Ascent Portal StaffOct 29, 20212 minIdentify AND Authenticate Users – A “Must Have” CombinationIdentify AND Authenticate users in order to protect your organizations networks. Actions performed on an organization’s networks,...
Ascent Portal StaffOct 21, 20212 minWhy a “One-and-Done” Access Control Policy Won’t Cut ItUnauthorized or inappropriate account access is likely to occur within organizations if ongoing maintenance is not in place for all...
Ascent Portal StaffOct 19, 20212 minRequirements for a Strong Access Control ProgramThe lack of an overall strong access control program generates opportunities for the unauthorized access to potentially sensitive data in...
Ascent Portal StaffOct 13, 20212 minSecure Disposal and Re-Use of Information AssetsOrganizations must ensure that the process for the disposal or re-use of equipment is strictly controlled. The improper disposal or...