<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

TEAM ASCEND

April 27, 2022
Articles By TEAM ASCEND

Complying with the SHIELD Act: Cybersecurity Requirements for Businesses

New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.

MSP vs MSSP and the Changing Role of IT Security

Security of connected devices has been the driving motivation for digital trends in the 21st century. As people, companies, communities and even nations seek greater security, the need for strong cybersecurity is critical to success and stability for both professional and ...

Cyber-Warfare May Be On The Horizon — What It Means for the U.S.

According to a U.S. Department of Homeland Security (DHS) warning issued January 4, 2020, the government is preparing for the potential of Iran-sponsored cyberattacks following the January 3rd airstrike which killed Iranian commander Qasem Soleimani.

The 20 Guest Blog: Creating an Advanced Cybersecurity Package for MSP Clients

Security services are a great way to protect MSP clients, but should they be optional?

Breakdown of NIST Cybersecurity Framework

In 2013, recognizing the value of cybersecurity for businesses and the government at large, the President of the United States of America issued an executive order to improve critical infrastructure cybersecurity. With the aim of protecting the national and economic ...

Staying Secure: Cyber-Conscious Tips for Your Holiday Season

Black Friday, Cyber Monday, holiday gifts and New Year's celebrations – these are some of the factors that make November through January the most active online-shopping period of the year.

Cyber Defense Roster: Your key players in the fight against cyberattacks

Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.

The Rubber Ducky: Cyber meets physical with this small hacking tool

Your adversary may not always be on the other side of a screen.

Ransomware: How cyber attackers turn hacking into profit

Learn about the growing cyber threat that attackers use to make money… by taking yours.

Cyberattack Game Plan: How attackers choose their targets & plan their attack

High-profile, newsworthy cyber breaches may have you believe that only big corporations like Target, Facebook, and Equifax are where cyber criminals focus their efforts. However, it continues to be proven that small and mid-sized organizations are being targeted frequently, ...

Brute-Forcing: The inelegant but effective way attackers crack your passwords

If a single password was the barrier between an attacker and your network, would it hold up against brute force?

Mimikatz: How cyber attackers harvest credentials post-exploitation

The bad guys got their hands on a powerful tool… and now they use it to get their hands on your passwords.

LOLBins: How cyber attackers bypass traditional security defenses

Learn one method used by attackers to gain a foothold in a network and escalate their privileges.

Phishing and Command & Control: How cyber attackers use emails to gain control

One of the easiest ways for cyber criminals to begin an attack is through a malicious email. Here’s a look at how they do it.

Cyberattack Roster: What you're up against in the threat landscape

Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.