<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Team Ascend Employee Highlight – Tiffany

Tiffany is an Ascend Technologies Senior Operations Analyst. She shared her perspectives on what it means to be part of a team. What is your favorite sports team? Chicago Bears

Securing SMTP AUTH in Exchange Online

In case you don’t follow the EHLO blog, a recent announcement discussed some upcoming security changes to the Exchange Online service. Microsoft will be disabling SMTP AUTH in all new Office 365 tenants. They are also identifying current tenants that do not make use of the ...

Team Ascend Employee Highlight – Adam

Adam is an Ascend Technologies Engineer. He shared his perspectives on what it means to be part of a team. What is your favorite sports team? Chicago Sting (for those who remember them). Current team: Chicago Blackhawks

How to Use Amazon WorkSpaces to Work with Partners

What Desktop as a Service and WorkSpaces Means for the Remote Workforce Desktop as a Services (DaaS) platforms have quickly become important technology with most employees shifting to work from home. Ascend Technologies works with a number of different DaaS platforms. ...

Stick ‘Em Up: How Ransomware Can Hold Your Business Hostage

One of the most widespread and damaging security threats to businesses today continues to be ransomware. Ransomware is a form of malicious software (or malware) that encrypts files on a computer, file share, and/or server so they become unusable. The attackers then extort ...

The Non-Technical Guide to Cybersecurity for Your Organization

In the current threat landscape, organizations of all sizes are expected to get cybersecurity right—or face the consequences of not being protected. But what is cybersecurity, and what does it involve? Is there a way to be 100% protected? This guide will cover cybersecurity ...

Ultimate Cybersecurity Glossary: Basic Terms & Buzzwords Explained

Cybersecurity is complex — the vocabulary alone can be a barrier to many non-technical users just trying to understand what cybersecurity is and what it involves.

Data Management’s Role in Application Development

Are your business applications not running optimally or incurring performance problems, causing lost productivity by your team members or frustration from clients? While many organizations primarily focus on improving the application or allocating more resources towards ...

Integrating Microsoft MFA with Cisco AnyConnect

Multi-Factor Authentication (MFA) is an excellent means to further secure your publicly available services. Services like Microsoft Office 365 and remote access VPN can all benefit from having an additional layer of security. So let's talk about how you can integrate ...

Deepfakes: How to Spot 2020’s Top Cybersecurity Threat

If you’ve heard the word “deepfake” rolling around recently and haven’t been able to decipher exactly what it means, here’s an example.

Remote Working: 5 Password Security Tips You Need to Know

At Ascend, our security engineers have truly seen the good, the bad, and the ugly of cybersecurity. From investigating breaches to setting up first-time security solutions for small businesses, they’ve found that a common vulnerability is something that not many people ...

Scam Alert: Coupon Scams Target Users Spending More Time Online

Share link, get coupon? Not so fast.

Ascend Technologies Quick, Low-Cost Amazon WorkSpaces Implementation

As many organizations navigate the new normal of having a 100% remote workforce, there are several challenges they face. How do you ensure adherence to corporate policies and norms? How do ensure your team’s cybersecurity posture is maintained? How do you support remote ...

Cyber Ranger's Handbook: Next Steps to Securing Your Home Base

There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.

Guest Blog: How to Protect Yourself from Zoom Hijacking

This blog was written by Nik Vargas, founder of Cybersecurity firm Nimble Defense.