As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have some pretty interesting blurbs about software or attacking a problem in a ...
Once, twice, three times……no not the song, unfortunately. Three is the number of times a hotel in Turrach, Austria was hit by hackers. The cyber criminals left a backdoor on the hotel network exposed, allowing them to hold the hotel hostage with ransomware at any time. The ...
Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to ...
People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And ...
Most people are never far away from a tablet, smartphone or both. In fact, according to a Bank of America survey, more people reach for their phone first thing in the morning than a toothbrush or cup of coffee.
Has this happened to you? You finally decided to take the plunge and upgrade your PC to Windows 10, only to find out that all your documents are now “read-only.”
It’s no secret that 2016 was a rough year in terms of cybersecurity attacks. We saw big name breaches at the IRS, Verizon, the DNC, LinkedIn, and who could forget- Yahoo! But while those breaches are top-of-mind and easy to remember, it’s important to also remember the ...
“Hmm, that’s strange.” In the scientific community, these words are thought of as the immediate precursor to the ‘Eureka’ moment when something amazing is discovered. In the information technology field, specifically in security, they usually mean something bad is happening.
It seems that our news feeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away, or hoping that our news filters are malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ...
The retail sector continues to struggle with ever-evolving cyber threats and cyber risk. A survey earlier this year by the global consulting firm BDO found that privacy concerns related to data breaches are considered a top risk by retailers, tying for the No. 1 spot with ...
As the BYOD trend becomes mainstream in healthcare, it is enabling the mobile workforce to be more efficient and productive. But the benefits of the BYOD phenomenon come with their own set of risks.
Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!” Recently, we noticed such a hit with one of our customers in the ...
Cloud strategy, integration, and support is an important part of our business here at Ascend. We help clients determine their cloud needs, assess their options, and find the right solution for their budget and situation.
Still using Microsoft Office 2007?
In 2016, Business Insider Intelligence predicted there will be 34 billion connected devices, up from 10 billion in 2015. This latest prediction nearly doubles Gartner’s 20 billion connected devices prediction, but it doesn’t come close to other projections. In any case, ...