Enterprise Network Security Blog from ISDecisions

Companies are failing to balance User Security & User Productivity

Companies are failing to balance User Security & User Productivity

Large US firms are losing 182 days of employee productivity every year due to over complex security. IS Decisions research highlights a failure of both US and UK businesses to find the right balance between user security and user productivity. Our research reveals that on average, each (US) employee loses 21.88 minutes every week because of … Continued

How UserLock Guards against Shared or Stolen Windows AD Network Logins

How UserLock Guards against Shared or Stolen Windows AD Network Logins

If you ask your neighbors to watch your house and keep an eye out for any signs of forced entry when you go on holiday, you’re going to miss the burglar who steals your keys and walks right through the…

User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

When it comes to data security, regardless of your industry sector, you’re likely to have to deal with compliance regulations. If you’re in the legal industry, there is the Law Society’s Lexcel standards. If you handle cardholder data, you’ll have…

Are you sure of your Windows Users claimed identity?

Are you sure of your Windows Users claimed identity?

Verifying Windows users claimed identity to guard against unauthorized access from stolen or shared credentials. 1. Contextual access controls Contextual access controls can define and restrict network access conditions for each authenticated Windows user. If credentials are compromised, any attempted access…

6 things you never want to hear a user say….

6 things you never want to hear a user say….

It was reported this week that user error accounted for the vast majority of UK security breach incidents. The CERT Insider Threat Center also recently determined that most security incidents initiated through phishing and other social engineering are carried out…

Meeting HIPAA compliance to track and recover lost files.

Meeting HIPAA compliance to track and recover lost files.

A world-class medical imaging practice chooses FileAudit to track and recover lost files. A medical practice based in New England offers diagnostic services to the medical profession. It has a network of private facilities, staffed by board-certified radiologists, registered technologists, and a team of dedicated staff that offers physicians and patients prompt and professional service. … Continued

Detect and alert on Windows File changes

Detect and alert on Windows File changes

Industrial engineers figure out how to do things better. They engineer processes and systems that improve quality and productivity. They work to eliminate waste of time, money, materials, energy and other commodities. In such a highly competitive field, any sensitive data needs to be well protected from potential data breaches. Industrial engineers reacting quickly to … Continued

IT manager at a school or university? You’ve got your work cut out for you

IT manager at a school or university? You’ve got your work cut out for you

If you’re responsible for IT security at a school, college or university, I don’t envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers and the…

Why compromised logins are every CIO and CISO’s nightmare!

Why compromised logins are every CIO and CISO’s nightmare!

The real, $940 million risk of sharing credentials or having weak login information! Last week, a federal judge awarded Epic $940 million in damages, $240 million in compensatory damages and $700 million in punitive damages in the suit against Tata.…

Panama Papers Leak: Prevention is Always Better than Cure

Panama Papers Leak: Prevention is Always Better than Cure

For almost four decades, Panama’s Mossack Fonseca law firm has specialised in commercial law, trust service and investor advisory, and was known for its discretion to global elites. However, its recent leak of more than 11 million documents – the…

How to Detect Ransomware with FileAudit

How to Detect Ransomware with FileAudit

According to the FBI, ransomware – the strain of malware whereby files and folders are locked down by criminals and not released until a ransom is paid – is a growing concern. This, coupled with the new mass access alerts with…

Protection from Password Sharing

Protection from Password Sharing

Employees are arguably the greatest security risk to modern businesses. Though it is often assumed that IT viruses and hackers should be your biggest concern, the reality is that it is your own staff, whether maliciously or accidentally, that are the most likely cause of a breach. But how much do you really know about … Continued

Are you Identifying and Monitoring End-Users Network and File Access?

Are you Identifying and Monitoring End-Users Network and File Access?

Recent IS Decisions research among 1500 healthcare, finance, and legal sector workers in both the US and the UK highlighted the current status of how organizations are securing their networks and sensitive information within. The results shed light on how much more needs to be done to mitigate the risk of both security and compliance … Continued

Beta Testers wanted for UserLock 9.0

Beta Testers wanted for UserLock 9.0

IS Decisions is pleased to announce the UserLock 9.0 Beta Testing Program. This major upgrade comes with numerous new features and enhancements including: Verify and manage users Initial Access Point to better secure all subsequent network connections Block all logon…

Stopping Legitimate Login Credentials being used for Security Breaches

Stopping Legitimate Login Credentials being used for Security Breaches

Many data breaches involve the use of legitimate login credentials. Guarding against these ‘insider threats’ means better protecting all authenticated users access to the network, and the sensitive information within. The Threat from Human and Authenticated Users There is now widespread…

HIPAA Access Control

HIPAA Access Control

Access control is the first Technical Safeguard Standard of the HIPAA Security Rules. It is described in HIPAA compliance as the responsibility for all healthcare providers to allow access only to those users (or software programs) that have been granted access…

Five Ways to Never Trust, Always Verify, in Zero-Trust IT

Five Ways to Never Trust, Always Verify, in Zero-Trust IT

Is your IT like an M&M? Does your security have a hard, crunchy exterior and soft, chewy interior? The following is a guest post from Andy Doyle at PNL Tools, a leading UK based, professional services provider and IT reseller that work…

Concurrent Session Control in Healthcare for CMS compliance

Concurrent Session Control in Healthcare for CMS compliance

“UserLock is the only solution on the market that allows our organisation to fulfill the CMS compliance requirements for its government contracts. It is absolutely critical to our business in this respect, but brings with it numerous other benefits in usability and reporting functionality.” Technology Editor for Active Directory, Leading US Healthcare Insurance Provider   … Continued