HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued

Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

The biggest threat for the banking sector is coming from within. How can a bank mitigate against the risk from malicious, careless or exploited users? This week saw U.S. law enforcement officials arrest five individuals who reportedly were involved in…

Access Control in Healthcare for CMS compliance

Access Control in Healthcare for CMS compliance

“UserLock is the only solution on the market that allows our organisation to fulfill the CMS compliance requirements for its government contracts. It is absolutely critical to our business in this respect, but brings with it numerous other benefits in…

Insider Threat Program. 12 Steps to Future Proofing your Internal Security

Insider Threat Program. 12 Steps to Future Proofing your Internal Security

The Future of Addressing Insider Threat All data is from the IS Decisions’ research report User Security in 2015: The Future of Addressing Insider Threat, a study into the opinions and immediate plans of 500 IT decision makers in regard to…

How to check users logged into Windows Server Network

How to check users logged into Windows Server Network

IT Administrators often need to know who is currently logged on / connected to a server. With UserLock, an organization can track and record all user access to know who is logged into the Windows Server network environment, from which…

Managing Temporary Changes to Users Access Control Policy

Managing Temporary Changes to Users Access Control Policy

The release of UserLock 8.5 strengthens user access control policy by enabling administrators to securely manage temporary changes to users’ network access rights. Temporary network access rights To secure sensitive information, an organization may need to restrict the amount of time employees, contractors or external partners can access certain systems. Users should be provided with … Continued

Raising User Security Awareness

Raising User Security Awareness

IS Decisions has launched the first online game designed specifically to educate and raise awareness of user security and insider threat. ‘The Weakest Link: A User Security Game’ has been developed as a free resource for organizations in response to our own research that found 48% of IT professionals believe training is key to raising awareness … Continued

Majority of IT Pros don’t trust Biometrics for Corporate Security

Majority of IT Pros don’t trust Biometrics for Corporate Security

Only a quarter of IT professionals believe that biometrics is the safest way to confirm identity in order to access corporate data, according to new research from IS Decisions. In fact, no individual technology wins a majority. Biometrics (23%) comes…

Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This…

How Technology & Education help Mitigate the Insider Threat

How Technology & Education help Mitigate the Insider Threat

IT professionals are looking to take a joined up approach of better user education and technology solutions to mitigate the insider threat. According to 500 IT Professionals, the continual high profile internal security breaches are prompting a surge in preventative…

How to reduce the risk of Insider Threat in Healthcare

How to reduce the risk of Insider Threat in Healthcare

Towards the end of 2014 all we seemed to hear about in the technology media was the latest nugget of information to come out of the Sony Hack. The stories mostly concerned celebrities and highlights of who happened to be…

An Insider Threat Program to help tackle Internal Security Breaches

An Insider Threat Program to help tackle Internal Security Breaches

According to new research from IS Decisions, 2015 is set to see a huge rise in the number of IT Professionals taking action to address insider threat in their organization. Another day, another massive security breach of millions of consumer or company records. As the stories behind many of these breaches unravel, frequently the source appears … Continued

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions y MacroSeguridad se presentarán en Segurinfo Argentina 2015

IS Decisions, junto con el distribuidor MacroSeguridad, se presentarán en Segurinfo Argentina 2015, Congreso y Feria Iberoamericana de Seguridad de la Información que se llevará a cabo en Buenos Aires el 10 de marzo de 2015. IS Decisions together with our partner MacroSeguridad will be represented at the upcoming Segurinfo Argentina 2015. This leading Information … Continued

File Monitoring Software Update. Much more than a file access log.

File Monitoring Software Update. Much more than a file access log.

We are pleased to announce the release of an update to our file monitoring software solution – FileAudit. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems…

The wealth of Personal Information accessed in Anthem Network Breach

The wealth of Personal Information accessed in Anthem Network Breach

Anthem, the second largest health insurer in the United States, are the latest high profile victim of a major data security breach. Compromised network credentials for up to 5 employees are thought to have been used to gain unauthorized network…

Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will…

Monitor & Audit File Deletion & Falsification across Windows Servers.

Monitor & Audit File Deletion & Falsification across Windows Servers.

A leading manufacturer in the European Automotive Industry needed to protect important or sensitive files from deletion or falsification. Through FileAudit’s access monitoring and auditing capabilities, the manufacturer has been able to report and track usage of all sensitive files…

Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion that IT security is a combination of people, process and technology is nothing new. The triangle … Continued