Author Archives: Chris Bunn

Comments Off on Why a decline for data breach costs is still not good enough

Why a decline for data breach costs is still not good enough

Why a decline for data breach costs is still not good enough

According to a recent study by international security research company, the Ponemon Institute, the average total cost of a data breach has declined by 10% globally. While it is encouraging to learn that global costs of data breaches have decreased, the fact remains that hugely disruptive data breaches are still happening alarmingly frequently all over … Continued

Comments Off on The convenience of single sign-on services (SSO) without compromising security

The convenience of single sign-on services (SSO) without compromising security

The convenience of single sign-on services (SSO) without compromising security

From an end user’s perspective, single sign on is a great idea. You log into one platform, which gives you access to multiple applications, programs and sites, with no need to log into each one individually. It’s convenient, quick and hassle free. But as of recent news, it’s also been proved to be a big … Continued

Comments Off on UserLock now supports both Windows and Mac computers

UserLock now supports both Windows and Mac computers

UserLock now supports both Windows and Mac computers

Today IS Decisions are pleased to announce a significant update to its flagship solution UserLock. UserLock 9.5 is the first version of the software in the company’s history to secure user logins from Mac computers. The launch comes at a time where Macs are replacing PCs at an ‘unprecedented rate’ according to Jamf’s 2016 Managing Apple … Continued

Comments Off on Lessons from the NHS: A bitter pill to swallow

Lessons from the NHS: A bitter pill to swallow

Lessons from the NHS: A bitter pill to swallow

The WannaCry cyber-attack, which took place earlier this month, has made headlines all over the world over in recent weeks. Already documented as the biggest ransomware attack in history, the hackers shut down IT systems worldwide, with a staggering 75,000 attacks in 99 countries. However, of those impacted, the organisation which has been given the … Continued

Comments Off on Orange Is The New Hack: Lessons from yet another ransomware attack

Orange Is The New Hack: Lessons from yet another ransomware attack

Orange Is The New Hack: Lessons from yet another ransomware attack

Post-production company, Larson Studios, which is responsible for hit Netflix shows such as Orange Is The New Black, is the latest victim of ransomware. Those responsible stole 10 episodes from the upcoming season five of the jail drama hit series and threatened to release them online unless a ransom was paid. When these demands were … Continued

Comments Off on Changing your password regularly makes you less safe, apparently

Changing your password regularly makes you less safe, apparently

Changing your password regularly makes you less safe, apparently

Here’s an interesting view. According to Paul Edmonds, head of tech at the National Cyber Crime Unit, changing your password regularly makes you less safe. Not more. That’s a surprising opinion given we’re always being told to change our passwords regularly to keep attackers at bay. It’s the equivalent of changing the locks. If a … Continued

Comments Off on How are you performing at access security?

How are you performing at access security?

How are you performing at access security?

Take part in our Active Directory Access Security Survey  We recently showed you how Hollywood blockbusters and classic TV series could have improved access security. Now it’s your turn to shine. We’d like your opinions on your challenges with Active Directory to manage ‘access’ risks. Tell us what’s important to you, what other third-party tools you may use, … Continued

Comments Off on File Access Auditing on Windows Servers

File Access Auditing on Windows Servers

File Access Auditing on Windows Servers

The launch of FileAudit 5.2 continues to simplify folder and file access auditing on Windows Servers and help organizations guard against improper access, alteration or the destruction of sensitive data. A complete picture of access events FileAudit 5.2 finds the answers you need from audited access events with far less effort. To identify exactly where … Continued

, Comments Off on Credential Theft in Education. Protect your Institution against a Data Breach.

Credential Theft in Education. Protect your Institution against a Data Breach.

Credential Theft in Education. Protect your Institution against a Data Breach.

Cyber security news site, Dark Reading, recently reported on the news that millions of stolen and fake email credentials from across 300 of the largest universities in the US were available to buy on the Dark Web. The stolen and fake student, faculty and alumni access credentials are being offered to buyers for anywhere from … Continued

Comments Off on What companies can learn from the alleged Apple hack

What companies can learn from the alleged Apple hack

What companies can learn from the alleged Apple hack

According to a report from Motherboard, a group of hackers is attempting to extort one of the most well-known companies in the world — Apple. The blackmailing is over alleged access to a collection of stolen user credentials for iCloud and other Apple email accounts. The ‘Turkish Crime Family’ hackers have demanded $75,000 in either … Continued

Secured By miniOrange