Blog

Cyber Security Tips For Business Travelers Laptop ☑ Phone ☑ Chargers ☑ Business cards ☑ Toothbrush ☑ Back up files…? Update Software…? When you’re traveling, whether for business or pleasure, chances are you’ll be connecting to unknown networks. That is, unless you’re going on a digital detox and will be spending all your time away in desert yurt or trekking high up in the mountains… Of course, these scenarios are highly improbable in the case of business travel. Connecting to...
In this age of security breaches, companies are fighting to protect their networks from attack and working to preserve their company brand.  Businesses shoulder a responsibility for protecting the growing volume of private customer information. Security Breaches Are Costly IT security breaches are costly; from downtime to response and remediation actions and rebuilding of network systems to return to normal business operations.  This is not factoring in any potentially hefty fines for non-compliance with regulations...
CLOUD SECURITY
When migrating to – and operating in – the cloud, key considerations for every company are cloud security, compliance, reliability and costs. The benefits of moving business applications into the cloud are very clear. These include efficiencies, scalability and flexibility. However, the cloud also comes with its own unique challenges.  In a cloud-first world the security and privacy landscape are different.  Migration, implementation and integrations don’t always go smoothly, and misconfigurations can result in security...
cybersecurity maturity
Do you know how cybersecurity mature your organization is? Perhaps your company has a well-established cyber security program. Maybe your business is about to embark on a digital transformation journey.  In the latter case, the goal is to establish the baseline foundations of security from which to build on.  In the former case, you will either know exactly what your cybersecurity maturity level is or should be working on determining what it is. If your...
Ascension Global Technology Blog - Business Email Compromise
More than you might initially think. But before you rush off to warn your single colleagues, friends and employees about the dangers of online dating, you may like to read CrowdStrike’s latest Intelligence Report, “Nigerian Confraternities Emerge As Business Email Compromise Threat”. The report delves into the observed patterns, operations and criminal gangs behind the growing number of business email compromise (BEC) scams. Businesses should be aware of this type of security threat for network...
The growing number of privacy and data breaches and ransomware attacks making the daily news serve as a cautionary reminder for companies to treat cybersecurity as a top priority.  As companies undergo digital transformation and enjoy the benefits of enabling technology, they are also inevitably exposed to cyber risks. This is simply a reality of living and doing business in the digital age. Companies mainly focus their cybersecurity efforts on intrusion detection and prevention technologies...
Missed out on the RSA 2018 Conference? If you missed out on the 27th annual RSA conference in San Fransisco, fear not. There’s always next year. In the meantime, you can catch up on some of the event highlight reels and speaker sessions and presentations available on YouTube and the RSA conference website (see links under the resources section below). Ascension Global Technology CEO, Delta Munoz, was one of the 50,000 strong cybersecurity and business professionals...
CSIRP - cybersecurity computer security incident response plan
Aside from preventing security incidences, a top challenge IT professionals face is planning and preparing to respond to a cyber security incident.  Security professionals shoulder a mountain of responsibility working to protect their organization’s assets. Between protecting people, digital assets, physical infrastructure, and ensuring regulatory compliance, there is much to do and much at stake.  Jobs are on the line.  Livelihoods and reputations are at risk.  In extreme cases, lives can be lost. Sophisticated hackers...
Why Passwords Alone Are Not Enough Believe it or not some people – in fact many people – are still using terrible passwords to “secure” access to their personal and business accounts.  The purpose of passwords is to prevent unauthorized access to your accounts.  By now, most of us know that using strong passwords, that is, passwords that are hard to guess, is a basic cybersecurity practice.  The majority of workplaces should have password security policies...
Healthcare Entities Must Consider The Consequences Of Not Making Cyber Security A Top Priority Cyberattacks against the healthcare industry are on the rise and barely a week goes by without news of a patient data breach or attack on a hospital or healthcare provider. With healthcare organizations embracing new technologies and digitizing their operations to improve efficiency, so too do they take on new risks. Without adequate cyber security, IoT security measures, enforced policies, and a...