Ascent Portal StaffFeb 11, 20221 min readMalicious Code ProtectionMalicious and mobile code protection is critically important. New variants of malicious code are released every day while mobile code...
Ascent Portal StaffFeb 7, 20222 min readPhysical Data Security MeasuresOrganizations are susceptible to a significant physical data security incident or data breach if physical data and media containing...
Ascent Portal StaffJan 30, 20222 min readSecurity of Information Assets While Off-PremisesOrganizations need to ensure they effectively address the security of information assets that are taken off-site. It may be difficult to...
Ascent Portal StaffJan 26, 20222 min readCabling Security ControlsThe lack of basic power and telecommunications cabling security controls, along with protective measures, could cause unexpected outages...
Ascent Portal StaffJan 19, 20222 min readManaging Supporting UtilitiesEquipment should be protected from power failures and other disruptions that may be caused by failures in supporting utilities....
Ascent Portal StaffJan 14, 20222 min readWhy Equipment Placement and Protection MattersOrganizations should ensure that before equipment (e.g., servers, network infrastructure, information systems) is installed, the location...
Ascent Portal StaffJan 11, 20223 min readNext Significant Security & Compliance Challenge in 2022In the first work week of the year, I’ve seen several different articles and blog posts about predictions and what to expect from an IT...
Ascent Portal StaffJan 10, 20222 min readExternal and Environmental Threat Protection for your AssetsExternal and environmental threats can cause unexpected damage to information assets, as well as the facilities in which they reside....
Ascent Portal StaffJan 7, 20222 min readThe Importance of Physical Entry ControlsIf organizations are not able to account for individuals in their buildings or offices at any given time, it will likely result in an...
Ascent Portal StaffJan 3, 20222 min readPhysical Security Perimeters to Protect Your FacilitiesA lack of physical security perimeter controls may compromise many of the controls necessary to maintain a complete Security Program....