The Inherent Risks of the Roblox Game and Its Impact on Students

The Inherent Risks of the Roblox Game and Its Impact on Students Featured Image

The Inherent Risks of the Roblox Game and Its Impact on Students

By Aspire Security Operations Center (SOC) Team Roblox is a free-to-play online game for Windows, Mac, iOS, Android, and Xbox. It is also a game creation platform that allows users to create their own games and play games created by other users. Roblox has a massive global player base. In 2021 alone, the game’s authors […]

Living in the Cloud and Modernizing Your Data Center – Part 1 Featured Image

Living in the Cloud and Modernizing Your Data Center – Part 1

Modernizing your data center — the right way — with a focus on the Cloud. By Christian Chavez, Data Center Cloud Solutions Architect The Cloud is a term often thrown around but rarely nailed down. But it’s essential to do so because of its ubiquity in today’s world. Businesses and consumers use the Cloud every […]

An Insider’s Guide to the New Webex App Featured Image

An Insider’s Guide to the New Webex App

Are you ready to make the move? By Stephen Howard, Solutions Engineer Cisco Webex has begun transitioning organizations from the older Webex Meetings App (Desktop App) to the Webex App. The Webex app is an all-inclusive collaboration platform with meetings, messaging, and calling rolled into a single application. Cisco started the migration process in January […]

Latest Guidance for Ongoing Cyber Attacks in Ukraine Featured Image

Latest Guidance for Ongoing Cyber Attacks in Ukraine

By Aspire Security Operations Center (SOC) Team INTRODUCTION In the past 20 years, there has been a massive shift in geopolitical conflict from traditional kinetic, “symmetric” warfare to what is now known as “asymmetric” warfare. Asymmetric warfare refers to conflicts between smaller factions and larger nation states, or groups that have disparate capabilities and strategies.1 […]

Trust Nothing Until Proven Trustworthy Featured Image

Trust Nothing Until Proven Trustworthy

The Case for Zero Trust Infrastructure By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Zero trust is a concept that has been around for some time but gaining momentum as many organizations are starting to take the approach more seriously. It addresses the challenges of today’s business, including securing remote workers and hybrid […]

Solving the Remote Work Cybersecurity Conundrum Featured Image

Solving the Remote Work Cybersecurity Conundrum

The decentralization of workers By John Rossiter, Principal Consulting Engineer, and Chief Information Security Officer When the pandemic forced companies to suddenly shift to remote-work solutions, many employees started to use personal computers and other non-corporate devices, creating substantial security issues still under-addressed. Even when employees use company-provided computers and laptops, many users admit to […]

Malicious Until Proven Innocent Featured Image

Malicious Until Proven Innocent

Today’s Threat Landscape and its Impact on Operations By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners On a recent episode of the Digital Aspirations in Business podcast, we discussed the current threat landscape and strategies organizations can take to solve the unique cybersecurity challenges. Here is one part of the discussion. Cybersecurity threats […]

Top Benefits of a Cloud-Based Firewall Featured Image

Top Benefits of a Cloud-Based Firewall

By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Firewalls are one of the most fundamental methods of defense IT security professionals use to protect against attackers. At its most basic, a firewall serves as a gate between your network and the open internet. How secure that gate depends on the features your firewall […]

How To Strengthen Your Organization’s Malware Defense Program Featured Image

How To Strengthen Your Organization’s Malware Defense Program

Security Solutions Architect Michael O’Connell provides an overview of how to strengthen your organizations’ Malware Defense Program with Cisco Umbrella Secure Internet Gateway By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Today’s threat landscape is a dynamic, ever-expanding, formidable challenge for businesses of every kind. This has been exacerbated by the COVID-19 pandemic […]

Top 5 Ways to Prevent Ransomware Featured Image

Top 5 Ways to Prevent Ransomware

By Robert Lesher. Pre-Sales Solutions Engineer and Michael O’Connell, Security Solutions Architect If you logged onto the internet in the past year or so or even turned on tv you know that ransomware attacks are happening every day. In May, the Colonial Pipeline was attacked and in the same month databases for a San Diego […]

How to Deploy HyperFlex Edge (When You Can’t Access the Internet) Featured Image

How to Deploy HyperFlex Edge (When You Can’t Access the Internet)

By Jeff Kamen, Data Center Senior Delivery Engineer, Aspire Technology Partners The Problem Statement How does one deploy Hyperflex Edge when you cannot access the Internet? HyperFlex Edge has quickly become the go-to solution for remote hyperconverged solutions. The ability to deploy a Cisco HyperFlex Edge at remote locations using Intersight makes HyperFlex Edge that […]

Transformational Applications of Private LTE & 5G for the Secure Modern Network Featured Image

Transformational Applications of Private LTE & 5G for the Secure Modern Network

By Greg Frasca, Digital Solutions Consultant and Cody Harris, Director of Digital Architectures, Aspire Technology Partners In today’s modern network, user engagement and data transfer happen at the edge. This includes the internet of things (IoT), mobile applications, remote patient monitoring devices, distribution line-workflow automation, and smart cities with municipalities leveraging data from connected roadway […]