Enterprise Network Security Blog from ISDecisions

What companies can learn from the alleged Apple hack

What companies can learn from the alleged Apple hack

According to a report from Motherboard, a group of hackers is attempting to extort one of the most well-known companies in the world — Apple. The blackmailing is over alleged access to a collection of stolen user credentials for iCloud and other Apple email accounts. The ‘Turkish Crime Family’ hackers have demanded $75,000 in either … Continued

The misuse and compromise of any Active Directory users identity

The misuse and compromise of any Active Directory users identity

Earlier this month, Dark Reading reported that Active Directory mis-management by administrators is currently exposing a whopping 90% of businesses to cyber breaches. The research made by Skyport concluded that should an administrator’s password become compromised, the “blast radius will reach nearly…

Safer Internet Day – why Microsoft’s assessment gives UK business something to worry about

Safer Internet Day – why Microsoft’s assessment gives UK business something to worry about

Microsoft today named the UK as the best country in the world for online security. According to Microsoft’s Digital Civility Index, which measures the “extent of negative civil and personal safety interactions and their consequences”, British adults and children are…

Protecting Windows Domain Logon Credentials

Protecting Windows Domain Logon Credentials

Windows domain passwords are not going away any time soon. It’s crucial for enterprises to start taking stock of their password threat exposure. 2016 saw a significant rise in worldwide breaches and data theft and by far the most common attack…

Tracking or restricting overtime with America’s prospective labor laws

Tracking or restricting overtime with America’s prospective labor laws

As Barack Obama prepares for retirement, all eyes are on America as its 45th president, Donald Trump, takes over. Before he passed on the baton to his successor, Obama attempted to overhaul legislation surrounding overtime pay. This law would have…

Spoiling some of Hollywood and TV’s finest hacking scenes

Spoiling some of Hollywood and TV’s finest hacking scenes

Have you ever been watching a hacking scene in a film and thought “that would never happen in real life?” or “that hack is way too far-fetched to be credible”? Whether it’s a scene where an attacker gains access to a complex network using the most ridiculously simple password they’ve stolen, or a scene where … Continued

The Three hack. Take control to stop a breach using an employee login

The Three hack. Take control to stop a breach using an employee login

UK telecoms company Three confirmed news of the security breach on Thursday, revealing that hackers accessed its systems using an employee login, potentially putting the personal data of six million customers at risk. This is the umpteenth time a major company has suffered a data breach as a result of an employee login falling into the wrong … Continued

Context-Aware Security Leaves Leaked Employee Passwords Useless

Context-Aware Security Leaves Leaked Employee Passwords Useless

At 221 of the leading Fortune 500 companies, employees’ credentials are posted publicy online for hackers to steal and reuse in cyberattacks. This research is just one of many stories we see every year about how leaked employee passwords leave…

Active Directory User Logon Logoff Security

Active Directory User Logon Logoff Security

So you want to control Active Directory (AD) user access in a more granular way than native Windows’ Group Policy? You want to restrict users from accessing the network based on criteria you specify? And you want to be alerted to any other suspicious logon activity – crucially before that activity…

Windows File Server Auditing with FileAudit

Windows File Server Auditing with FileAudit

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers. Windows File Server Auditing Software Although Windows Active Directory includes native policies to audit file changes, admins turn…

Watch Movie Online Descendants (2015) subtitle english

Watch Movie Online Descendants (2015) subtitle english

Descendants (2015) HD Director : Kenny Ortega. Writer : Josann McGibbon, Sara Parriott. Producer : Tracey Jeffrey. Release : July 31, 2015 Country : United States of America. Production Company : Walt Disney Television. Language : English, ภาษาไทย. Runtime :…

Half of US organizations reject multi-factor authentication, report finds

Half of US organizations reject multi-factor authentication, report finds

Nearly half of US organizations do not use multi-factor authentication to protect against compromised credentials, a survey by global IT security vendor IS Decisions finds today, with organizations citing ‘ infrastructure complexity’ (28%) and ‘time needed to manage and oversee’ (18%) as two of the biggest barriers to adoption. The news comes off the back … Continued

Companies are failing to balance User Security & User Productivity

Companies are failing to balance User Security & User Productivity

Large US firms are losing 182 days of employee productivity every year due to over complex security. IS Decisions research highlights a failure of both US and UK businesses to find the right balance between user security and user productivity. Our research reveals that on average, each (US) employee loses 21.88 minutes every week because of … Continued

How UserLock Guards against Shared or Stolen Windows AD Network Logins

How UserLock Guards against Shared or Stolen Windows AD Network Logins

If you ask your neighbors to watch your house and keep an eye out for any signs of forced entry when you go on holiday, you’re going to miss the burglar who steals your keys and walks right through the…

User security compliance – Where industries are getting compliance badly wrong.

User security compliance – Where industries are getting compliance badly wrong.

When it comes to data security, regardless of your industry sector, you’re likely to have to deal with compliance regulations.live streaming movie The Great Wall online If you’re in the legal industry, there is the Law Society’s Lexcel standards. If…

Are you sure of your Windows Users claimed identity?

Are you sure of your Windows Users claimed identity?

streaming xXx: Return of Xander Cage Verifying Windows users claimed identity to guard against unauthorized access from stolen or shared credentials. 1. Contextual access controls Contextual access controls can define and restrict network access conditions for each authenticated Windows user. If…

6 things you never want to hear a user say….

6 things you never want to hear a user say….

It was reported this week that user error accounted for the vast majority of UK security breach incidents. The CERT Insider Threat Center also recently determined that most security incidents initiated through phishing and other social engineering are carried out…

Meeting HIPAA compliance to track and recover lost files.

Meeting HIPAA compliance to track and recover lost files.

A world-class medical imaging practice chooses FileAudit to track and recover lost files. A medical practice based in New England offers diagnostic services to the medical profession. It has a network of private facilities, staffed by board-certified radiologists, registered technologists, and a team of dedicated staff that offers physicians and patients prompt and professional service. … Continued

Secured By miniOrange