Healthcare suffers double the average amount of internal security breaches

Healthcare suffers double the average amount of internal security breaches

Independent research finds hospitals, care providers and medical insurers experience twice as many internal security breaches in comparison to other sectors. The threat from within rife in the healthcare sector Organisations in the healthcare sector are experiencing double the average amount of internal security breaches, in comparison to all industries. The findings are based on … Continued

Securing students access to a school network

Securing students access to a school network

This Case Study highlights how state schools across Luxembourg utilized UserLock® to provide the necessary access control, restrictions and monitoring to help secure students access to a school network and the resources contained within. Key Findings For schools using Windows infrastructure,…

UserLock Recommendations from your IT Security peers

UserLock Recommendations from your IT Security peers

When your researching and assessing solutions for the security of your Microsoft Windows and/or Active Directory infrastructure, we know your looking for honest, “tell it like it is” feedback. With the news that from April 14th, LinkedIn will discontinue the…

Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within   The…

A Focus on Insider Threats in Banking & Financial Institutions

A Focus on Insider Threats in Banking & Financial Institutions

When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of cyberattack.  In fact you could say insider threats pose a…

The Insider Threat Manifesto

The Insider Threat Manifesto

Over 2,560 Internal Security Breaches occurred in US businesses every day. Despite widespread occurrence, only one in five IT professionals consider Insider Threat to be a security priority. Over 666,000 internal security breaches took place in US businesses in the last 12 months, an average of 2,560 per working day, new research has revealed. The … Continued

Internal Security Breaches from Password Based Attacks

Internal Security Breaches from Password Based Attacks

The Insider Threat from a Credentials-Based Attack. Despite the widespread occurrence and high profile internal security breaches, too many corporations are not doing enough to mitigate these risks. Target Corporation & the Stolen Credentials from the Extended Enterprise Stolen account credentials played a part in the recent Target Corporation payment card data breach. With approximately … Continued

Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

How to overcome those that are determined to circumvent Security? Securing User Access to the Network Today, most organizations are looking for better ways to protect their network against insider threats. For Academic Institutions, this problem is of particular importance…

LimitLogin vs UserLock

LimitLogin vs UserLock

This blog post reviews how LimitLogin and UserLock limit concurrent user logins in an Active Directory domain. It will focus on the concurrent connection restriction feature provided by each solution and discuss how else they help an organization secure user…

Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

For many organizations Active Directory is just the starting point when it comes to identity management and controlling and recording what users can do. Active Directory provides basis user security. It can check that credentials supplied match stored user profiles and…

Windows Network Access Control for Government Traffic Department

Windows Network Access Control for Government Traffic Department

UserLock provides Windows Network Access Control and Security to Government State Traffic Department. By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Departamento Estadual de Trânsito de Pernambuco in Brazil protect sensitive data and mitigate insider…

Tackling the security risk from internal users in Banking

Tackling the security risk from internal users in Banking

The following case-study describes how the Bank of Cyprus reduces the security risk from internal users with UserLock. Offering the capability to control user access and react instantly to any related security incident, UserLock helps protect an organization’s critical assets by disabling concurrent users’ logins, preventing credential sharing and monitoring all session activity in real-time. … Continued

Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Securing your Windows Active Directory infrastructure. Every day here at IS Decisions, we’re lucky to engage with individuals from all over the world. Security and emergency response truly are global issues. We speak with individuals from organizations, companies and government departments that recognize their security needs go beyond what’s available in native Windows controls. We speak … Continued

How IT teams can prevent Insider Threats from both malicious and careless activity.

How IT teams can prevent Insider Threats from both malicious and careless activity.

With insider threats emerging as one of the biggest risks to corporate data, organizations are recognizing the need for security solutions to manage network access and prevent data breaches, intentional or not. The risk from inside A new report from…

PCI DSS compliance with IS Decisions Security Software

PCI DSS compliance with IS Decisions Security Software

By providing visibility and control of corporate access and data, IS Decisions software solutions help companies ensure compliance with the Payment Card Industry (PCI) Data Security Standard (DSS).  In this article we’ll focus on the greater access control and detailed reporting…

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

Oklahoma City Public Schools stops users sharing Windows Network Login with UserLock

The IT Team at Oklahoma City Public Schools have a lot on their plate serving approximately 43,000 students over the district. To add to their workload, the team had been facing numerous challenges as a results of students – and…

IS Decisions announces its launch into China

IS Decisions announces its launch into China

A simpler way for Chinese organizations to safeguard their Windows and Active Directory Infrastructure. Currently with over 3200 customers from 129 countries around the world, IS Decisions, a global software company specializing in Security & Access Management solutions for Microsoft…

IS Decisions: Home Grown and High Tech.

IS Decisions: Home Grown and High Tech.

Home-grown and high-tech, IS Decisions continue to win renowned International clients such as The FBI, Barclays and the U.S. Department of Justice. IS Decisions featured on TV This TV report from LCI (a 24-hour French cable news network) focuses on how ‘this fast-growing company’ is intent on growing its International presence from its base in the … Continued