<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Blog Category // Small Business

Understanding Cyber Liability Insurance

Like other insurance models, cyber insurance (also referred to as cyber liability insurance or data breach insurance) provides coverage for a type of loss. In the case of cyber liability insurance, this type of loss would include the impact of data breaches and ...

Yes, You Still Need Two-Factor Identification – Here's Why

Now is not the time to get complacent with your passwords.

Returning to in-office business in the face of COVID-19

Unprecedented Business Environments Though pandemics have occurred throughout history, they are an unprecedented event for modern business. Across the United States in mid-March, many businesses took the lead in requiring employees to work remotely where possible as ...

Traditional AV — Time to upgrade… or budget for your inevitable breach

Signature-based anti-virus (AV) is dead – and organizations are suffering the consequences.

Easy Cybersecurity Steps That Make a Big Impact

What cybersecurity protections do you need for your business? Unfortunately, as the cyber risks to small and mid-sized organizations increase, it seems as though the expert recommendations are that you need all the cybersecurity protections you can get. While this is true ...

The Non-Technical Guide to Cybersecurity for Your Organization

In the current threat landscape, organizations of all sizes are expected to get cybersecurity right—or face the consequences of not being protected. But what is cybersecurity, and what does it involve? Is there a way to be 100% protected? This guide will cover cybersecurity ...

Ultimate Cybersecurity Glossary: Basic Terms & Buzzwords Explained

Cybersecurity is complex — the vocabulary alone can be a barrier to many non-technical users just trying to understand what cybersecurity is and what it involves.

Remote Working: 5 Password Security Tips You Need to Know

At Ascend, our security engineers have truly seen the good, the bad, and the ugly of cybersecurity. From investigating breaches to setting up first-time security solutions for small businesses, they’ve found that a common vulnerability is something that not many people ...

Scam Alert: Coupon Scams Target Users Spending More Time Online

Share link, get coupon? Not so fast.

Cyber Ranger's Handbook: Next Steps to Securing Your Home Base

There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.

Work-from-Home Security: The Unspoken Cyber Impact of Coronavirus

Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks? For offices around the world, the possibility of having to send employees home ...

12 Consequences of a Cyber Incident

Trust us, we know that “getting hacked” seems scary enough on its own. However, there are additional consequences that go along with a breach or cyber incident that you should be aware of—including some you may not have realized.

Every Second Counts: 7 Steps to Take After a Cyberattack

Seconds matter when you’re detecting threats, and they’re even more vital when a threat becomes a successful cyberattack.

Complying with the SHIELD Act: Cybersecurity Requirements for Businesses

New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.

Cyber-Warfare May Be On The Horizon — What It Means for the U.S.

According to a U.S. Department of Homeland Security (DHS) warning issued January 4, 2020, the government is preparing for the potential of Iran-sponsored cyberattacks following the January 3rd airstrike which killed Iranian commander Qasem Soleimani.