Ascent Portal StaffOct 29, 20212 min readIdentify AND Authenticate Users – A “Must Have” CombinationIdentify AND Authenticate users in order to protect your organizations networks. Actions performed on an organization’s networks,...
Ascent Portal StaffOct 21, 20212 min readWhy a “One-and-Done” Access Control Policy Won’t Cut ItUnauthorized or inappropriate account access is likely to occur within organizations if ongoing maintenance is not in place for all...
Ascent Portal StaffOct 19, 20212 min readRequirements for a Strong Access Control ProgramThe lack of an overall strong access control program generates opportunities for the unauthorized access to potentially sensitive data in...
Ascent Portal StaffOct 13, 20212 min readSecure Disposal and Re-Use of Information AssetsOrganizations must ensure that the process for the disposal or re-use of equipment is strictly controlled. The improper disposal or...
Ascent Portal StaffOct 8, 20212 min readMedia Handling and ProtectionMedia handling controls should be implemented to protect organizations from the risks associated with the loss of confidentiality,...
Ascent Portal StaffOct 5, 20212 min readClassification, Labeling, and Handling of Information AssetsInformation assets, including printed materials, email attachments, or other data, should be classified appropriately to ensure they are...
Ascent Portal StaffSep 30, 20212 min readWhat Is Acceptable with Asset Usage?If organizations do not document, communicate, and have personnel agree to acceptable use requirements, personnel may not be limited to...
Ascent Portal StaffSep 24, 20212 min readKnow What You’ve Got – IT Asset InventoryIT Asset inventories help your organization control IT costs, reduce risk, and automate modern IT environments. IT Assets cannot be...
Ascent Portal StaffSep 21, 20212 min readKeep Up Security Awareness Training Until You Get It RightYour organization should develop, document, and maintain a comprehensive Security Awareness Training Program. If security awareness...
Ascent Portal StaffSep 14, 20212 min readSecurity Implications of a Termination or Position ChangeSecurity implications need to be considered and addressed to ensure the organization remains protected and safe from threats. When an...