inherent Risks of the Roblox Game and Its Impact on Students

By Aspire Security Operations Center (SOC) Team Roblox is a free-to-play online game for Windows, Mac, iOS, Android, and Xbox. It is also a game creation platform that allows users to create their own games and play games created by other users. Roblox has a massive global player base. In 2021 alone, the game’s authors […]

Living in the Cloud and Modernizing Your Data Center – Part 1 Featured Image

Living in the Cloud and Modernizing Your Data Center – Part 1

Modernizing your data center — the right way — with a focus on the Cloud. By Christian Chavez, Data Center Cloud Solutions Architect, and Jack Faber, Solutions Architect at Aspire Technology Partners The Cloud is a term often thrown around but rarely nailed down. But it’s essential to do so because of its ubiquity in […]

An Insider’s Guide to the New Webex App Featured Image

An Insider’s Guide to the New Webex App

Are you ready to make the move? By Stephen Howard, Solutions Engineer Cisco Webex has begun transitioning organizations from the older Webex Meetings App (Desktop App) to the Webex App. The WebEx app is an all-inclusive collaboration platform with meetings, messaging, and calling rolled into a single application. Cisco started the migration process in January […]

Latest Guidance for Ongoing Cyber Attacks in Ukraine Featured Image

Latest Guidance for Ongoing Cyber Attacks in Ukraine

By Aspire Security Operations Center (SOC) Team INTRODUCTION In the past 20 years, there has been a massive shift in geopolitical conflict from traditional kinetic, “symmetric” warfare to what is now known as “asymmetric” warfare. Asymmetric warfare refers to conflicts between smaller factions and larger nation states, or groups that have disparate capabilities and strategies.1 […]

Trust Nothing Until Proven Trustworthy Featured Image

Trust Nothing Until Proven Trustworthy

The Case for Zero Trust Infrastructure By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Zero trust is a concept that has been around for some time but gaining momentum as many organizations are starting to take the approach more seriously. It addresses the challenges of today’s business, including securing remote workers and hybrid […]

Solving the Remote Work Cybersecurity Conundrum Featured Image

Solving the Remote Work Cybersecurity Conundrum

The decentralization of workers By John Rossiter, Principal Consulting Engineer, and Chief Information Security Officer When the pandemic forced companies to suddenly shift to remote-work solutions, many employees started to use personal computers and other non-corporate devices, creating substantial security issues still under-addressed. Even when employees use company-provided computers and laptops, many users admit to […]

Malicious Until Proven Innocent Featured Image

Malicious Until Proven Innocent

Today’s Threat Landscape and its Impact on Operations By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners On a recent episode of the Digital Aspirations in Business podcast, we discussed the current threat landscape and strategies organizations can take to solve the unique cybersecurity challenges. Here is one part of the discussion. Cybersecurity threats […]

Top Benefits of a Cloud-Based Firewall Featured Image

Top Benefits of a Cloud-Based Firewall

By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Firewalls are one of the most fundamental methods of defense IT security professionals use to protect against attackers. At its most basic, a firewall serves as a gate between your network and the open internet. How secure that gate depends on the features your firewall […]