Blog
![Ransomware](https://ascendeducation.com/wp-content/uploads/2018/04/Ransomware.jpg)
Five tips to avoiding ransomware
- March 7, 2018
A recent blog post reviewed what Ransomware is, how it is deployed,...
![Mind The Gap resize scaled](https://ascendeducation.com/wp-content/uploads/2018/02/Mind-The-Gap-resize-1-1-scaled.jpg)
Minding the IT skills gap
- February 28, 2018
The curvature at the edge of a London Underground platform, and the...
![Incident response team](https://ascendeducation.com/wp-content/uploads/2018/02/Incident-response-team.jpg)
Breaking down what incident response means for your business
- February 21, 2018
In today’s world, Cyber-attacks are becoming the norm – no business or...
![Ransom](https://ascendeducation.com/wp-content/uploads/2018/02/Ransom.png)
Ransomware, what is it?
- February 8, 2018
In today’s world, Cyber-attacks are becoming much more covert and sophisticated in...
![it security lock cybersecurity breach alignment large](https://ascendeducation.com/wp-content/uploads/2018/02/it-security_lock_cybersecurity_breach_alignment-100801286-large.jpg)
The cybersecurity analyst certification
- January 30, 2018
One of the hottest certs in Information Technology is the Cybersecurity Analyst,...
![Custers last stand scaled scaled](https://ascendeducation.com/wp-content/uploads/2018/02/Custers-last-stand-1-scaled-scaled.jpg)
Business cybersecurity: Take a lesson from Custer’s last stand
- January 24, 2018
On June 25, 1876, Lt. Col. George Armstrong Custer started into a...