<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

Cyber Insurance: Using a ‘Compliance First’ Strategy

A ‘Compliance First’ Mindset Limits Liabilities for Organizations Like Yours

By adopting a Compliance First strategy when choosing solutions and vendors, you can identify those that do not comply with your requirements & eliminate them in order to be prepared for your cyber insurance questionnaires. It also means evaluating your current solutions and vendors and replacing those that cannot...

Posted on August 22, 2022

How Your Risk Affects Cyber Liability Insurance

If you think that your cybersecurity insurance claim will be cleared with no questions asked, think again. While reviewing your claim, your cyber insurance provider will assess whether you took “due care” to protect your business from being compromised by a cyberattack. While having a cyber liability insurance policy is non-negotiable today, you cannot be fully assured that your insurer will...

Posted on August 18, 2022

Understanding Cyber Liability Insurance

Like other insurance models, cyber insurance (also referred to as cyber liability insurance or data breach insurance) provides coverage for a type of loss. In the case of cyber liability insurance, this type of loss would include the impact of data breaches and cyberattacks. In this article, we'll cover the top-asked questions about cyber insurance and some expert tips for getting the right...

Posted on August 15, 2022

How to Pass Cybersecurity Insurance Requirements

Cyber insurance (also referred to as cyber liability insurance or data breach insurance) provides coverage for the impact of data breaches and cyberattacks. In recent years, cyber insurance brokerages have begun to recognize that security controls which reduce risk and liability are foundational to every organization's security posture. 

Posted on August 02, 2022

5 Cyber Insurance Requirements You Need to Know

Clients have been engaging our team for assistance with cybersecurity insurance renewals with increased frequency, which has raised the question: Why? Is it that...

Posted on July 27, 2022

Why Cloud Computing is Crucial for FinTech

While cloud computing and services are becoming more and more popular, some industries are hesitant to jump on the bandwagon. Financial technology, or FinTech, is one of them.

Working in FinTech, your #1 goal is to improve and automate the delivery and usage of financial services for banks, equity firms, and other entities within the industry. You work to provide the right technology and process...
Posted on June 09, 2022

Why Private Equity is at Risk for Ransomware Attacks

Cyber threats continue to evolve at a rapid pace, challenging even the most operationally mature firms to properly manage the risks.

Posted on April 14, 2022

Cybersecurity in 2022 - Here’s What’s in Store

Smart company owners know that complacency presents a threat to your business in the best of times. But in our current climate, the velocity and unpredictability of those threats – and opportunities – has increased exponentially. That’s why staying on the cutting edge of cybersecurity has become imperative.  

Posted on December 01, 2021

Immutable Backups – The Missing Piece of Your Disaster Recovery Plan

Operating in a digital world comes with the risk of losing everything in a cyber incident. It’s estimated that a ransomware attack takes place every 11 seconds, and our team has observed an increasing number of businesses having their backups targeted in these attacks. So, when bad actors penetrate your environment, how do you go from being a victim of ransomware to a victor of ransomware?

Posted on October 05, 2021

The MFA Challenge & Cisco Duo

  Ascend Technologies has previously written about the benefits of Multi-Factor Authentication (MFA) for securing resources. Many use the Microsoft Authenticator application, which provides a nice user interface and is beneficial for a variety of use cases. In 2020, our experts worked with many clients to secure remote access to the environment by implementing Microsoft’s MFA on their...
Posted on August 31, 2021

Cloud Security: Equip Your Organization Against Cloud-Based Threats

Until early 2020, the oft-heard pushback from legacy security practitioners was that cloud computing could never be as secure as on-premise operations. With the COVID-19 pandemic dramatically and rapidly expanding work-from-home demands, many "cloud naysayers" were forced to adopt at least some elements of the cloud.

Posted on April 29, 2021

Yes, You Still Need Two-Factor Identification – Here's Why

Now is not the time to get complacent with your passwords.

Posted on April 29, 2021

Over 18,000 Infected from SolarWinds Data Breach – What Happened?

This month, it was discovered that SolarWinds, a national IT software and infrastructure company, suffered a devastating data breach. By using a Trojan horse system, cybercriminals were able to infect more than 18,000 companies. While this plot was uncovered in December, in actuality, this siphoning of invaluable company information had been happening since March – undetected. 

Posted on January 04, 2021

SolarWinds Breach Updates | Ascend Technologies

As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights directly from our Security Operations Centers (SOCs).

Posted on December 13, 2020

Returning to in-office business in the face of COVID-19

Unprecedented Business Environments

Though pandemics have occurred throughout history, they are an unprecedented event for modern business. Across the United States in mid-March, many businesses took the lead in requiring employees to work remotely where possible as COVID-19 accelerated across the world. Municipalities and state governments followed shortly thereafter. At that time, we were...

Posted on September 20, 2020

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?