top of page
Company Insights
See the plethora of company insights on Security, Compliance, Management and Risk.


Ascent Portal Staff
Jul 6, 20222 min read
Managing Infrastructure
When managing infrastructure, businesses’ need to ensure that infrastructure device management controls are addressed and implemented. It...

Ascent Portal Staff
Jun 27, 20222 min read
Connections with Internal Information Systems
Protect your Internal Information Systems If organizations have internal information systems that connect to any external systems in...

Ascent Portal Staff
Jun 10, 20223 min read
A Guide to Using SDLC Tools
What Is SDLC and Why Should I Maintain it? In simple terms, a System Development Life Cycle (SDLC) is a project management model that...

Ascent Portal Staff
May 24, 20223 min read
Protecting Your Company’s Shared Infomation
Here we will discuss the process to look out for when seeking to protect your organization. Specifically, we will be looking into shared...

Ascent Portal Staff
Apr 26, 20221 min read
Information Exchange Protection
The exchange of information performed by organizations must be protected with appropriate security controls. These controls need to be...

Ascent Portal Staff
Apr 18, 20222 min read
Network Security Boundaries and Controls
Network-level security boundaries and controls cannot be ignored as they protect against intrusions, data exploitation, and support the...

Ascent Portal Staff
Mar 28, 20222 min read
Cybersecurity Controls
The term “cybersecurity” certainly has demonstrated longevity as a powerful buzzword for organizations across all industries, in all...

Ascent Portal Staff
Mar 21, 20222 min read
Protect your Information Systems with Flaw Remediation
Flaw remediation and fault logging capabilities help to ensure an organization’s information systems, including applications, continue to...

Ascent Portal Staff
Mar 15, 20222 min read
Security Logging Tools for Information Protection
The confidentiality, integrity, and availability of security logging must be protected. Implementing controls for security logging of...

Ascent Portal Staff
Mar 9, 20222 min read
Audit Logs Best Practices for Security
Audit logs are key to monitoring for unauthorized activities, insider threats, and issues that may be affecting system performance. The...

Ascent Portal Staff
Mar 1, 20221 min read
Vulnerability Management Tools
Many organizations struggle with identifying and patching all vulnerabilities. Legacy systems that cannot be patched without impacting...

Ascent Portal Staff
Feb 7, 20222 min read
Physical Data Security Measures
Organizations are susceptible to a significant physical data security incident or data breach if physical data and media containing...

Ascent Portal Staff
Jan 30, 20222 min read
Security of Information Assets While Off-Premises
Organizations need to ensure they effectively address the security of information assets that are taken off-site. It may be difficult to...

Ascent Portal Staff
Jan 26, 20222 min read
Cabling Security Controls
The lack of basic power and telecommunications cabling security controls, along with protective measures, could cause unexpected outages...

Ascent Portal Staff
Jan 19, 20222 min read
Managing Supporting Utilities
Equipment should be protected from power failures and other disruptions that may be caused by failures in supporting utilities....

Ascent Portal Staff
Jan 14, 20222 min read
Why Equipment Placement and Protection Matters
Organizations should ensure that before equipment (e.g., servers, network infrastructure, information systems) is installed, the location...

Ascent Portal Staff
Jan 11, 20223 min read
Next Significant Security & Compliance Challenge in 2022
In the first work week of the year, I’ve seen several different articles and blog posts about predictions and what to expect from an IT...

Ascent Portal Staff
Jan 10, 20222 min read
External and Environmental Threat Protection for your Assets
External and environmental threats can cause unexpected damage to information assets, as well as the facilities in which they reside....

Ascent Portal Staff
Jan 7, 20222 min read
The Importance of Physical Entry Controls
If organizations are not able to account for individuals in their buildings or offices at any given time, it will likely result in an...

Ascent Portal Staff
Jan 3, 20222 min read
Physical Security Perimeters to Protect Your Facilities
A lack of physical security perimeter controls may compromise many of the controls necessary to maintain a complete Security Program....
bottom of page