Majority of IT Pros don’t trust Biometrics for Corporate Security

Majority of IT Pros don’t trust Biometrics for Corporate Security

Only a quarter of IT professionals believe that biometrics is the safest way to confirm identity in order to access corporate data, according to new research from IS Decisions. In fact, no individual technology wins a majority. Biometrics (23%) comes one place behind two-factor authentication (29%), and edged only slightly ahead of the humble old … Continued

Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This…

How Technology & Education help Mitigate the Insider Threat

How Technology & Education help Mitigate the Insider Threat

IT professionals are looking to take a joined up approach of better user education and technology solutions to mitigate the insider threat. According to 500 IT Professionals, the continual high profile internal security breaches are prompting a surge in preventative…

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be…

An Insider Threat Program to help tackle Internal Security Breaches

An Insider Threat Program to help tackle Internal Security Breaches

According to new research from IS Decisions, 2015 is set to see a huge rise in the number of IT Professionals taking action to address insider threat in their organization. Another day, another massive security breach of millions of consumer…

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions, junto con el distribuidor MacroSeguridad, se presentarán en Segurinfo Argentina 2015, Congreso y Feria Iberoamericana de Seguridad de la Información que se llevará a cabo en Buenos Aires el 10 de marzo de 2015. IS Decisions together with our partner MacroSeguridad will be represented at the upcoming Segurinfo Argentina 2015. This leading Information … Continued

File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 30 Day Trial Download of FileAudit IT professionals can set up … Continued

The wealth of Personal Information accessed in Anthem Network Breach

The wealth of Personal Information accessed in Anthem Network Breach

Anthem, the second largest health insurer in the United States, are the latest high profile victim of a major data security breach. Compromised network credentials for up to 5 employees are thought to have been used to gain unauthorized network…

Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will…

Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

A leading manufacturer in the European Automotive Industry needed to protect important or sensitive files from deletion or falsification. Through FileAudit’s access monitoring and auditing capabilities, the manufacturer has been able to report and track usage of all sensitive files…

Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion…

Why Insider Data Breaches are a C suite concern

Why Insider Data Breaches are a C suite concern

Everyone has a theory as to who is behind the recent Sony Pictures hack. If the current media story is not to your liking and you’re looking for another expert opinion, then take a look at the Sony Hack Attribution Generator. Fire it up, hit refresh on your browser and you’ll get a new and … Continued

Enhanced network logon security

Enhanced network logon security

When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of being nigh on impossible. Humans are the weakest link Research conducted by IS Decisions found … Continued

Monitor User Activity on Windows Server Network

Monitor User Activity on Windows Server Network

Being able to audit and monitor user activity across a Windows Server based Network is key to knowing what is going on in your Windows environment. Monitoring user activity is vital in helping mitigate increasing insider threats, implement CERT best…

Strengthen your Windows network password security and stop blaming the users

Strengthen your Windows network password security and stop blaming the users

The problem with the password is not the password, it’s more the human use of passwords is flawed. We pick simple ones, we forget complex ones, we share them with our colleagues or our boss, or anyone else that appears…

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

Why Monitoring Shared Folder Access is so vital for this Law Enforcement Division in Court

A division from a well-known government law enforcement agency needed to better track the usage of sensitive files presented in the prosecution of major criminals.  The division deals with high profile cases such as murder, fraud and serial sexual assaults,…

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

Protecting Outlook Web Access and ActiveSync on Exchange with UserLock

To meet the demands of a remote and mobile workforce, today most companies offer employees access to their company mailbox from outside the office. This is most likely accomplished by either using Outlook Web Access (OWA) with a web browser…

Mitigating Credentials-based-attacks from Social Engineering

Mitigating Credentials-based-attacks from Social Engineering

Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center recently published its research on unintentional insider threats focusing on the use of phishing and/or … Continued