<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Ascend Blog listing page

5 Qualities of a Good Penetration Test

Penetration tests are considered one of the best returns on investment for a security program because they provide verified, immediate, and actionable data to better secure your environment.

Posted on July 14, 2022

Cybersecurity in 2022 - Here’s What’s in Store

Smart company owners know that complacency presents a threat to your business in the best of times. But in our current climate, the velocity and unpredictability of those threats – and opportunities – has increased exponentially. That’s why staying on the cutting edge of cybersecurity has become imperative.  

Posted on December 01, 2021

Ultimate Cybersecurity Glossary: Basic Terms & Buzzwords Explained

Cybersecurity is complex — the vocabulary alone can be a barrier to many non-technical users just trying to understand what cybersecurity is and what it involves.

Posted on May 12, 2020

Cyberattack Game Plan: How attackers choose their targets & plan their attack

High-profile, newsworthy cyber breaches may have you believe that only big corporations like Target, Facebook, and Equifax are where cyber criminals focus their efforts. However, it continues to be proven that small and mid-sized organizations are being targeted frequently, despite the belief that a smaller organization has nothing that would be valuable to a criminal.

Posted on October 28, 2019

Cyberattack Roster: What you're up against in the threat landscape

Cyber criminals have no off season. Here are some of the most popular attack tactics and techniques your organization should be prepared to defend against.

Posted on September 30, 2019

BlueKeep & Seven Monkeys: Protecting Your Organization Against RDP Vulnerabilities

Leaving your remote desktop protocol (port 3389) servers open to the internet has been known to be a cybersecurity “bad idea” for years, but the Bluekeep vulnerability, as well as the more recent Seven Monkeys batch of disclosed vulnerabilities, have made this vital to your business’s survival.

Posted on August 21, 2019

The Five Stages of Vulnerability Management

What sounds better? Proactively fighting potential threats or scrambling to pick up the pieces after an attacker has successfully made their way onto your system?

As threats continue to become more complex and targeted, it’s more important than ever to focus your efforts to minimize the risk before it’s too late. Vulnerability management is one way to do that.

Posted on March 26, 2019

Network Visibility: What Can't You See?

Every network has its weaknesses.

But do you know what they are and the impact they have on your network security? With the large amount of data on systems and advances in attack sophistication, it’s more important than ever to have a complete picture of what’s going on in your network.

Posted on March 05, 2019

Vulnerability Management: Don’t Be That Guy

Ignore security at your own and your customers’ peril.

Recently there was a post on r/sysadmin from a network administrator who had a client system hacked because he left their iLO card facing the internet… 

Posted on July 27, 2018

Vulnerability Scanning Authentication

Vulnerability scans are a great way to dive deeper into a network and search for problems that may go otherwise undetected. Many times, however, security professionals are performing scans that are only scratching the surface of what could potentially be uncovered. 

Posted on August 02, 2017

Vulnerability Scans vs Penetration Tests

There is still quite a bit of confusion out there on the differences between a Vulnerability Scan and a Penetration Test. The truth is both services can be successful in keeping you ahead of the hackers, but the trick is knowing which one is right for you and when.

Posted on July 26, 2017

Warning Signs of a Cyberattack

The paranoia surrounding cyber crime attacks is rising, almost as quickly as cybercrime itself. According to research from thePonemon Institute, nearly half of all small businesses suffered a data breach in 2015.

In fact, The Business Journals’ latest SMB Insight study showed that over 550,000 small businesses are projected to fail in 2017 due to a cyberattack.

Posted on March 29, 2017

6 Scary Cybersecurity Threats Facing Small Businesses

Although cyber attacks against large companies make the biggest headlines, small and medium-sized organizations are not immune to the threats. Smaller organizations are just as vulnerable as large enterprises, and in many cases, more so; because they have fewer resources to devote to cybersecurity.

Posted on January 26, 2017

5 Ways Ascend Protects Your Castle with Managed Security Services

It seems that our news feeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away, or hoping that our news filters are malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ever before. 

Posted on November 17, 2016

Privileged Accounts: Catch-22 for Network Security

Privileged accounts represent one of the largest vulnerabilities an organization faces today in network security. It doesn’t matter if the accounts are compromised by an external attacker or a malicious insider. If privileged accounts are in the hands of an adversary it is a very real and scary threat.

Posted on April 21, 2016

Sign Up for Monthly Updates

TOP ARTICLES:

QUESTIONS?