Ascent Portal StaffJun 21, 20222 minOutsourced Development and External System ServicesWhen outsourcing development and external systems, businesses should be careful to outline the obligations and requirements of those...
Ascent Portal StaffApr 26, 20221 minInformation Exchange ProtectionThe exchange of information performed by organizations must be protected with appropriate security controls. These controls need to be...
Ascent Portal StaffMar 9, 20222 minAudit Logs Best Practices for SecurityAudit logs are key to monitoring for unauthorized activities, insider threats, and issues that may be affecting system performance. The...
Ascent Portal StaffFeb 11, 20221 minMalicious Code ProtectionMalicious and mobile code protection is critically important. New variants of malicious code are released every day while mobile code...