Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

To meet the demands of a remote and mobile workforce, today most companies offer employees access to their company mailbox from outside the office. This is most likely accomplished by either using Outlook Web Access (OWA) with a web browser or by using their phone with an ActiveSync mail client. Because these two common ways … Continued

Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center…

Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they…

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student…

A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company. This finding explored in the report, ‘From Brutus…

From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued

Research shows Employees see no Security Risk in Sharing Passwords

Research shows Employees see no Security Risk in Sharing Passwords

One of the biggest internal security issues every business has to deal with is password sharing.  We know that insider threats represent one of the greatest risks to a business. Even when we consider highly technically proficient hackers, the way they are most likely to access sensitive information is by simply acquiring someone’s password, probably … Continued

Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Last week IS Decisions participated in the SPIN Insider Threat Conference in London joining participants from academia, government and industry to discuss the threat from within. Speakers at the workshop included security experts from CERT, PA Consulting Group (HoMER Publication),…

More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

Since the release of UserLock 7 eleven months ago, UserLock has helped equip more organizations with the means to prevent, detect and respond to the risk of the insider threat. We are now delighted to announce the release of UserLock…

Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently…

Healthcare suffers double the average amount of internal security breaches

Healthcare suffers double the average amount of internal security breaches

Independent research finds hospitals, care providers and medical insurers experience twice as many internal security breaches in comparison to other sectors. The threat from within rife in the healthcare sector Organisations in the healthcare sector are experiencing double the average…

Securing students access to a school network

Securing students access to a school network

This Case Study highlights how state schools across Luxembourg utilized UserLock® to provide the necessary access control, restrictions and monitoring to help secure students access to a school network and the resources contained within. Key Findings For schools using Windows infrastructure, no native features are available to limit connections and report effectively on historic connections. It … Continued

UserLock Recommendations from your IT Security peers

UserLock Recommendations from your IT Security peers

When your researching and assessing solutions for the security of your Microsoft Windows and/or Active Directory infrastructure, we know your looking for honest, “tell it like it is” feedback. With the news that from April 14th, LinkedIn will discontinue the Products & Services tab and with it the accompanying product recommendations, we thought this would … Continued

Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within   The…

A Focus on Insider Threats in Banking & Financial Institutions

A Focus on Insider Threats in Banking & Financial Institutions

When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of cyberattack.  In fact you could say insider threats pose a…

The Insider Threat Manifesto

The Insider Threat Manifesto

Over 2,560 Internal Security Breaches occurred in US businesses every day. Despite widespread occurrence, only one in five IT professionals consider Insider Threat to be a security priority. Over 666,000 internal security breaches took place in US businesses in the…

Internal Security Breaches from Password Based Attacks

Internal Security Breaches from Password Based Attacks

The Insider Threat from a Credentials-Based Attack. Despite the widespread occurrence and high profile internal security breaches, too many corporations are not doing enough to mitigate these risks. Target Corporation & the Stolen Credentials from the Extended Enterprise Stolen account…

Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

How to overcome those that are determined to circumvent Security? Securing User Access to the Network Today, most organizations are looking for better ways to protect their network against insider threats. For Academic Institutions, this problem is of particular importance in stopping those who are smart enough to gain entry to whatever part of the … Continued