<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

ASCEND TECHNICAL TEAM

Recent Posts

Data Management – Covering the Support Gap

Many companies, especially small- to mid- size organizations, frequently run without a dedicated data management team. The assumption is that infrastructure teams or system admins can handle most issues relating to databases or data management; and those they can’t resolve can be handled by the application teams. Having a data management team can help mitigate risks and provide recognizable...

Posted on January 15, 2021

SolarWinds Breach Updates | Ascend Technologies

As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights directly from our Security Operations Centers (SOCs).

Posted on December 13, 2020

Salesforce Admin’s Guide to Increasing Efficiency Using Salesforce Inspector

Quick how-to guide to using Salesforce Inspector

In a previous post, I had introduced a favorite tool of mine called Salesforce Inspector.  In this post, I’d like to dig into this tool a little deeper. I will share some of the specific ways it’s helped me save time (and hopefully will help you too!)

Posted on August 02, 2020

Alert: Malware Campaign Targeting US-Based Organizations

As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.

Posted on July 30, 2020

Simplifying Vendor Management: How to Reduce Vendor Sprawl

Vendor Management – Road Map for Simplification

As organizations scale, their portfolio of business support applications can expand quickly. Most mid-market executives are familiar with the situation where they are asked to approve an invoice or renewal for a business-critical tool that a team used to innovate or accelerate a new initiative. Common questions arise: “When did we put this in...

Posted on July 26, 2020

Tagged IT Strategy

Chrome Plugins for Salesforce Admins

Plugins for Awesome Salesforce Admins

As a Salesforce admin for a managed services provider, I’m always on the lookout for tools that will make me more efficient at what I do. Over the past several years, both as a Salesforce admin as well as previous experience in other tech roles, I’ve found Chrome plugins are constantly being created to make my life easier. I’d like to share a few of my...

Posted on June 27, 2020

Teaming Up to Manage Microsoft Teams

Accelerated Roll Out Timeline

Like many organizations, we had some eye opening moments as we migrated from Skype to Microsoft Teams. With Skype end of life coming in July of 2021, we knew we needed to make the move.  However, the pandemic forced us to accelerate our adoption timelines.

Posted on June 07, 2020

Cyber Ranger's Handbook: Next Steps to Securing Your Home Base

There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.

Posted on April 08, 2020

Cyber Incident Analysis: Layered Security in Action

March, 2020 — We recently had a Malicious Operation (Malop) pop up for one of our MSP Partners' small business clients and it turned out to be a true hit, with malicious PowerShell on a couple of hosts with RDP (port 3389) open to the internet. Our Malware Prevention thankfully blocked the malicious payloads, but something was still going on that needed to be tracked down and remediated. 

Posted on March 17, 2020

Work-from-Home Security: The Unspoken Cyber Impact of Coronavirus

Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks?

For offices around the world, the possibility of having to send employees home indefinitely as the virus spreads is becoming very real. If your organization hasn’t needed work-from-home policies in place before...

Posted on March 06, 2020

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there.

Advanced malware threats are hiding in software applications many of us use daily and trust.  So much so that legitimate software can be difficult to distinguish.  New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.

Posted on August 28, 2019

BlueKeep & Seven Monkeys: Protecting Your Organization Against RDP Vulnerabilities

Leaving your remote desktop protocol (port 3389) servers open to the internet has been known to be a cybersecurity “bad idea” for years, but the Bluekeep vulnerability, as well as the more recent Seven Monkeys batch of disclosed vulnerabilities, have made this vital to your business’s survival.

Posted on August 21, 2019

A Security Engineer's Guide to EDR

Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this research, we have a team put together and have partnered with a platform we believe in, allowing us to be able to offer this service to...

Posted on October 23, 2018

Spear Phishing: Be the Harder Target

You know how the story goes...

Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.

Posted on August 14, 2018

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril.

Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… 

Posted on July 27, 2018

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?