top of page
Company Insights
See the plethora of company insights on Security, Compliance, Management and Risk.


Ascent Portal Staff
Dec 6, 20212 min read
Remote Access Control Policy Management
A significant number of external security incidents or data breach threats begin with unauthorized remote access being gained to the...

Ascent Portal Staff
Nov 5, 20212 min read
Balancing Admin Rights & Control – Privilege Access Management
Organizations need to have controls in place in place for the management of accounts with privileged access. Privileged access management...

Ascent Portal Staff
Oct 29, 20212 min read
Identify AND Authenticate Users – A “Must Have” Combination
Identify AND Authenticate users in order to protect your organizations networks. Actions performed on an organization’s networks,...

Ascent Portal Staff
Sep 30, 20212 min read
What Is Acceptable with Asset Usage?
If organizations do not document, communicate, and have personnel agree to acceptable use requirements, personnel may not be limited to...

Ascent Portal Staff
Sep 24, 20212 min read
Know What You’ve Got – IT Asset Inventory
IT Asset inventories help your organization control IT costs, reduce risk, and automate modern IT environments. IT Assets cannot be...

Ascent Portal Staff
Sep 21, 20212 min read
Keep Up Security Awareness Training Until You Get It Right
Your organization should develop, document, and maintain a comprehensive Security Awareness Training Program. If security awareness...

Ascent Portal Staff
Aug 18, 20212 min read
Personnel Security Program: Roles and Responsibilities
Personnel security is the focus of the third chapter of my eBook, Security Program Pitfalls and Prescription to Avoid Them, and the roles...

Ascent Portal Staff
Jun 29, 20212 min read
Pitfall #5 of 100: Management Reviews of the Security Program
A new week gives me another opportunity to highlight the next pitfall from my eBook, Security Program Pitfalls and Prescription to Avoid...
bottom of page