Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

A division from a well-known government law enforcement agency needed to better track the usage of sensitive files presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and serial sexual assaults, serving over 1,000 employees including civilian members and police officers. Their work supports major investigations … Continued

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

To meet the demands of a remote and mobile workforce, today most companies offer employees access to their company mailbox from outside the office. This is most likely accomplished by either using Outlook Web Access (OWA) with a web browser…

Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center…

Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they…

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student…

A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company. This finding explored in the report, ‘From Brutus to Snowden: a study of insider threat personas‘ highlights how employees in two of the world’s … Continued

From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued

Research shows Employees see no Security Risk in Sharing Passwords

Research shows Employees see no Security Risk in Sharing Passwords

One of the biggest internal security issues every business has to deal with is password sharing.  We know that insider threats represent one of the greatest risks to a business. Even when we consider highly technically proficient hackers, the way…

Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Last week IS Decisions participated in the SPIN Insider Threat Conference in London joining participants from academia, government and industry to discuss the threat from within. Speakers at the workshop included security experts from CERT, PA Consulting Group (HoMER Publication),…

More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

Since the release of UserLock 7 eleven months ago, UserLock has helped equip more organizations with the means to prevent, detect and respond to the risk of the insider threat. We are now delighted to announce the release of UserLock…

Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently…

Healthcare suffers double the average amount of internal security breaches

Healthcare suffers double the average amount of internal security breaches

Independent research finds hospitals, care providers and medical insurers experience twice as many internal security breaches in comparison to other sectors. The threat from within rife in the healthcare sector Organisations in the healthcare sector are experiencing double the average amount of internal security breaches, in comparison to all industries. The findings are based on … Continued

Securing students access to a school network

Securing students access to a school network

This Case Study highlights how state schools across Luxembourg utilized UserLock® to provide the necessary access control, restrictions and monitoring to help secure students access to a school network and the resources contained within. Key Findings For schools using Windows infrastructure, no native features are available to limit connections and report effectively on historic connections. It … Continued

UserLock Recommendations from your IT Security peers

UserLock Recommendations from your IT Security peers

When your researching and assessing solutions for the security of your Microsoft Windows and/or Active Directory infrastructure, we know your looking for honest, “tell it like it is” feedback. With the news that from April 14th, LinkedIn will discontinue the…

Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within   The…

A Focus on Insider Threats in Banking & Financial Institutions

A Focus on Insider Threats in Banking & Financial Institutions

When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of cyberattack.  In fact you could say insider threats pose a…

The Insider Threat Manifesto

The Insider Threat Manifesto

Over 2,560 Internal Security Breaches occurred in US businesses every day. Despite widespread occurrence, only one in five IT professionals consider Insider Threat to be a security priority. Over 666,000 internal security breaches took place in US businesses in the…

Internal Security Breaches from Password Based Attacks

Internal Security Breaches from Password Based Attacks

The Insider Threat from a Credentials-Based Attack. Despite the widespread occurrence and high profile internal security breaches, too many corporations are not doing enough to mitigate these risks. Target Corporation & the Stolen Credentials from the Extended Enterprise Stolen account credentials played a part in the recent Target Corporation payment card data breach. With approximately … Continued