top of page
Company Insights
See the plethora of company insights on Security, Compliance, Management and Risk.


Ascent Portal Staff
Jul 11, 20222 min read
Tips On The Management of Operational Software
When software is installed on information systems, it is important that it is controlled to help ensure compliance is maintained with...

Ascent Portal Staff
Jul 6, 20222 min read
Managing Infrastructure
When managing infrastructure, businesses’ need to ensure that infrastructure device management controls are addressed and implemented. It...

Ascent Portal Staff
Jun 27, 20222 min read
Connections with Internal Information Systems
Protect your Internal Information Systems If organizations have internal information systems that connect to any external systems in...

Ascent Portal Staff
Jun 21, 20222 min read
Outsourced Development and External System Services
When outsourcing development and external systems, businesses should be careful to outline the obligations and requirements of those...

Ascent Portal Staff
Jun 15, 20223 min read
System Development, Acquisition, Review, and Acceptance Controls
The string of to-do’s when developing, acquiring, reviewing, and finally accepting a new system can be confusing. Here are a few pitfalls...

Ascent Portal Staff
Jun 10, 20223 min read
A Guide to Using SDLC Tools
What Is SDLC and Why Should I Maintain it? In simple terms, a System Development Life Cycle (SDLC) is a project management model that...

Ascent Portal Staff
May 24, 20223 min read
Protecting Your Company’s Shared Infomation
Here we will discuss the process to look out for when seeking to protect your organization. Specifically, we will be looking into shared...

Ascent Portal Staff
May 10, 20222 min read
Encryption Data and Cryptography
One of the primary goals of this Security Program is to protect the confidentiality, integrity, and availability of information assets,...

Ascent Portal Staff
May 2, 20222 min read
Message Security: Email, Messaging, and Internet Protection
Email, Messaging applications, and Internet services have dramatically improved the efficiency of business operations over the years....

Ascent Portal Staff
Apr 11, 20222 min read
Security Boundary Defense Solutions
Security boundary defense solutions should be leveraged to protect organizations from the infiltration or exfiltration of data by bad...

Ascent Portal Staff
Apr 5, 20222 min read
Process for Implementing Different Types of Penetration Testing
Penetration testing can be a daunting undertaking for organizations, but it is generally required for achieving and maintaining...

Ascent Portal Staff
Feb 22, 20222 min read
Configuration Backup Strategy
If organizations do not effectively maintain regular backups of systems, configurations, and information, they are not likely to have the...

Ascent Portal Staff
Feb 11, 20221 min read
Malicious Code Protection
Malicious and mobile code protection is critically important. New variants of malicious code are released every day while mobile code...

Ascent Portal Staff
Feb 7, 20222 min read
Physical Data Security Measures
Organizations are susceptible to a significant physical data security incident or data breach if physical data and media containing...

Ascent Portal Staff
Jan 31, 20222 min read
Security of Information Assets While Off-Premises
Organizations need to ensure they effectively address the security of information assets that are taken off-site. It may be difficult to...

Ascent Portal Staff
Jan 27, 20222 min read
Cabling Security Controls
The lack of basic power and telecommunications cabling security controls, along with protective measures, could cause unexpected outages...

Ascent Portal Staff
Jan 19, 20222 min read
Managing Supporting Utilities
Equipment should be protected from power failures and other disruptions that may be caused by failures in supporting utilities....

Ascent Portal Staff
Jan 14, 20222 min read
Why Equipment Placement and Protection Matters
Organizations should ensure that before equipment (e.g., servers, network infrastructure, information systems) is installed, the location...

Ascent Portal Staff
Jan 11, 20223 min read
Next Significant Security & Compliance Challenge in 2022
In the first work week of the year, I’ve seen several different articles and blog posts about predictions and what to expect from an IT...

Ascent Portal Staff
Jan 10, 20222 min read
External and Environmental Threat Protection for your Assets
External and environmental threats can cause unexpected damage to information assets, as well as the facilities in which they reside....
bottom of page