Ascent Portal StaffDec 6, 20212 min readRemote Access Control Policy ManagementA significant number of external security incidents or data breach threats begin with unauthorized remote access being gained to the...
Ascent Portal StaffNov 5, 20212 min readBalancing Admin Rights & Control – Privilege Access ManagementOrganizations need to have controls in place in place for the management of accounts with privileged access. Privileged access management...
Ascent Portal StaffOct 29, 20212 min readIdentify AND Authenticate Users – A “Must Have” CombinationIdentify AND Authenticate users in order to protect your organizations networks. Actions performed on an organization’s networks,...
Ascent Portal StaffSep 30, 20212 min readWhat Is Acceptable with Asset Usage?If organizations do not document, communicate, and have personnel agree to acceptable use requirements, personnel may not be limited to...
Ascent Portal StaffSep 24, 20212 min readKnow What You’ve Got – IT Asset InventoryIT Asset inventories help your organization control IT costs, reduce risk, and automate modern IT environments. IT Assets cannot be...
Ascent Portal StaffSep 21, 20212 min readKeep Up Security Awareness Training Until You Get It RightYour organization should develop, document, and maintain a comprehensive Security Awareness Training Program. If security awareness...
Ascent Portal StaffAug 18, 20212 min readPersonnel Security Program: Roles and ResponsibilitiesPersonnel security is the focus of the third chapter of my eBook, Security Program Pitfalls and Prescription to Avoid Them, and the roles...
Ascent Portal StaffJun 29, 20212 min readPitfall #5 of 100: Management Reviews of the Security ProgramA new week gives me another opportunity to highlight the next pitfall from my eBook, Security Program Pitfalls and Prescription to Avoid...