<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Blog Category // Cybersecurity (7)

Cylance vs Malware Posing as a Sneaky Flash Installer

Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!” Unless you have Cylance.

Vulnerability Scans vs Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.

Warning Signs of a Cyberattack

The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from the Ponemon Institute, nearly half of all small businesses suffered a data breach in 2015. In fact, The Business Journals’ latest SMB Insight study ...

CylancePROTECT vs RansomFree: Do You Get What You Pay For?

As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have some pretty interesting blurbs about software or attacking a problem in a ...

6 Scary Cybersecurity Threats Facing Small Businesses

Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to ...

Pros and Cons of SSL Encryption

People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And ...

5 Ways Ascend Protects Your Castle with Managed Security Services

It seems that our news feeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away, or hoping that our news filters are malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ...

The Biggest Vulnerability in Your Network? It’s You.

At Ascend, we write a lot about the technical aspects of cybersecurity. We focus on cutting-edge topics in malware, ransomware, even machine learning. But one of the most insidious and effective cybersecurity threats around doesn't involve a single line of code: social ...

Is Your Aging IT Infrastructure Putting You at Risk?

Cisco just released their midyear cybersecurity report, exploring the reasons why potent attacks are spreading and providing insights into undermining attackers' impact. Their findings were rather disturbing, but they do illustrate the point that businesses can prevent ...

5 Smart Reasons To Consider a Managed Security Service Provider

You've seen it in the news: cyberattacks on big, billion dollar companies expose millions of customers’ personal information, and that draws a lot of media attention. Attacks on smaller companies tend to fall under the radar, leading many to think they’re "too small" to ...

Privileged Accounts: Catch-22 for Network Security

Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a malicious insider. If privileged accounts are in the hands of an adversary it is ...

IT Professionals: Quit Buying Bad Customer Service

Think about the last time you went to a restaurant and experienced truly terrible service. Whether you waited an hour for your food, they messed up your order, your server needed an attitude adjustment, or all of the above, how likely is it that you will return anytime in ...

Ransomware Costs Hollywood Presbyterian Medical Center $3 Million

Infogressive’s Jeff Murphy provides feedback from SC Magazine’s article “Ransomware goes to Hollywood medical centre.” For Hollywood Presbyterian Medical Center to have paid out over three million dollars in ransomware and suffered a week of down time indicates a less than ...

A Beginner’s Guide to Email Encryption

Online security has been on the top of many people’s minds lately, with the Sony email leak and other security breaches leaving us wondering what we can do to protect our personal information that we share online. We’ve already shared four things you can to do protect ...

Microsoft Outlook Voicemail Phishing Scam Fooling Users into Downloading Malware

Microsoft Outlook users should keep their eyes peeled for a phishing attempt targeting business users of the popular mail client. Though this phishing attempt has been making the rounds for a couple of years, it hasn’t shown signs of slowing down.