top of page
Company Insights
See the plethora of company insights on Security, Compliance, Management and Risk.


Ascent Portal Staff
Dec 27, 20212 min read
MDM Security: Security Frameworks for Employee Devices
Do you have security protection for mobile computing and working from home? Although sometimes absolutely necessary (e.g., during a...

Ascent Portal Staff
Dec 20, 20211 min read
Segregation of Control Duties
Organizations need to have definitions in place to support the segregation of control duties amongst internal personnel. Without these...

Ascent Portal Staff
Dec 9, 20212 min read
Secure Logon with Session Timeouts and Time-of-Day Limitations
The risk for unauthorized access or inappropriate viewing of information increases for organizations if session timeouts are not in place...

Ascent Portal Staff
Dec 6, 20212 min read
Remote Access Control Policy Management
A significant number of external security incidents or data breach threats begin with unauthorized remote access being gained to the...


Ascent Portal Staff
Dec 3, 20212 min read
System Utility Access Control Protection
Organizations need to implement system utility access controls to protect and ensure standard, non-administrative users do not have the...


Ascent Portal Staff
Nov 29, 20212 min read
It’s Not Rocket Science – Secure Unattended Information Systems
It doesn’t take a rocket scientist to recognize that an access control policy need to be implemented to secure information systems when...

Ascent Portal Staff
Nov 12, 20212 min read
Ensuring a Secure Logon Process
Organizations need to implement and maintain secure logon processes to ensure authorized users are authenticated prior to accessing...

Ascent Portal Staff
Nov 5, 20212 min read
Balancing Admin Rights & Control – Privilege Access Management
Organizations need to have controls in place in place for the management of accounts with privileged access. Privileged access management...

Ascent Portal Staff
Oct 19, 20212 min read
Requirements for a Strong Access Control Program
The lack of an overall strong access control program generates opportunities for the unauthorized access to potentially sensitive data in...

Ascent Portal Staff
Oct 13, 20212 min read
Secure Disposal and Re-Use of Information Assets
Organizations must ensure that the process for the disposal or re-use of equipment is strictly controlled. The improper disposal or...

Ascent Portal Staff
Oct 5, 20212 min read
Classification, Labeling, and Handling of Information Assets
Information assets, including printed materials, email attachments, or other data, should be classified appropriately to ensure they are...

Ascent Portal Staff
Sep 30, 20212 min read
What Is Acceptable with Asset Usage?
If organizations do not document, communicate, and have personnel agree to acceptable use requirements, personnel may not be limited to...

Ascent Portal Staff
Sep 24, 20212 min read
Know What You’ve Got – IT Asset Inventory
IT Asset inventories help your organization control IT costs, reduce risk, and automate modern IT environments. IT Assets cannot be...

Ascent Portal Staff
Sep 21, 20212 min read
Keep Up Security Awareness Training Until You Get It Right
Your organization should develop, document, and maintain a comprehensive Security Awareness Training Program. If security awareness...

Ascent Portal Staff
Sep 14, 20212 min read
Security Implications of a Termination or Position Change
Security implications need to be considered and addressed to ensure the organization remains protected and safe from threats. When an...

Ascent Portal Staff
Sep 1, 20212 min read
The Buck Stops Here: Security Program Control
Managers of all departments need to be involved with ensuring their teams are performing their assigned operational duties in accordance...

Ascent Portal Staff
Aug 27, 20212 min read
Personnel Security Program: Terms and Conditions of Employment
In our ongoing blog series on security program pitfalls, we’ve been focusing most recently on a personnel security program. Today’s post...


Ascent Portal Staff
Aug 25, 20212 min read
Personnel Security Program: Screening
All personnel need to be screened prior to starting employment. This helps to ensure organizations hire knowledgeable, ethical...

Ascent Portal Staff
Aug 18, 20212 min read
Personnel Security Program: Roles and Responsibilities
Personnel security is the focus of the third chapter of my eBook, Security Program Pitfalls and Prescription to Avoid Them, and the roles...

Ascent Portal Staff
Aug 9, 20212 min read
Information Security Categorization and Risk Framing
Security categories for an organization’s information systems need to be defined to enable appropriate risk decisions to be made. Without...
bottom of page