From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued

Research shows Employees see no Security Risk in Sharing Passwords

Research shows Employees see no Security Risk in Sharing Passwords

One of the biggest internal security issues every business has to deal with is password sharing.  We know that insider threats represent one of the greatest risks to a business. Even when we consider highly technically proficient hackers, the way…

Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Last week IS Decisions participated in the SPIN Insider Threat Conference in London joining participants from academia, government and industry to discuss the threat from within. Speakers at the workshop included security experts from CERT, PA Consulting Group (HoMER Publication),…

More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

Since the release of UserLock 7 eleven months ago, UserLock has helped equip more organizations with the means to prevent, detect and respond to the risk of the insider threat. Considering that there were an estimated 600,000 internal breaches of…

Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently…

Healthcare suffers double the average amount of internal security breaches

Healthcare suffers double the average amount of internal security breaches

Independent research finds hospitals, care providers and medical insurers experience twice as many internal security breaches in comparison to other sectors. The threat from within rife in the healthcare sector Organisations in the healthcare sector are experiencing double the average amount of internal security breaches, in comparison to all industries. The findings are based on … Continued

Securing students access to a school network

Securing students access to a school network

This Case Study highlights how state schools across Luxembourg utilized UserLock® to provide the necessary access control, restrictions and monitoring to help secure students access to a school network and the resources contained within. Key Findings For schools using Windows infrastructure, no native features are available to limit connections and report effectively on historic connections. It … Continued

UserLock Recommendations from your IT Security peers

UserLock Recommendations from your IT Security peers

When your researching and assessing solutions for the security of your Microsoft Windows and/or Active Directory infrastructure, we know your looking for honest, “tell it like it is” feedback. With the news that from April 14th, LinkedIn will discontinue the…

Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within   The…

A Focus on Insider Threats in Banking & Financial Institutions

A Focus on Insider Threats in Banking & Financial Institutions

When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of cyberattack.  In fact you could say insider threats pose a…

The Insider Threat Manifesto

The Insider Threat Manifesto

Over 2,560 Internal Security Breaches occurred in US businesses every day. Despite widespread occurrence, only one in five IT professionals consider Insider Threat to be a security priority. Over 666,000 internal security breaches took place in US businesses in the…

Internal Security Breaches from Password Based Attacks

Internal Security Breaches from Password Based Attacks

The Insider Threat from a Credentials-Based Attack. Despite the widespread occurrence and high profile internal security breaches, too many corporations are not doing enough to mitigate these risks. Target Corporation & the Stolen Credentials from the Extended Enterprise Stolen account credentials played a part in the recent Target Corporation payment card data breach. With approximately … Continued

Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

How to overcome those that are determined to circumvent Security? Securing User Access to the Network Today, most organizations are looking for better ways to protect their network against insider threats. For Academic Institutions, this problem is of particular importance in stopping those who are smart enough to gain entry to whatever part of the … Continued

LimitLogin vs UserLock

LimitLogin vs UserLock

This blog post reviews how LimitLogin and UserLock limit concurrent user logins in an Active Directory domain. It will focus on the concurrent connection restriction feature provided by each solution and discuss how else they help an organization secure user…

Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

For many organizations Active Directory is just the starting point when it comes to identity management and controlling and recording what users can do. Active Directory provides basis user security. It can check that credentials supplied match stored user profiles and…

Windows Network Access Control for Government Traffic Department

Windows Network Access Control for Government Traffic Department

UserLock provides Windows Network Access Control and Security to Government State Traffic Department. By restricting, controlling and monitoring network access for over 2000 authorized users, UserLock helps Departamento Estadual de Trânsito de Pernambuco in Brazil protect sensitive data and mitigate insider…

Tackling the security risk from internal users in Banking

Tackling the security risk from internal users in Banking

The following case-study describes how the Bank of Cyprus reduces the security risk from internal users with UserLock. Offering the capability to control user access and react instantly to any related security incident, UserLock helps protect an organization’s critical assets…

Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Securing your Windows Active Directory infrastructure. Every day here at IS Decisions, we’re lucky to engage with individuals from all over the world. Security and emergency response truly are global issues. We speak with individuals from organizations, companies and government departments that recognize their security needs go beyond what’s available in native Windows controls. We speak … Continued