<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

TEAM ASCEND

April 27, 2022
Articles By TEAM ASCEND

Good vs Bad Hackers?

When you think of a hacker, do you imagine a hooded villain, secretly prying into the lives of unsuspecting victims? Hackers are criminals, right? They are the brilliant masterminds behind stolen identities, disrupted lives, and bankrupted businesses. What about White Hat ...

Strong Passwords

Passwords are important. Think of them like the keys to the 'locks' on your digital accounts. Having strong, secure passwords is critical.

SCAM ALERT: Hurricane Harvey

SCAM ALERT – Bad guys are exploiting the Hurricane Harvey disaster. You may see messages on social media or you may even receive an email asking you to donate to #HurricaneHarvey. Scammers are sending fake links designed to take your money and prevent it from getting to ...

Traditional vs Advanced Malware Prevention

Think of the last time you purchased a brand new car. What if it didn’t work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition, and … nothing. The car won’t start.

Are You A Target?

When you think about organizations that have experienced a data breach, what are the first ones that come to mind? If you’re like most people, chances are your answers were likely Target, Home Depot, The IRS, Anthem Blue Cross, or any of the other big-name breaches that ...

Penetration Test or Risk Assessment? Follow our Flowchart to Find Out!

It’s not uncommon for the terms ‘Risk Assessment’ and ‘Penetration Test’ to be used interchangeably. The truth is, the two are very different.

Vulnerability Scanning Authentication

Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered.

Vulnerability Scans vs Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.

The Basics of Keylogger Protection

As a cybersecurity professional, chances are that having a keylogger installed on any of your company’s machines is one of your worst-case scenarios. Once a keylogger is installed, nothing is sacred. Passwords, proprietary information, and banking credentials are just a few ...

Flat vs Segmented Networks

The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment.

Social Engineering 101

At Ascend Technologies we spend a lot of time breaking into our clients’ networks as part of our Penetration Testing services. A major component of our methodology involves social engineering.

What does a hacker look like?

We're addressing a question we get asked all the time: What does a hacker look like?

The Ugly Side of Hardware-as-a-Service

By now, you are likely familiar with the term SaaS or “Software-as-a-Service.” This is where you pay a subscription fee to use software like Microsoft Office 365 or Dropbox. These kinds of services are billed as ones that continuously keep your software as up-to-date in a ...

SCAM OF THE WEEK: June 20, 2017

Voter data on 198 million (yes that’s million) US citizens was improperly stored and freely available for 12 days on the Internet. There has never been a data breach this big. The information includes: birthdates, home addresses, telephone numbers, political views, ...

SCAM OF THE WEEK: June 5, 2017

Here is a reminder that you need to be alert for fake emails that look like they come from your local police or State Dept of Motor Vehicles (DMV) claiming you have a traffic violation. At the moment, there is a local scam in New York that falsely states you have ...