Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they had had an internal security breach in the last year. Yet despite this huge prolificacy, … Continued

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student…

A Third of Ex-Employees Accessing Company Data

A Third of Ex-Employees Accessing Company Data

Our latest research which surveyed 2,000 desk-based workers in the UK and US reveals at least one in three ex-employees are left with access to systems or data after leaving a company. This finding explored in the report, ‘From Brutus…

From Brutus to Snowden. A Study of Insider Threat Personas

From Brutus to Snowden. A Study of Insider Threat Personas

Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted…

Research shows Employees see no Security Risk in Sharing Passwords

Research shows Employees see no Security Risk in Sharing Passwords

One of the biggest internal security issues every business has to deal with is password sharing.  We know that insider threats represent one of the greatest risks to a business. Even when we consider highly technically proficient hackers, the way…

Insider Threat Program. From Paranoia to Protection

Insider Threat Program. From Paranoia to Protection

Last week IS Decisions participated in the SPIN Insider Threat Conference in London joining participants from academia, government and industry to discuss the threat from within. Speakers at the workshop included security experts from CERT, PA Consulting Group (HoMER Publication), Oxford e-Research Centre & the US Secret Service. In a series of 3 posts we … Continued

More protection against the Insider Threat with UserLock 8

More protection against the Insider Threat with UserLock 8

Since the release of UserLock 7 eleven months ago, UserLock has helped equip more organizations with the means to prevent, detect and respond to the risk of the insider threat. We are now delighted to announce the release of UserLock 8 Beta Version. Click here to participate in the Beta testing program!   Considering that there … Continued

Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently…

Healthcare suffers double the average amount of internal security breaches

Healthcare suffers double the average amount of internal security breaches

Independent research finds hospitals, care providers and medical insurers experience twice as many internal security breaches in comparison to other sectors. The threat from within rife in the healthcare sector Organisations in the healthcare sector are experiencing double the average…

Securing students access to a school network

Securing students access to a school network

This Case Study highlights how state schools across Luxembourg utilized UserLock® to provide the necessary access control, restrictions and monitoring to help secure students access to a school network and the resources contained within. Key Findings For schools using Windows infrastructure,…

UserLock Recommendations from your IT Security peers

UserLock Recommendations from your IT Security peers

When your researching and assessing solutions for the security of your Microsoft Windows and/or Active Directory infrastructure, we know your looking for honest, “tell it like it is” feedback. With the news that from April 14th, LinkedIn will discontinue the…

Technology Solutions for the Insider Threat

Technology Solutions for the Insider Threat

Nearly 90% of IT professionals believe the ‘insider threat’ is cultural not a tech issue. Only 1 in 10 UK companies are aware they can use a technology solution to actively manage & reduce the threat from within   The vast majority (86%) of IT professionals consider insider threats to be a purely cultural issue, … Continued

A Focus on Insider Threats in Banking & Financial Institutions

A Focus on Insider Threats in Banking & Financial Institutions

When we talk about cybercrime in the Banking & Financial Sector we tend to focus on external threats, but often organisation insiders are more likely to be the source of cyberattack.  In fact you could say insider threats pose a greater risk than external threats as your employees already know where the company’s ‘crown jewels’ … Continued

The Insider Threat Manifesto

The Insider Threat Manifesto

Over 2,560 Internal Security Breaches occurred in US businesses every day. Despite widespread occurrence, only one in five IT professionals consider Insider Threat to be a security priority. Over 666,000 internal security breaches took place in US businesses in the…

Internal Security Breaches from Password Based Attacks

Internal Security Breaches from Password Based Attacks

The Insider Threat from a Credentials-Based Attack. Despite the widespread occurrence and high profile internal security breaches, too many corporations are not doing enough to mitigate these risks. Target Corporation & the Stolen Credentials from the Extended Enterprise Stolen account…

Security considerations for Active Directory – User Access

Security considerations for Active Directory – User Access

How to overcome those that are determined to circumvent Security? Securing User Access to the Network Today, most organizations are looking for better ways to protect their network against insider threats. For Academic Institutions, this problem is of particular importance…

LimitLogin vs UserLock

LimitLogin vs UserLock

This blog post reviews how LimitLogin and UserLock limit concurrent user logins in an Active Directory domain. It will focus on the concurrent connection restriction feature provided by each solution and discuss how else they help an organization secure user…

Extending Microsoft Active Directory Security in 2014 and beyond.

Extending Microsoft Active Directory Security in 2014 and beyond.

For many organizations Active Directory is just the starting point when it comes to identity management and controlling and recording what users can do. Active Directory provides basis user security. It can check that credentials supplied match stored user profiles and then open access to different resources. Once a user is authenticated however, organizations need to apply … Continued