Enterprise Network Security Blog from ISDecisions

The convenience of single sign-on services (SSO) without compromising security

The convenience of single sign-on services (SSO) without compromising security

From an end user’s perspective, single sign on is a great idea. You log into one platform, which gives you access to multiple applications, programs and sites, with no need to log into each one individually. It’s convenient, quick and hassle free. But as of recent news, it’s also been proved to be a big … Continued

UserLock now supports both Windows and Mac computers

UserLock now supports both Windows and Mac computers

Today IS Decisions are pleased to announce a significant update to its flagship solution UserLock. UserLock 9.5 is the first version of the software in the company’s history to secure user logins from Mac computers. The launch comes at a time…

Lessons from the NHS: A bitter pill to swallow

Lessons from the NHS: A bitter pill to swallow

The WannaCry cyber-attack, which took place earlier this month, has made headlines all over the world over in recent weeks. Already documented as the biggest ransomware attack in history, the hackers shut down IT systems worldwide, with a staggering 75,000…

Orange Is The New Hack: Lessons from yet another ransomware attack

Orange Is The New Hack: Lessons from yet another ransomware attack

Post-production company, Larson Studios, which is responsible for hit Netflix shows such as Orange Is The New Black, is the latest victim of ransomware. Those responsible stole 10 episodes from the upcoming season five of the jail drama hit series…

Changing your password regularly makes you less safe, apparently

Changing your password regularly makes you less safe, apparently

Here’s an interesting view. According to Paul Edmonds, head of tech at the National Cyber Crime Unit, changing your password regularly makes you less safe. Not more. That’s a surprising opinion given we’re always being told to change our passwords…

How are you performing at access security?

How are you performing at access security?

Take part in our Active Directory Access Security Survey  We recently showed you how Hollywood blockbusters and classic TV series could have improved access security. Now it’s your turn to shine. We’d like your opinions on your challenges with Active Directory to manage ‘access’ risks. Tell us what’s important to you, what other third-party tools you may use, … Continued

File Access Auditing on Windows Servers

File Access Auditing on Windows Servers

The launch of FileAudit 5.2 continues to simplify folder and file access auditing on Windows Servers and help organizations guard against improper access, alteration or the destruction of sensitive data. A complete picture of access events FileAudit 5.2 finds the answers you need from audited access events with far less effort. To identify exactly where … Continued

Credential Theft in Education. Protect your Institution against a Data Breach.

Credential Theft in Education. Protect your Institution against a Data Breach.

Cyber security news site, Dark Reading, recently reported on the news that millions of stolen and fake email credentials from across 300 of the largest universities in the US were available to buy on the Dark Web. The stolen and…

What companies can learn from the alleged Apple hack

What companies can learn from the alleged Apple hack

According to a report from Motherboard, a group of hackers is attempting to extort one of the most well-known companies in the world — Apple. The blackmailing is over alleged access to a collection of stolen user credentials for iCloud…

The misuse and compromise of any Active Directory users identity

The misuse and compromise of any Active Directory users identity

Earlier this month, Dark Reading reported that Active Directory mis-management by administrators is currently exposing a whopping 90% of businesses to cyber breaches. The research made by Skyport concluded that should an administrator’s password become compromised, the “blast radius will reach nearly…

Safer Internet Day – why Microsoft’s assessment gives UK business something to worry about

Safer Internet Day – why Microsoft’s assessment gives UK business something to worry about

Microsoft today named the UK as the best country in the world for online security. According to Microsoft’s Digital Civility Index, which measures the “extent of negative civil and personal safety interactions and their consequences”, British adults and children are…

Protecting Windows Domain Logon Credentials

Protecting Windows Domain Logon Credentials

Windows domain passwords are not going away any time soon. It’s crucial for enterprises to start taking stock of their password threat exposure. 2016 saw a significant rise in worldwide breaches and data theft and by far the most common attack vendor is the theft of user credentials. Fully 91% of attacks begin with a phishing … Continued

Tracking or restricting overtime with America’s prospective labor laws

Tracking or restricting overtime with America’s prospective labor laws

As Barack Obama prepares for retirement, all eyes are on America as its 45th president, Donald Trump, takes over. Before he passed on the baton to his successor, Obama attempted to overhaul legislation surrounding overtime pay. This law would have significantly raised the salary cap under which workers were entitled to earn overtime, meaning the … Continued

Spoiling some of Hollywood and TV’s finest hacking scenes

Spoiling some of Hollywood and TV’s finest hacking scenes

Have you ever been watching a hacking scene in a film and thought “that would never happen in real life?” or “that hack is way too far-fetched to be credible”? Whether it’s a scene where an attacker gains access to…

The Three hack. Take control to stop a breach using an employee login

The Three hack. Take control to stop a breach using an employee login

UK telecoms company Three confirmed news of the security breach on Thursday, revealing that hackers accessed its systems using an employee login, potentially putting the personal data of six million customers at risk. This is the umpteenth time a major company has…

Context-Aware Security Leaves Leaked Employee Passwords Useless

Context-Aware Security Leaves Leaked Employee Passwords Useless

At 221 of the leading Fortune 500 companies, employees’ credentials are posted publicy online for hackers to steal and reuse in cyberattacks. This research is just one of many stories we see every year about how leaked employee passwords leave…

Active Directory User Logon Logoff Security

Active Directory User Logon Logoff Security

So you want to control Active Directory (AD) user access in a more granular way than native Windows’ Group Policy? You want to restrict users from accessing the network based on criteria you specify? And you want to be alerted to any other suspicious logon activity – crucially before that activity…

Windows File Server Auditing with FileAudit

Windows File Server Auditing with FileAudit

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers. Windows File Server Auditing Software Although Windows Active Directory includes native policies to audit file changes, admins turn to third party software to enhance security and ease regulatory compliance. As an agentless solution, … Continued

Secured By miniOrange