Category

Featured News

Featured News | Ascension Global Technology in the news media

Keep this in mind as we start the 2022 Windows software patching year: Patching is not enough to keep Microsoft 365 protected. Before you purchase third-party tools that claim to protect you from all threats, or before you begin that zero-trust project, stop for a moment to evaluate whether you are doing all you can...
Read More
Following these consumer best practices for online shopping will help you get through the holiday season securely as well as avoid shopping scams, prevent theft of your personal data, and secure your credit card information.   Kate, a mother of three, couldn’t contain her excitement for shopping during the holiday season when she received an email...
Read More
As we continue our journey with NIST, Here we show you what it means to “protect” while providing our readers with industry best practices towards your security program. A cybersecurity program’s “Protect” function is often the most thought-about area that organizations consider when looking to enhance their security program. It’s also the second of five...
Read More
Each year on January 28, an international initiative known as Data Privacy Day serves to remind us of the importance of data privacy and the protection of personal information. The goal of Data Privacy Day 2021 is to empower consumers to Own Your Privacy and businesses to Respect Privacy. It Takes Two to Protect Data Privacy Protecting the privacy and...
Read More
From ransomware schemes to supply chain attacks, this year melded classic hacks with extraordinary circumstances WHAT A WAY to kick off a new decade. 2020 showcased all of the digital risks and cybersecurity woes you’ve come to expect in the modern era, but this year was unique in the ways Covid-19 radically and tragically transformed life around the...
Read More
Written by Stu Sjouerman Scamming incidents have increased by 519% in 2020 compared to last year, according to researchers at Baltimore-based ZeroFOX. The researchers compared their own data to a recent report from the Federal Trade Commission, which found that scams on social media have skyrocketed since the start of the pandemic earlier this year....
Read More
Written by David Puzas The adoption of the cloud has fundamentally changed the game when it comes to how businesses go to market and develop modern applications. Today’s application lifecycle places a premium on speed to market, requiring cloud teams to build cloud-native applications supported by a programmable infrastructure that enables businesses to change and reconfigure...
Read More
Abstract – This article discusses the importance of understanding and level of effort required for mitigating risks that third-party cloud services (software-as-a-service, infrastructure-as-a-service, and platform-as-a-service) represent to an organization. Depending on the service, it may not be possible to conduct a thorough, direct assessment of the services, which is necessary to ensure securing the organization’s...
Read More
Spyware is a type of malware that infects your PC or mobile device and gathers information about you, including the sites you go to, usernames and passwords, payment information, and the emails you send and receive. Similarly, stalkerware is a type of software or application that spies on victims. Stalkerware apps are capable of a plethora...
Read More
VPNs (Virtual Private Networks) in theory provide anonymity and secure passage to your online destination. What we’ve increasingly seen is VPN companies go through their own security breaches and exposing users internet logs. Even when a VPN provider claims that it keeps no logs, it can simply be marketing in a way where that might...
Read More
1 2 3 8