<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

Understanding Cyber Liability Insurance

Like other insurance models, cyber insurance (also referred to as cyber liability insurance or data breach insurance) provides coverage for a type of loss. In the case of cyber liability insurance, this type of loss would include the impact of data breaches and cyberattacks. In this article, we'll cover the top-asked questions about cyber insurance and some expert tips for getting the right...

Posted on August 15, 2022

Yes, You Still Need Two-Factor Identification – Here's Why

Now is not the time to get complacent with your passwords.

Posted on April 29, 2021

Returning to in-office business in the face of COVID-19

Unprecedented Business Environments

Though pandemics have occurred throughout history, they are an unprecedented event for modern business. Across the United States in mid-March, many businesses took the lead in requiring employees to work remotely where possible as COVID-19 accelerated across the world. Municipalities and state governments followed shortly thereafter. At that time, we were...

Posted on September 20, 2020

Traditional AV — Time to upgrade… or budget for your inevitable breach

Signature-based anti-virus (AV) is dead – and organizations are suffering the consequences.

Posted on June 16, 2020

Easy Cybersecurity Steps That Make a Big Impact

What cybersecurity protections do you need for your business?

Unfortunately, as the cyber risks to small and mid-sized organizations increase, it seems as though the expert recommendations are that you need all the cybersecurity protections you can get. While this is true in a sense, that doesn’t mean it has to be all or nothing.

Posted on June 03, 2020

The Non-Technical Guide to Cybersecurity for Your Organization

In the current threat landscape, organizations of all sizes are expected to get cybersecurity right—or face the consequences of not being protected.

But what is cybersecurity, and what does it involve? Is there a way to be 100% protected?

This guide will cover cybersecurity concepts at a basic level and explain how to apply them to your organization’s security needs.

Posted on May 14, 2020

Ultimate Cybersecurity Glossary: Basic Terms & Buzzwords Explained

Cybersecurity is complex — the vocabulary alone can be a barrier to many non-technical users just trying to understand what cybersecurity is and what it involves.

Posted on May 12, 2020

Remote Working: 5 Password Security Tips You Need to Know

At Ascend, our security engineers have truly seen the good, the bad, and the ugly of cybersecurity. From investigating breaches to setting up first-time security solutions for small businesses, they’ve found that a common vulnerability is something that not many people would suspect… and something for which there is no “silver bullet,” all-in-one solution to solve it. The reason is that it relies...

Posted on April 22, 2020

Scam Alert: Coupon Scams Target Users Spending More Time Online

Share link, get coupon? Not so fast.

Posted on April 20, 2020

Cyber Ranger's Handbook: Next Steps to Securing Your Home Base

There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.

Posted on April 08, 2020

Work-from-Home Security: The Unspoken Cyber Impact of Coronavirus

Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks?

For offices around the world, the possibility of having to send employees home indefinitely as the virus spreads is becoming very real. If your organization hasn’t needed work-from-home policies in place before...

Posted on March 06, 2020

12 Consequences of a Cyber Incident

Trust us, we know that “getting hacked” seems scary enough on its own. However, there are additional consequences that go along with a breach or cyber incident that you should be aware of—including some you may not have realized.

Posted on February 21, 2020

Every Second Counts: 7 Steps to Take After a Cyberattack

Seconds matter when you’re detecting threats, and they’re even more vital when a threat becomes a successful cyberattack.

Posted on February 06, 2020

Complying with the SHIELD Act: Cybersecurity Requirements for Businesses

New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.

Posted on January 30, 2020

Cyber-Warfare May Be On The Horizon — What It Means for the U.S.

According to a U.S. Department of Homeland Security (DHS) warning issued January 4, 2020, the government is preparing for the potential of Iran-sponsored cyberattacks following the January 3rd airstrike which killed Iranian commander Qasem Soleimani.

Posted on January 10, 2020

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?