Insider Threat Program. 12 Steps to Future Proofing your Internal Security

Insider Threat Program. 12 Steps to Future Proofing your Internal Security

The Future of Addressing Insider Threat All data is from the IS Decisions’ research report User Security in 2015: The Future of Addressing Insider Threat, a study into the opinions and immediate plans of 500 IT decision makers in regard to tackling the insider threat. It could be argued that we’ve reached a kind of tipping point … Continued

How to check users logged into Windows Server Network

How to check users logged into Windows Server Network

IT Administrators often need to know who is currently logged on / connected to a server. With UserLock, an organization can track and record all user access to know who is logged into the Windows Server network environment, from which…

Managing Temporary Changes to Users Access Control Policy

Managing Temporary Changes to Users Access Control Policy

The release of UserLock 8.5 strengthens user access control policy by enabling administrators to securely manage temporary changes to users’ network access rights. Temporary network access rights To secure sensitive information, an organization may need to restrict the amount of…

Raising User Security Awareness

Raising User Security Awareness

IS Decisions has launched the first online game designed specifically to educate and raise awareness of user security and insider threat. ‘The Weakest Link: A User Security Game’ has been developed as a free resource for organizations in response to…

Majority of IT Pros don’t trust Biometrics for Corporate Security

Majority of IT Pros don’t trust Biometrics for Corporate Security

Only a quarter of IT professionals believe that biometrics is the safest way to confirm identity in order to access corporate data, according to new research from IS Decisions. In fact, no individual technology wins a majority. Biometrics (23%) comes…

Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This survey was across a sample of 2,000 people in the UK and the US, and … Continued

How Technology & Education help Mitigate the Insider Threat

How Technology & Education help Mitigate the Insider Threat

IT professionals are looking to take a joined up approach of better user education and technology solutions to mitigate the insider threat. According to 500 IT Professionals, the continual high profile internal security breaches are prompting a surge in preventative measures against insider threat. 43% of organizations have now an insider threat program in place and … Continued

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be…

An Insider Threat Program to help tackle Internal Security Breaches

An Insider Threat Program to help tackle Internal Security Breaches

According to new research from IS Decisions, 2015 is set to see a huge rise in the number of IT Professionals taking action to address insider threat in their organization. Another day, another massive security breach of millions of consumer…

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions, junto con el distribuidor MacroSeguridad, se presentarán en Segurinfo Argentina 2015, Congreso y Feria Iberoamericana de Seguridad de la Información que se llevará a cabo en Buenos Aires el 10 de marzo de 2015. IS Decisions together with…

File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems…

The wealth of Personal Information accessed in Anthem Network Breach

The wealth of Personal Information accessed in Anthem Network Breach

Anthem, the second largest health insurer in the United States, are the latest high profile victim of a major data security breach. Compromised network credentials for up to 5 employees are thought to have been used to gain unauthorized network access to a corporate database, reportedly containing a wealth of personal information on current and … Continued

Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will outline how UserLock can help provide organizations with the automated safeguards and real-time visibility that … Continued

Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

A leading manufacturer in the European Automotive Industry needed to protect important or sensitive files from deletion or falsification. Through FileAudit’s access monitoring and auditing capabilities, the manufacturer has been able to report and track usage of all sensitive files…

Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion…

Why Insider Data Breaches are a C suite concern

Why Insider Data Breaches are a C suite concern

Everyone has a theory as to who is behind the recent Sony Pictures hack. If the current media story is not to your liking and you’re looking for another expert opinion, then take a look at the Sony Hack Attribution…

Enhanced network logon security

Enhanced network logon security

When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of…

Monitor User Activity on Windows Server Network

Monitor User Activity on Windows Server Network

Being able to audit and monitor user activity across a Windows Server based Network is key to knowing what is going on in your Windows environment. Monitoring user activity is vital in helping mitigate increasing insider threats, implement CERT best practices and get compliant. However it is important to stress that without enhanced user access … Continued