<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

TEAM ASCEND

April 27, 2022
Articles By TEAM ASCEND

Warning Signs of a Cyberattack

The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the Ponemon Institute, nearly half of all small businesses suffered a data breach in 2015. In fact, The Business Journals’ latest SMB Insight study ...

Starting Your Cybersecurity Strategy from Scratch? Follow these 4 steps...

If you are like most executives caught up in the constantly-evolving threat landscape, you’re likely overwhelmed with trying to effectively secure your data. We still encounter organizations starting their security from square one on a fairly regular basis, and we know it’s ...

Here’s Why You Need a Change Advisory Board

When it comes to technology infrastructure, change always carries some measure of risk. Even minor network and server reconfigurations can cause unexpected problems, making complete reviews of any system modification a crucial task. This includes analyzing how each ...

Hotel Hacked in Austria - Third Time's the Charm?

Once, twice, three times……no not the song, unfortunately. Three is the number of times a hotel in Turrach, Austria was hit by hackers. The cyber criminals left a backdoor on the hotel network exposed, allowing them to hold the hotel hostage with ransomware at any time. The ...

6 Scary Cybersecurity Threats Facing Small Businesses

Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to ...

Quick Guide to Mobile Device Security: Risks & Best Practices

Most people are never far away from a tablet, smartphone or both. In fact, according to a Bank of America survey, more people reach for their phone first thing in the morning than a toothbrush or cup of coffee.

Solved: Windows 10 Upgrade Changed All Documents to Read-Only

Has this happened to you? You finally decided to take the plunge and upgrade your PC to Windows 10, only to find out that all your documents are now “read-only.”

Top 5 Cybersecurity Predictions for 2017

It’s no secret that 2016 was a rough year in terms of cybersecurity attacks. We saw big name breaches at the IRS, Verizon, the DNC, LinkedIn, and who could forget- Yahoo! But while those breaches are top-of-mind and easy to remember, it’s important to also remember the ...

5 Ways Ascend Protects Your Castle with Managed Security Services

It seems that our news feeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away, or hoping that our news filters are malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ...

Two Signs Your Retail Business is Vulnerable to Cyber Risk

The retail sector continues to struggle with ever-evolving cyber threats and cyber risk. A survey earlier this year by the global consulting firm BDO found that privacy concerns related to data breaches are considered a top risk by retailers, tying for the No. 1 spot with ...

Preventing Risk in Your BYOD Healthcare Environment

As the BYOD trend becomes mainstream in healthcare, it is enabling the mobile workforce to be more efficient and productive. But the benefits of the BYOD phenomenon come with their own set of risks.

Cloud Computing Explained: SaaS, PaaS, and IaaS

Cloud strategy, integration, and support is an important part of our business here at Ascend. We help clients determine their cloud needs, assess their options, and find the right solution for their budget and situation.

Subscribing vs. Buying: The Microsoft Office Dilemma

Still using Microsoft Office 2007?

Balancing Security and Performance in the IOT Era

In 2016, Business Insider Intelligence predicted there will be 34 billion connected devices, up from 10 billion in 2015. This latest prediction nearly doubles Gartner’s 20 billion connected devices prediction, but it doesn’t come close to other projections. In any case, ...

The Biggest Vulnerability in Your Network? It’s You.

At Ascend, we write a lot about the technical aspects of cybersecurity. We focus on cutting-edge topics in malware, ransomware, even machine learning. But one of the most insidious and effective cybersecurity threats around doesn't involve a single line of code: social ...