Are your business applications not running optimally or incurring performance problems, causing lost productivity by your team members or frustration from clients? While many organizations primarily focus on improving the application or allocating more resources towards ...
Multi-Factor Authentication (MFA) is an excellent means to further secure your publicly available services. Services like Microsoft Office 365 and remote access VPN can all benefit from having an additional layer of security. So let's talk about how you can integrate ...
If you’ve heard the word “deepfake” rolling around recently and haven’t been able to decipher exactly what it means, here’s an example.
At Ascend, our security engineers have truly seen the good, the bad, and the ugly of cybersecurity. From investigating breaches to setting up first-time security solutions for small businesses, they’ve found that a common vulnerability is something that not many people ...
Share link, get coupon? Not so fast.
As many organizations navigate the new normal of having a 100% remote workforce, there are several challenges they face. How do you ensure adherence to corporate policies and norms? How do ensure your team’s cybersecurity posture is maintained? How do you support remote ...
There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.
This blog was written by Nik Vargas, founder of Cybersecurity firm Nimble Defense.
As the Coronavirus pandemic progresses, a rise in malicious activity has been detected leveraging new trends of threat vectors, including targeting of remote authentication systems and remote users. Ascend Technologies is actively monitoring ongoing developments and taking ...
As many organizations navigate the new normal of having a 100% remote workforce, there are several challenges they face. How do you ensure adherence to corporate policies and norms? How do you ensure your team’s cybersecurity posture is maintained? How do you support remote ...
At the beginning of 2020, if you asked most COOs and IT Managers about their business continuity and disaster recovery plans, they’d say they’ve got a plan that is updated annually and might even be tested 1-2 times per year. In many industries, this is a requirement for ...
The first phishing attacks have been traced back to the mid 1990s with the rise of AOL. Hackers would get fake accounts and pose as AOL employees, instructing users to update their personal and billing data. The result? Stolen information.
Cloud Computing Realities You Need to Know Cloud computing solutions have been available for well over a decade. Software as a Service (SaaS) came to prominence first, followed closely by Infrastructure-as-a-Service (IaaS) solutions, then advanced Platform-as-a-Service ...
Return on Your Cloud Investment As more enterprise scale organizations shift to using cloud technology providers, like Amazon Web Services, mid-market organizations are working to determine if moving some of their workloads to the cloud delivers the return that larger ...
March, 2020 — We recently had a Malicious Operation (Malop) pop up for one of our MSP Partners' small business clients and it turned out to be a true hit, with malicious PowerShell on a couple of hosts with RDP (port 3389) open to the internet. Our Malware Prevention ...