Ascent Portal StaffMay 10, 20222 min readEncryption Data and CryptographyOne of the primary goals of this Security Program is to protect the confidentiality, integrity, and availability of information assets,...
Ascent Portal StaffApr 26, 20221 min readInformation Exchange ProtectionThe exchange of information performed by organizations must be protected with appropriate security controls. These controls need to be...
Ascent Portal StaffApr 18, 20222 min readNetwork Security Boundaries and ControlsNetwork-level security boundaries and controls cannot be ignored as they protect against intrusions, data exploitation, and support the...
Ascent Portal StaffMar 28, 20222 min readCybersecurity ControlsThe term “cybersecurity” certainly has demonstrated longevity as a powerful buzzword for organizations across all industries, in all...
Ascent Portal StaffDec 6, 20212 min readRemote Access Control Policy ManagementA significant number of external security incidents or data breach threats begin with unauthorized remote access being gained to the...
Ascent Portal StaffDec 3, 20212 min readSystem Utility Access Control ProtectionOrganizations need to implement system utility access controls to protect and ensure standard, non-administrative users do not have the...