How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be the biggest divas in Hollywood, along with some embarrassing email chains involving comments from senior … Continued

An Insider Threat Program to help tackle Internal Security Breaches

An Insider Threat Program to help tackle Internal Security Breaches

According to new research from IS Decisions, 2015 is set to see a huge rise in the number of IT Professionals taking action to address insider threat in their organization. Another day, another massive security breach of millions of consumer…

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions, junto con el distribuidor MacroSeguridad, se presentarán en Segurinfo Argentina 2015, Congreso y Feria Iberoamericana de Seguridad de la Información que se llevará a cabo en Buenos Aires el 10 de marzo de 2015. IS Decisions together with…

File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems…

The wealth of Personal Information accessed in Anthem Network Breach

The wealth of Personal Information accessed in Anthem Network Breach

Anthem, the second largest health insurer in the United States, are the latest high profile victim of a major data security breach. Compromised network credentials for up to 5 employees are thought to have been used to gain unauthorized network…

Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will outline how UserLock can help provide organizations with the automated safeguards and real-time visibility that … Continued

Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

A leading manufacturer in the European Automotive Industry needed to protect important or sensitive files from deletion or falsification. Through FileAudit’s access monitoring and auditing capabilities, the manufacturer has been able to report and track usage of all sensitive files on its Windows network. The risk of files being deleted or tampered with As an … Continued

Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion…

Why Insider Data Breaches are a C suite concern

Why Insider Data Breaches are a C suite concern

Everyone has a theory as to who is behind the recent Sony Pictures hack. If the current media story is not to your liking and you’re looking for another expert opinion, then take a look at the Sony Hack Attribution…

Enhanced network logon security

Enhanced network logon security

When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of…

Monitor User Activity on Windows Server Network

Monitor User Activity on Windows Server Network

Being able to audit and monitor user activity across a Windows Server based Network is key to knowing what is going on in your Windows environment. Monitoring user activity is vital in helping mitigate increasing insider threats, implement CERT best…

Strengthen your Windows network password security and stop blaming the users

Strengthen your Windows network password security and stop blaming the users

The problem with the password is not the password, it’s more the human use of passwords is flawed. We pick simple ones, we forget complex ones, we share them with our colleagues or our boss, or anyone else that appears to have an air of authority. IS Decisions research has shown that as many as … Continued

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

A division from a well-known government law enforcement agency needed to better track the usage of sensitive files presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and serial sexual assaults, serving over 1,000 employees including civilian members and police officers. Their work supports major investigations … Continued

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

To meet the demands of a remote and mobile workforce, today most companies offer employees access to their company mailbox from outside the office. This is most likely accomplished by either using Outlook Web Access (OWA) with a web browser…

Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center…

Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they…

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student…

A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company. This finding explored in the report, ‘From Brutus to Snowden: a study of insider threat personas‘ highlights how employees in two of the world’s … Continued