<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

Defending Against Advanced Cyberattacks: 3 Essential Security Solutions

At the start of the year, Microsoft detected a nation-state cyberattack on its corporate systems, highlighting the widespread impact and seriousness of these threats. After defeating the threat, Microsoft shared a blog post detailing the incident as a case study resource for the cybersecurity community.

Let's dive into what an advanced cyberattack looks like and the security solutions that will...

Posted on February 27, 2024

Alert: Malware Campaign Targeting US-Based Organizations

As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.

Posted on July 30, 2020

Email is responsible for most corporate security breaches. How can you minimize the risk?

Email is a huge threat vector

Between spam, phishing, business email compromise and ransomware the list of risks is long.  Email gives attackers a direct line to their victims. It’s no surprise that with daily phishing attacks and spam email, business leaders are increasingly worried that their IT security and email protection aren’t keeping pace with attacks.

The greatest security risk

Most...

Posted on June 27, 2020

Easy Cybersecurity Steps That Make a Big Impact

What cybersecurity protections do you need for your business?

Unfortunately, as the cyber risks to small and mid-sized organizations increase, it seems as though the expert recommendations are that you need all the cybersecurity protections you can get. While this is true in a sense, that doesn’t mean it has to be all or nothing.

Posted on June 03, 2020

The Ultimate Guide to Spear Phishing (& How to Fight Against It)

The first phishing attacks have been traced back to the mid 1990s with the rise of AOL. Hackers would get fake accounts and pose as AOL employees, instructing users to update their personal and billing data. The result? Stolen information.

Posted on March 31, 2020

Cyber Defense Roster: Your key players in the fight against cyberattacks

Cyber criminals have no off season, neither should your security. Here’s a lineup of the cybersecurity solutions that team up to be your offense and defense.

Posted on November 12, 2019

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there.

Advanced malware threats are hiding in software applications many of us use daily and trust.  So much so that legitimate software can be difficult to distinguish.  New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.

Posted on August 28, 2019

Spear Phishing: Be the Harder Target

You know how the story goes...

Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.

Posted on August 14, 2018

Analysis of a DocuSign Phishing Email

As an MSSP, we offer a number of services. It’s kind of in the name. Two of those services involve email through both email security as well as end-user education through our phishing service.

Over the last couple of weeks, we’ve noticed an uptick in phishing emails that are using fake DocuSign sites to attempt to steal credentials to user email accounts.

Posted on March 18, 2018

Don’t Get Hooked! 7 Signs of a Phishing Email

You may not realize it, but your computer, mobile devices, accounts, and information all have value to cyber criminals.

According to Verizon’s Data Breach Report, 91% of company breaches start with an email. 

 Knowing how to maintain email security at the user level will keep you and your company safe. 

Posted on March 06, 2018

SCAM ALERT: Netflix Email

SCAM ALERT – Hackers are sending emails, falsely claiming your Netflix account has been suspended. These emails look just like the real thing. They are trying to get your login information and your credit card data.

Posted on November 08, 2017

Cyber Insurance may not cover losses from Business Email Compromise

It is no secret that funds transfer fraud, aka Business Email Compromise (BEC) and Email Account Compromise (EAC), is on the rise for both businesses and consumers. These losses occur when a threat actor, through social engineering or computer intrusion techniques, can affect an unauthorized transfer of funds or exfiltrate information to further compromise or exploit the target. Chicago FBI...

Posted on October 20, 2017

What Do You Have That Cyber Criminals Want?

You may not realize it, but you, your company, and your employees are all targets for cyber criminals. Computers, mobile devices, accounts and your information all have tremendous value.

Posted on October 05, 2017

6 Scary Cybersecurity Threats Facing Small Businesses

Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to devote to cybersecurity.

Posted on January 26, 2017

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?