<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

Understanding Cybersecurity: A Real-World Cybersecurity Incident Analysis

Real incidents provide the hardest and most valuable lessons. Imagine a regular workday transformed instantly into a battleground against invisible digital adversaries. This isn't a scene from a spy thriller; it's a real-life scenario that unfolded within a corporate network, leading to a security breach. The incident in question didn't just expose vulnerabilities; it provided a blueprint for...

Posted on February 01, 2024

Everything You Need to Know About Incident Response Plans

Security platforms often focus on protecting organizations from the threats of cyberspace. These threats include phishing campaigns, malware, network infiltration, and ransomware deployments. Organizations must create an Incident Response Plan (IRP) to manage their response and recovery from security incidents. This plan must be strong and comprehensive.

Your IRP isn’t a stand-alone document....

Posted on April 28, 2023

6 Critical Information Security Elements for Community Banks

An information security policy is a set of rules that ensures data security by regulating domain and network usage. This policy should protect not only the organization's data but the customers’ data as well. In this article, we’ll outline critical elements that a community bank needs to consider when planning its information security policy.

Posted on March 24, 2023

5 Cyber Insurance Requirements You Need to Know

Clients have been engaging our team for assistance with cybersecurity insurance renewals with increased frequency, which has raised the question: Why? Is it that...

Posted on July 27, 2022

SolarWinds Breach Updates | Ascend Technologies

As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights directly from our Security Operations Centers (SOCs).

Posted on December 13, 2020

How serious is an incident? The Comprehensive Guide to Incident Response

What defines a cyber “incident”, and if it happens to your business, how serious is it? These are two prominent questions among businesses of all sizes and industries. These questions, however, are especially vital to answer for small businesses who often lack the staffing, technology, and resources to understand and implement adequate cybersecurity.

Posted on March 03, 2020

12 Consequences of a Cyber Incident

Trust us, we know that “getting hacked” seems scary enough on its own. However, there are additional consequences that go along with a breach or cyber incident that you should be aware of—including some you may not have realized.

Posted on February 21, 2020

Every Second Counts: 7 Steps to Take After a Cyberattack

Seconds matter when you’re detecting threats, and they’re even more vital when a threat becomes a successful cyberattack.

Posted on February 06, 2020

Complying with the SHIELD Act: Cybersecurity Requirements for Businesses

New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.

Posted on January 30, 2020

Does Your Business Have an Incident Response Plan?

Your business experiences a data breach. What happens next?

Posted on March 21, 2018

Into the Rabbit Hole: A Security Engineer’s Review of SANS FOR508

Infogressive’s engineers are a special kind of broken. We like to learn and put ourselves through things that are REALLY hard just because we’re curious… (and a little masochistic).

When I was new to the company, I shadowed on an Incident Response lead by one of our vendor partners, and was introduced to the world of forensics. 

Posted on March 05, 2018

To Respond or Not To Respond? Six Phases of Incident Response

“Hmm, that’s strange.”

In the scientific community, these words are thought of as the immediate precursor to the ‘Eureka’ moment when something amazing is discovered. In the information technology field, specifically in security, they usually mean something bad is happening.

Posted on December 13, 2016

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?