Cyber Security

How do you steal 1 million Facebook account credentials? Category Index Image

How do you steal 1 million Facebook account credentials?

A large-scale phishing scam used Facebook Messenger to potentially impact millions of Facebook users. by Aspire Technology Partners Cybersecurity Team We see unusual emails in our inboxes daily.  Many are easily identified when we see poor grammar or incorrect spelling.  Yet phishing attacks are still successful, providing access to secure accounts every day. In some […]

Solving the Cybersecurity Conundrum Category Index Image

Solving the Cybersecurity Conundrum

Combining the Right Tools and Talent To Manage Risk By Doug Stevens, Vice President of Managed Services at Aspire Technology Partners Security tools that protect the perimeter, endpoints and cloud are a critical part of your security architecture, but without the resources or wherewithal to monitor events on a consistent basis, your network is still […]

The Inherent Risks of the Roblox Game and Its Impact on Students Category Index Image

The Inherent Risks of the Roblox Game and Its Impact on Students

By Aspire Security Operations Center (SOC) Team Roblox is a free-to-play online game for Windows, Mac, iOS, Android, and Xbox. It is also a game creation platform that allows users to create their own games and play games created by other users. Roblox has a massive global player base. In 2021 alone, the game’s authors […]

Latest Guidance for Ongoing Cyber Attacks in Ukraine Category Index Image

Latest Guidance for Ongoing Cyber Attacks in Ukraine

By Aspire Security Operations Center (SOC) Team INTRODUCTION In the past 20 years, there has been a massive shift in geopolitical conflict from traditional kinetic, “symmetric” warfare to what is now known as “asymmetric” warfare. Asymmetric warfare refers to conflicts between smaller factions and larger nation states, or groups that have disparate capabilities and strategies.1 […]

Trust Nothing Until Proven Trustworthy Category Index Image

Trust Nothing Until Proven Trustworthy

The Case for Zero Trust Infrastructure By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Zero trust is a concept that has been around for some time but gaining momentum as many organizations are starting to take the approach more seriously. It addresses the challenges of today’s business, including securing remote workers and hybrid […]

Solving the Remote Work Cybersecurity Conundrum Category Index Image

Solving the Remote Work Cybersecurity Conundrum

The decentralization of workers By John Rossiter, Principal Consulting Engineer, and Chief Information Security Officer When the pandemic forced companies to suddenly shift to remote-work solutions, many employees started to use personal computers and other non-corporate devices, creating substantial security issues still under-addressed. Even when employees use company-provided computers and laptops, many users admit to […]

Malicious Until Proven Innocent Category Index Image

Malicious Until Proven Innocent

Today’s Threat Landscape and its Impact on Operations By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners On a recent episode of the Digital Aspirations in Business podcast, we discussed the current threat landscape and strategies organizations can take to solve the unique cybersecurity challenges. Here is one part of the discussion. Cybersecurity threats […]

How To Strengthen Your Organization’s Malware Defense Program Category Index Image

How To Strengthen Your Organization’s Malware Defense Program

Security Solutions Architect Michael O’Connell provides an overview of how to strengthen your organizations’ Malware Defense Program with Cisco Umbrella Secure Internet Gateway By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners Today’s threat landscape is a dynamic, ever-expanding, formidable challenge for businesses of every kind. This has been exacerbated by the COVID-19 pandemic […]

Top 5 Ways to Prevent Ransomware Category Index Image

Top 5 Ways to Prevent Ransomware

By Robert Lesher. Pre-Sales Solutions Engineer and Michael O’Connell, Security Solutions Architect If you logged onto the internet in the past year or so or even turned on tv you know that ransomware attacks are happening every day. In May, the Colonial Pipeline was attacked and in the same month databases for a San Diego […]

Six Targets to Keep on Your Cybersecurity Radar Category Index Image

Six Targets to Keep on Your Cybersecurity Radar

By Michael O’Connell, Security Solutions Architect at Aspire Technology Partners There are six targets that CISOs and CIOs need to keep on their Cybersecurity Radar with the aggressive stance of cybersecurity threats and attacks becoming stronger and bolder.   As if the past year and a half hasn’t provided enough challenges for businesses to keep […]

How to Use a Data Management Platform to Protect Your Data and Your Brand Reputation Category Index Image

How to Use a Data Management Platform to Protect Your Data and Your Brand Reputation

Written by Bob Mill, Senior Director, Cohesity, & Christian Chavez, Data Center & Cloud Solutions Architect, Aspire Technology Partners Every 11 seconds, bad actors compromise a business and their data, whether through a direct hack, phishing emails, or most recently, through sophisticated and targeted ransomware campaigns. The effects of these campaigns are not simply isolated […]