<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

ASCEND TECHNICAL TEAM

April 27, 2022
Articles By ASCEND TECHNICAL TEAM

Data Management – Covering the Support Gap

Many companies, especially small- to mid- size organizations, frequently run without a dedicated data management team. The assumption is that infrastructure teams or system admins can handle most issues relating to databases or data management; and those they can’t resolve ...

SolarWinds Breach Updates | Ascend Technologies

As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights ...

Salesforce Admin’s Guide to Increasing Efficiency Using Salesforce Inspector

Quick how-to guide to using Salesforce Inspector In a previous post, I had introduced a favorite tool of mine called Salesforce Inspector. In this post, I’d like to dig into this tool a little deeper. I will share some of the specific ways it’s helped me save time (and ...

Alert: Malware Campaign Targeting US-Based Organizations

As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.

Simplifying Vendor Management: How to Reduce Vendor Sprawl

Vendor Management – Road Map for Simplification As organizations scale, their portfolio of business support applications can expand quickly. Most mid-market executives are familiar with the situation where they are asked to approve an invoice or renewal for a ...

Chrome Plugins for Salesforce Admins

Plugins for Awesome Salesforce Admins As a Salesforce admin for a managed services provider, I’m always on the lookout for tools that will make me more efficient at what I do. Over the past several years, both as a Salesforce admin as well as previous experience in other ...

Teaming Up to Manage Microsoft Teams

Accelerated Roll Out Timeline Like many organizations, we had some eye opening moments as we migrated from Skype to Microsoft Teams. With Skype end of life coming in July of 2021, we knew we needed to make the move. However, the pandemic forced us to accelerate our adoption ...

Cyber Ranger's Handbook: Next Steps to Securing Your Home Base

There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.

Cyber Incident Analysis: Layered Security in Action

March, 2020 — We recently had a Malicious Operation (Malop) pop up for one of our MSP Partners' small business clients and it turned out to be a true hit, with malicious PowerShell on a couple of hosts with RDP (port 3389) open to the internet. Our Malware Prevention ...

Work-from-Home Security: The Unspoken Cyber Impact of Coronavirus

Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks? For offices around the world, the possibility of having to send employees home ...

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there. Advanced malware threats are hiding in software applications many of us use daily and trust. So much so that legitimate software can be difficult to distinguish. New attack vectors are continuously being discovered and attackers are finding ...

BlueKeep & Seven Monkeys: Protecting Your Organization Against RDP Vulnerabilities

Leaving your remote desktop protocol (port 3389) servers open to the internet has been known to be a cybersecurity “bad idea” for years, but the Bluekeep vulnerability, as well as the more recent Seven Monkeys batch of disclosed vulnerabilities, have made this vital to your ...

A Security Engineer's Guide to EDR

Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this ...

Spear Phishing: Be the Harder Target

You know how the story goes... Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet…