<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

Breaking Down Endpoint Security

The 2021 statistics on cyberattacks were exceedingly grim. 

Posted on February 16, 2022

Alert: Malware Campaign Targeting US-Based Organizations

As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.

Posted on July 30, 2020

Traditional AV — Time to upgrade… or budget for your inevitable breach

Signature-based anti-virus (AV) is dead – and organizations are suffering the consequences.

Posted on June 16, 2020

Stick ‘Em Up: How Ransomware Can Hold Your Business Hostage

One of the most widespread and damaging security threats to businesses today continues to be ransomware. Ransomware is a form of malicious software (or malware) that encrypts files on a computer, file share, and/or server so they become unusable. The attackers then extort money from the business to unlock the files. Depending on the business, the ransom can range from thousands to hundreds of...

Posted on May 16, 2020

Cybersecurity Threats and Recommendations for Remote Workers

As the Coronavirus pandemic progresses, a rise in malicious activity has been detected leveraging new trends of threat vectors, including targeting of remote authentication systems and remote users.  Ascend Technologies is actively monitoring ongoing developments and taking precautions to minimize risk to our client environments as active business continuity plans are in effect.

Posted on April 05, 2020

Cyber Incident Analysis: Layered Security in Action

March, 2020 — We recently had a Malicious Operation (Malop) pop up for one of our MSP Partners' small business clients and it turned out to be a true hit, with malicious PowerShell on a couple of hosts with RDP (port 3389) open to the internet. Our Malware Prevention thankfully blocked the malicious payloads, but something was still going on that needed to be tracked down and remediated. 

Posted on March 17, 2020

Cyberattack Roster: What you're up against in the threat landscape

Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.

Posted on September 30, 2019

Advanced Persistent Threat: Challenge Accepted

The battle of cybersecurity is constantly advancing.

As hackers move to more complex, focused efforts, their strategies have changed and the threat has increased.

One of these strategies, advanced persistent threats (APT), is a customized, focused attack that is difficult to detect and nearly impossible to prevent. So how do companies of all sizes protect their networks and keep their customer...

Posted on February 26, 2019

Traditional vs Advanced Malware Prevention

Think of the last time you purchased a brand new car. What if it didn’t work after only one day? You jump in your shiny new ride, fasten your seat belt and turn the ignition, and … nothing. The car won’t start.

Posted on August 23, 2017

Cylance vs Malware Posing as a Sneaky Flash Installer

Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!” Unless you have Cylance.

Posted on July 28, 2017

Warning Signs of a Cyberattack

The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from thePonemon Institute, nearly half of all small businesses suffered a data breach in 2015.

In fact, The Business Journals’ latest SMB Insight study showed that over 550,000 small businesses are projected to fail in 2017 due to a cyberattack.

Posted on March 29, 2017

CylancePROTECT vs RansomFree: Do You Get What You Pay For?

As an all-around nerd, not just a security nerd, I spend a lot of time checking out non security related blogs that involve a lot of technology. One in particular is Lifehacker.com. They usually have some pretty interesting blurbs about software or attacking a problem in a different way. Nothing too heavy, but still useful. 

Posted on February 09, 2017

That's No Moon... It's Malware

Thanks to the deluge of Crypto malware attacks recently, everyone in infosec has been VERY on edge about anything that pops in a quarantine. “Oh crap. What’d they hit? Where’s it going? What IS this?!”

Recently, we noticed such a hit with one of our customers in the financial world. 

Posted on September 01, 2016

Ransomware Costs Hollywood Presbyterian Medical Center $3 Million

Infogressive’s Jeff Murphy provides feedback from SC Magazine’s article “Ransomware goes to Hollywood medical centre.”

For Hollywood Presbyterian Medical Center to have paid out over three million dollars in ransomware and suffered a week of down time indicates a less than stellar cyber security posture. 

Posted on February 17, 2016

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?