Share link, get coupon? Not so fast.
There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.
As the Coronavirus pandemic progresses, a rise in malicious activity has been detected leveraging new trends of threat vectors, including targeting of remote authentication systems and remote users. Ascend Technologies is actively monitoring ongoing developments and taking precautions to minimize risk to our client environments as active business continuity plans are in effect.
The first phishing attacks have been traced back to the mid 1990s with the rise of AOL. Hackers would get fake accounts and pose as AOL employees, instructing users to update their personal and billing data. The result? Stolen information.
Phishing is one of the most pervasive security threats today and it’s only getting worse
Over the last few years, phishing attacks have continued to rise as attackers refine strategies, execute successful programs, and make money. Attackers are taking advantage of end users to steal credentials or get them to click on malicious links. In fact, with 66% percent of malware now installed via...
Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks?
For offices around the world, the possibility of having to send employees home indefinitely as the virus spreads is becoming very real. If your organization hasn’t needed work-from-home policies in place before...
Trust us, we know that “getting hacked” seems scary enough on its own. However, there are additional consequences that go along with a breach or cyber incident that you should be aware of—including some you may not have realized.
Seconds matter when you’re detecting threats, and they’re even more vital when a threat becomes a successful cyberattack.
New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.
Black Friday, Cyber Monday, holiday gifts and New Year's celebrations – these are some of the factors that make November through January the most active online-shopping period of the year.
Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.
Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.
Cybersecurity has become a hot topic for Managed Service Providers (MSPs) and their small business clients. It has become clear that MSPs who don't provide cybersecurity to their clients are falling behind, but the quality of the cybersecurity offerings is also a key factor.
Understanding cybersecurity can be complex in today's constantly-evolving threat landscape. With every new advancement in technology comes a new opportunity for hackers, a new avenue for attack, and a new vulnerability to be exploited.
It’s not just big businesses that are at risk of being hacked or cyber-attacked.
It may seem scary to let your kids go online after you hear that, but don’t throw all the computers away and live off-the-grid just yet. Try implementing these five cybersecurity practices in your home to give your family some peace-of-mind online: