<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog

PayPal Fraud - What You Need to Know About the New PayPal Phishing Scam

Unfortunately, we’re back with another phishing scheme that’s making its way through your inboxes and phones.  

Posted on January 29, 2021

Alert: Malware Campaign Targeting US-Based Organizations

As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.

Posted on July 30, 2020

Email is responsible for most corporate security breaches. How can you minimize the risk?

Email is a huge threat vector

Between spam, phishing, business email compromise and ransomware the list of risks is long.  Email gives attackers a direct line to their victims. It’s no surprise that with daily phishing attacks and spam email, business leaders are increasingly worried that their IT security and email protection aren’t keeping pace with attacks.

The greatest security risk

Most...

Posted on June 27, 2020

Easy Cybersecurity Steps That Make a Big Impact

What cybersecurity protections do you need for your business?

Unfortunately, as the cyber risks to small and mid-sized organizations increase, it seems as though the expert recommendations are that you need all the cybersecurity protections you can get. While this is true in a sense, that doesn’t mean it has to be all or nothing.

Posted on June 03, 2020

Ultimate Cybersecurity Glossary: Basic Terms & Buzzwords Explained

Cybersecurity is complex — the vocabulary alone can be a barrier to many non-technical users just trying to understand what cybersecurity is and what it involves.

Posted on May 12, 2020

The Ultimate Guide to Spear Phishing (& How to Fight Against It)

The first phishing attacks have been traced back to the mid 1990s with the rise of AOL. Hackers would get fake accounts and pose as AOL employees, instructing users to update their personal and billing data. The result? Stolen information.

Posted on March 31, 2020

Don’t Take the Bait: Phishing Attacks

Phishing is one of the most pervasive security threats today and it’s only getting worse

Over the last few years, phishing attacks have continued to rise as attackers refine strategies, execute successful programs, and make money. Attackers are taking advantage of end users to steal credentials or get them to click on malicious links. In fact, with 66% percent of malware now installed via...

Posted on March 11, 2020

How serious is an incident? The Comprehensive Guide to Incident Response

What defines a cyber “incident”, and if it happens to your business, how serious is it? These are two prominent questions among businesses of all sizes and industries. These questions, however, are especially vital to answer for small businesses who often lack the staffing, technology, and resources to understand and implement adequate cybersecurity.

Posted on March 03, 2020

Staying Secure: Cyber-Conscious Tips for Your Holiday Season

Black Friday, Cyber Monday, holiday gifts and New Year's celebrations – these are some of the factors that make November through January the most active online-shopping period of the year. 

Posted on November 27, 2019

Phishing and Command & Control: How cyber attackers use emails to gain control

One of the easiest ways for cyber criminals to begin an attack is through a malicious email. Here’s a look at how they do it.

Posted on October 03, 2019

Cyberattack Roster: What you're up against in the threat landscape

Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.

Posted on September 30, 2019

Hidden Threats: Preventing cyberattacks with a layered security approach

Advanced attacks are out there.

Advanced malware threats are hiding in software applications many of us use daily and trust.  So much so that legitimate software can be difficult to distinguish.  New attack vectors are continuously being discovered and attackers are finding back doors onto your device to gather you or your company’s information.

Posted on August 28, 2019

5 Easy Ways to Improve Your Cybersecurity at Work

  It’s true, some of the smallest improvements can really be game changers — especially in cybersecurity.

Whether you know it or not, cyber criminals see you—the end user—as an easy target. But don’t worry, you don’t need the newest security technology to protect yourself from some of the most common threats. Follow these easy tips to eliminate many of the everyday security threats present...

Posted on October 15, 2018

10 Mistakes that Will Get You Hacked

Sometimes, it's the little things that make a big difference.

This is especially true for cybersecurity. Here are 10 common mistakes made in office settings that leave people vulnerable to cyber attacks, presented by Security Engineer, Will Tipton:

Posted on September 06, 2018

Spear Phishing: Be the Harder Target

You know how the story goes...

Two guys are out hiking in the forest when they notice that a bear begins charging at them. One of the guys pulls off his heavy hiking boots and begins tying on a pair of running shoes.

Posted on August 14, 2018

TOP ARTICLES:

QUESTIONS?