Articles By ASCEND TECHNICAL TEAM
Many companies, especially small- to mid- size organizations, frequently run without a dedicated data management team. The assumption is that infrastructure teams or system admins can handle most issues relating to databases or data management; and those they can’t resolve ...
As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights ...
Quick how-to guide to using Salesforce Inspector In a previous post, I had introduced a favorite tool of mine called Salesforce Inspector. In this post, I’d like to dig into this tool a little deeper. I will share some of the specific ways it’s helped me save time (and ...
As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.
Vendor Management – Road Map for Simplification As organizations scale, their portfolio of business support applications can expand quickly. Most mid-market executives are familiar with the situation where they are asked to approve an invoice or renewal for a ...
Plugins for Awesome Salesforce Admins As a Salesforce admin for a managed services provider, I’m always on the lookout for tools that will make me more efficient at what I do. Over the past several years, both as a Salesforce admin as well as previous experience in other ...
Accelerated Roll Out Timeline Like many organizations, we had some eye opening moments as we migrated from Skype to Microsoft Teams. With Skype end of life coming in July of 2021, we knew we needed to make the move. However, the pandemic forced us to accelerate our adoption ...
There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.
March, 2020 — We recently had a Malicious Operation (Malop) pop up for one of our MSP Partners' small business clients and it turned out to be a true hit, with malicious PowerShell on a couple of hosts with RDP (port 3389) open to the internet. Our Malware Prevention ...
Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks? For offices around the world, the possibility of having to send employees home ...
Advanced attacks are out there. Advanced malware threats are hiding in software applications many of us use daily and trust. So much so that legitimate software can be difficult to distinguish. New attack vectors are continuously being discovered and attackers are finding ...
Leaving your remote desktop protocol (port 3389) servers open to the internet has been known to be a cybersecurity “bad idea” for years, but the Bluekeep vulnerability, as well as the more recent Seven Monkeys batch of disclosed vulnerabilities, have made this vital to your ...
Over the last 2 years, our team has been researching a number of platforms, frameworks, trainings, and various definitions of Endpoint Detection & Response (EDR) technology. And of course, the newest hot buzzword in cybersecurity: “Threat Hunting.” After all this ...
You know how the story goes... Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.
Ignore security at your own and your customers’ peril. Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet…