<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog

Immutable Backups – The Missing Piece of Your Disaster Recovery Plan

Operating in a digital world comes with the risk of losing everything in a cyber incident. It’s estimated that a ransomware attack takes place every 11 seconds, and our team has observed an increasing number of businesses having their backups targeted in these attacks. So, when bad actors penetrate your environment, how do you go from being a victim of ransomware to a victor of ransomware?

Posted on October 05, 2021

Over 18,000 Infected from SolarWinds Data Breach – What Happened?

This month, it was discovered that SolarWinds, a national IT software and infrastructure company, suffered a devastating data breach. By using a Trojan horse system, cybercriminals were able to infect more than 18,000 companies. While this plot was uncovered in December, in actuality, this siphoning of invaluable company information had been happening since March – undetected. 

Posted on January 04, 2021

SolarWinds Breach Updates | Ascend Technologies

As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights directly from our Security Operations Centers (SOCs).

Posted on December 13, 2020

Returning to in-office business in the face of COVID-19

Unprecedented Business Environments

Though pandemics have occurred throughout history, they are an unprecedented event for modern business. Across the United States in mid-March, many businesses took the lead in requiring employees to work remotely where possible as COVID-19 accelerated across the world. Municipalities and state governments followed shortly thereafter. At that time, we were...

Posted on September 20, 2020

How to Unleash the Power of Salesforce – Take the Self Assessment

Here’s a self-assessment to find out how your CRM environment is working for your company

Whether you’ve been using Salesforce for months or years, your organization has made the strategic decision to invest in an industry leading system. If you are trying to maximize the investment to its full potential, make sure you are not subject to the same issues your organization had prior to this...

Posted on September 03, 2020

Thoughtful, staged migration to the cloud provides better results

What you need to know about cloud migrations

Often, organizations want to move to the cloud for potential cost savings, flexibility and access to cutting-edge technology. The problem? Where to start

Posted on July 19, 2020

How Private Equity Firms are Staying Ahead of Digital Transformation to Maximize Value

Are you realizing the full value creation opportunity from your portfolio companies?

Private Equity is moving faster than ever and there’s more competition and uncertainty. Information technology is central to doing business today and the landscape is constantly changing while getting ever more complex. Digital transformation is on the tips of everyone’s tongues and yet it is perfectly...

Posted on July 06, 2020

Email is responsible for most corporate security breaches. How can you minimize the risk?

Email is a huge threat vector

Between spam, phishing, business email compromise and ransomware the list of risks is long.  Email gives attackers a direct line to their victims. It’s no surprise that with daily phishing attacks and spam email, business leaders are increasingly worried that their IT security and email protection aren’t keeping pace with attacks.

The greatest security risk

Most...

Posted on June 27, 2020

Using CloudCheckr to Evolve Our Cloud Delivery Model

Ascend Technologies is a 24X7, high-access service provider. We manage infrastructure for our clients, provide application support and development, security management, service desk and NOC.

As more clients move to the public cloud, we wanted to provide value add services beyond just basic support. We reviewed several platforms focused on cloud cost management and settled on CloudCheckr.

...
Posted on June 14, 2020

A Cloud Database Platform is Critical for Peak Performance

Wait, a Cloud Database Doesn’t Mean You Don’t Need Your DBA

I’ve heard it many times.  Business leaders feel that since they moved their databases to a cloud provider, they won’t need their database administrative (DBA) staff.  The thought is, “the cloud provider will manage that.”  While cloud platforms do help alleviate some of the repetitive tasks of database administration, there are many...

Posted on June 01, 2020

How Secure Is Your Company's Cloud Storage?

As the country continues to follow shelter-in-place orders, many companies have found new ways to keep their businesses going by taking steps toward digital transformation and having their employees work remotely. And this trend doesn’t seem to be stopping any time soon.

Posted on May 26, 2020

Public Cloud Environments: How to Effectively Manage Costs

Forecast for Clouds with Sun breaks

There are several compelling reasons to move to the cloud. Speed of innovation. The ability to scale quickly.  Production ready services to leverage AI, IoT, natural language processing, etc.  However, for most businesses, it all comes down to costs.

In a previous blog post Moving to the Cloud: Myth Versus Reality, I touched on some misconceptions...

Posted on May 24, 2020

Stick ‘Em Up: How Ransomware Can Hold Your Business Hostage

One of the most widespread and damaging security threats to businesses today continues to be ransomware. Ransomware is a form of malicious software (or malware) that encrypts files on a computer, file share, and/or server so they become unusable. The attackers then extort money from the business to unlock the files. Depending on the business, the ransom can range from thousands to hundreds of...

Posted on May 16, 2020

Deepfakes: How to Spot 2020’s Top Cybersecurity Threat

If you’ve heard the word “deepfake” rolling around recently and haven’t been able to decipher exactly what it means, here’s an example.

Posted on April 28, 2020

Tagged Cybersecurity

Guest Blog: How to Protect Yourself from Zoom Hijacking

This blog was written by Nik Vargas, founder of Cybersecurity firm Nimble Defense.

Posted on April 07, 2020

TOP ARTICLES:

QUESTIONS?