<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Alert: Malware Campaign Targeting US-Based Organizations

As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.

Simplifying Vendor Management: How to Reduce Vendor Sprawl

Vendor Management – Road Map for Simplification As organizations scale, their portfolio of business support applications can expand quickly. Most mid-market executives are familiar with the situation where they are asked to approve an invoice or renewal for a ...

Thoughtful, staged migration to the cloud provides better results

What you need to know about cloud migrations Often, organizations want to move to the cloud for potential cost savings, flexibility and access to cutting-edge technology. The problem? Where to start

The Best Password Managers of 2020

With the notable increase of phishing and ransomware schemes making their way through everyone’s inboxes, there’s no better time to remind our readers of the importance of having a reliable password manager.

Team Ascend Employee Highlight – Vincent

Vincent is an Ascend Technologies Senior Engineer for ServiceNow. He shared what it means to be part of a team.

How Private Equity Firms are Staying Ahead of Digital Transformation to Maximize Value

Are you realizing the full value creation opportunity from your portfolio companies? Private Equity is moving faster than ever and there’s more competition and uncertainty. Information technology is central to doing business today and the landscape is constantly changing ...

Team Ascend Employee Highlight – Shane

Shane is an Ascend Technologies Salesforce Developer. He shared what it means to be part of a team.

Why an Enterprise Architect Pays Dividends for your Environment

An enterprise architect offers peace of mind As technology evolves, IT extends further into day-to-day business operations and enterprise architects play an ever more important role. With the change of pace comes small shifts in how organizations use their technology. This ...

Backups and Disaster Recovery Plans: Why Every Business Needs Both

It’s every business owner’s worst nightmare. Your system crashes, your hard drive crashes, you’re the victim of a cybersecurity attack and all your files are encrypted – you’ve lost all of your data.

Collaboration Software Support Desk Calls Spike 157%

As workers continue working from home and others return to offices, commonly used collaboration platforms impact worker productivity. According to aggregated data from the Ascend Technologies support desk, collaboration service desk calls spiked by over 157% in March as ...

Email is responsible for most corporate security breaches. How can you minimize the risk?

Email is a huge threat vector Between spam, phishing, business email compromise and ransomware the list of risks is long. Email gives attackers a direct line to their victims. It’s no surprise that with daily phishing attacks and spam email, business leaders are ...

Chrome Plugins for Salesforce Admins

Plugins for Awesome Salesforce Admins As a Salesforce admin for a managed services provider, I’m always on the lookout for tools that will make me more efficient at what I do. Over the past several years, both as a Salesforce admin as well as previous experience in other ...

Team Ascend Employee Highlight – Awani

Awani is an Ascend Technologies Infrastructure Application Engineer focused on Virtual Applications/Desktop, Active Directory, Device Management/Imaging and Cloud services. He shared what it means to be part of a team.

How to Develop Adaptability Among Employees to Meet the Growing Needs of Your Organization

Adaptability and Employee Growth One challenge a growing organization faces involves sustaining a team of skilled professionals that can meet the growing expectations and needs of the business. Even more difficult is the task of filling less-desirable roles, such as shifted ...

Traditional AV — Time to upgrade… or budget for your inevitable breach

Signature-based anti-virus (AV) is dead – and organizations are suffering the consequences.