News

30th November 2016

How context-aware security could’ve stopped Three’s data breach

Context-aware security uses supplemental information to decide whether access is genuine or not when someone attempts to connect.

Read the entire article at IT Pro Portal

18th November 2016

Three hack

Security experts accuse telco of 'corporate blindness'

Read the entire article at The Inquirer

16th November 2016

UX versus User Security

Part two: Reducing security complexity for better employee productivity

Read the entire article at Digital Forensics Magazine

28th October 2016

UX versus User Security

Part one: More than passwords…

Read the entire article at Digital Forensics Magazine

25th October 2016

Review: IS Decisions UserLock - Help Net Security

How UserLock offers Windows server administrators powerful access protection to prevent internal and external threats related to compromised credentials…

Read the entire article from HelpNetSecurity

21st October 2016

Multi-factor authentication — it's not as good as you think

François Amigorena argues that multi-factor authentication impedes end users and slows them down in their jobs, and goes into detail about how context-aware security works in the background to secure users…

Read the entire article from SC Magazine UK


26th September 2016

5 Common Mistakes Companies Make with Access Management Software

Are you sure at all times that anybody accessing your systems is exactly who they say they are?…

Read the entire article at CrowdReviews

21st September 2016

IS Decisions on an alternative to multi-factor authentication

How context-aware security allows your system to take advantage of supplemental information to decide whether access is genuine or not at the exact moment when someone attempts to connect…

Read the entire article from SC Magazine

9th September 2016

Multi-Factor IT Authentication Hampers Progress, Say 47% US Companies

IS Decisions survey finds organizations are looking for alternate to multi-factor verification, which they believe takes up time and slows productivity…

Read the entire article from Dark Reading

20th July 2016

How to protect against compromised credentials — without affecting employee productivity

François Amigorena explains how cumbersome security wastes time, whereas contextual awareness allows greater security automatically…

Read the entire article from SC Magazine

21th June 2016

IS Decisions responds to business fears on compromised logins

Global IT security vendor launches UserLock 9 with latest features to enhance access security without obstructing or impeding end users…

Read the entire article from IT Security Guru

06th June 2016

Fixing the UK’s Ransomware Problem

3 clear ways to prevent ransomware, and even mitigate it…

Read the entire article from Infosecurity Magazine

13th May 2016

Users should be at heart of FCA or PCI compliance strategy

IS Decisions research shows financial companies up and down the country are flouting user security requirements left, right and centre — and therefore putting sensitive information at risk…

Read the entire article from ITProPortal

07th April 2016

Are healthcare organisations addressing compliance regulation properly?

Today’s cybercriminals place more value on patient healthcare data than on credit card data — and they're mercilessly targeting healthcare organisations…

Read the entire article from ITProPortal

04th April 2016

Are legal firms risking confidential information?

Where and how many organizations still have huge gaps in security…

Read the entire article from ITProPortal

02nd March 2016

How legal firms are risking confidential information

And why technology is necessary to fill the gaps…

Read the entire article from The Barrister Magazine

28th February 2016

Security as a Culture

Why security awareness is crucial in tackling the insider threat and establishing sustainable and extensible security…

Read the entire article from Network Computing

19th February 2016

Insider threat risks – the usual suspects

From our recent report on information access compliance, François Amigorena looks at where the holes typically appear within a firm’s security practice…

Read the entire article from Legal Technology

27th January 2016

Gut Feeling

'Readers Lives' features Léopoldine Brand, the Channel Relationship Manager at IS Decisions…

Read the entire article from CRN UK

15th January 2016

Legal firms 'risk compromising data over poor login security'

Firms in the legal sector are at risk of compromising information confidentiality because of poor data practices, according to new research by IS Decisions…

Read the entire article from We Live Security

14th January 2016

One third of UK legal sector risks information with poor cybersecurity

The lack of unique logins, manual logoffs and concurrent logins is putting confidential information in the legal sector at risk…

Read the entire article from Global Legal Post

06th January 2016

Why password sharing had become a common working practice

Online tools and services need to consider the way they provide multi-user access much more seriously to avoid the need for password sharing…

Read the entire article from SC Magazine

08th December 2015

Industry Insight: The Trends for 2016

Why unknown access to data and networks will soon phase out. IS Decisions thoughts included on how the information security landscape will evolve in 2016…

Read the entire article from InfoSecurity Magazine

04th December 2015

Finance organizations risk data by failing to secure unique employee logins

Despite it being a specific requirement of virtually all regulations around security, from GLBA, SOX and PCI DSS…

Read the entire article from Net Security

04th December 2015

A third of UK finance industry logins risks customer data

Many industry personnel are not assigned unique login and password details resulting in the risk of customer's personal and financial data…

Read the entire article from SC Magazine

16th October 2015

IS Decisions receives the France CyberSecurity Label for UserLock

France Cybersecurity is a national association where industry professionals, end users and government experts have teamed up to create a quality label for French cybersecurity products and services…

Read the entire article from Comité France Cybersecurity (French Language)

16th October 2015

Tackle Insider Threat by Creating a Culture of Security Awareness

Insight from Greg Cullison, senior executive of Security, Suitability and Insider Threat Programs at Big Sky Associates & François Amigorena, president and CEO at IS Decisions…

Read the entire article from IT Business Edge

15th October 2015

Hospitals need better IT Security protocols

Healthcare institutions aren’t following HIPAA requirements as closely as they should be with their network access policies…

Read the entire article from Healthcare BusinessTech

15th October 2015

Does Employee Access Hinder Patient Data Security?

A lack of restrictions on employee access could be detrimental to patient data security…

Read the entire article from Health IT Security

14th October 2015

Ensuring Healthcare Data Security

IS Decisions outline 5 areas in which organizations can take action to safeguard patient data…

Read the entire article from HealthITInteroperability

14th October 2015

Healthcare providers falling short in IAM

When it comes to identity access management, most hospitals and healthcare providers are doing it all wrong…

Read the entire article from Healthcare IT News

14th October 2015

63% of U.S. Healthcare Organizations are Putting Patient Records at Risk

The majority of healthcare organizations are not doing enough to protect patient privacy, according to a report by IS Decisions…

Read the entire article from LowCards.com

13th October 2015

87% of UK healthcare organisations are putting patient data at risk

A new IS Decisions report highlights several issues that have a direct effect to security of information within the healthcare industry…

Read the entire article from Information Age

12th October 2015

Three quarters of companies risk serious security breach from ex-employees

IS Decisions research shows an ex-employee with access to corporate information can be very dangerous…

Read the entire article from IT Governance

01st October 2015

October is CyberSecMonth

The EU advocacy campaign that promotes cyber security among citizens features IS Decisions' user security game, 'The Weakest Link'.

Read the entire article from CyberSecurityMonth

23th September 2015

Does IT security have a direct effect on your company's revenue?

Implementing a solid policy for insider threat and IT security in general can do more than just keep a company safe…

Read the entire article from IT Business Net

09th September 2015

Why C-level executives should care more about IT security

IS Decisions CEO François Amigorena explains why…

Read the entire article from IT Business Edge

28th August 2015

Insider threats thrive on the gaps between people, process and technology

A look at the characteristics of insider threats, and what can be done to address them…

Read the entire article from the analyst firm PAC

25th August 2015

There’s more to IT security than keeping you safe

IT security isn’t just about protecting companies from cyber threats — it can actually help close deals and improve other areas of the business…

Read the entire article from Information Age

10th August 2015

Stopping the insider threat

Francois Amigorena of IS Decisions asks if your organization has the perfect insider threat program…

Read the entire article from ProSecurityZone

28th May 2015

The Digital Art of Secure Access

How UserLock enables the School of Engineering & Digital Arts, University of Kent, to provide secure 24-hour access to computer suites…

Read the entire article from TechWeek Europe

May 2015

The threat from within

Chris Beck speaks to IS Decisions’ CEO and President to discover how often the biggest threat to banks comes from inside the company…

Read the entire article from Security Buyer

May 2015

Secure on the Inside

François Amigorena, CEO of IS Decisions, urges the deployment of an effective insider threat management programme and offers some advice on where to begin…

Read the entire article from Network Computing

18th May 2015

Spear-phishing case shines spotlight on insider threats

A case in which a former NRC employee allegedly plotted to launch a spear-phishing attack against DoE email accounts highlights the threats posed by former employees…

Read the entire article from Security InfoWatch

14th May 2015

How to create the perfect insider threat programme

Organisations are finally realising that a lot of the time the threat of cybercrime lies within…

Read the entire article from Information Age

08th May 2015

Ex-staff pose massive risks to company security

A report revealed almost half of IT professionals have an active insider threat programme…

Read the entire article from IT Pro

07th May 2015

UK organisations still ignoring risk of former employees

Only a quarter of firms have processes to cope with departing employees…

Read the entire article from ComputerWorld UK

April 2015

Relevance is the key to better user security understanding.

The most important messages are not getting through because they are not couched in terms that relate directly to users’ work, lives and careers, argues François Amigorena of IS Decisions…

Read the entire article from Network Security

08th April 2015

C-suite leaves us to take the blame for insider security threats, say IT pros

IS Decisions survey reveals majority of IT Pros don’t see senior managament taking enough responsibility for internal security…

Read the entire article from Information Age

April 2015

How to reduce the risk of insider threat in healthcare

François Amigorena looks at the risks to healthcare organizations of hackers accessing confidential patient data and how to mitigate any likely damage from insider threat…

Read the entire article from Hospital Management

31th March 2015

Single Point of Control

Identity and access management solutions - how much of a difference do they really make to an enterprise's defences? Computing Security asks those in the know…

Read the entire article from Computing Security

25th March 2015

Tools to prevent another Snowden affair

IS Decisions have been highlighted in 'Intelligence Online' (Publication for government and corporate intelligence professionals) as a key vendor of Insider Threat solutions…

Read the entire article from Intelligence Online

20th March 2015

Insider threat programs set to double as security breaches persist

2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organisations, according to new research…

Read the entire article from Information Age

20th March 2015

IT pros are taking action against the insider threat

The findings are part of research revealed in IS Decisions’s new report based on a survey of 500 IT professionals in the US and UK…

Read the entire article from Help Net Security

19th March 2015

Insider Threat Vulnerabilities

Over a third of US IT professionals plan to launch an insider threat program this year…

Read the entire article from Dark Reading

19th March 2015

MacroSeguridad.org presentó una alianza con IS Decisions

Comercializará sus soluciones de seguridad integradas con Windows Server 2008 y Windows Server 2012…

Read more here

11th March 2015

All fingers and eyes

Will biometrics kill off the traditional password?…

Read the entire article from TechRadar Pro

11th March 2015

Massive cyber-attacks

What businesses can learn from major data breaches…

Read the entire article from TechRadar India

24th February 2015

That ‘new kid’ recruit? If he’s not on your security threat radar, you’re in trouble

Employers will inherently trust these employees because, well, why not? If the new recruits weren’t trustworthy, they wouldn’t have been employed, right?…

Read the entire article from IT Pro Portal

18th February 2015

Loose data cannons : the data leak dangers of ex-staff and contractors

The issue of insider threats and the extended organization…

Read the entire article from Tech Radar

23rd January 2015

The Password’s Not Dead: Why We Should Stop Dreaming About Biometrics

Having better user access controls and password security will continue to be of great benefit…

Read the entire article from Fresh Business Thinking

13rd January 2015

Why ‘Zero Trust’ might be the best approach for your organization

Remember Users are only Human – trust but verify! François Amigorena makes the case for ‘zero trust’…

Read the entire article from InfoSecurity Magazine

09th January 2015

Want Your Staff To Take IT Security Seriously? Speak Their Language!

Most organisations have a training process in place to some extent but to make it most effective, tailor it to the employees and make them accountable…

Read the entire article from Business Computing World

07th January 2015

In defence of the humble password

The problem with passwords, is users says Francois Amigorena, and overcoming user-error can make passwords fit for purpose once again…

Read the entire article from SC Magazine

25th December 2014

What should Chief Security Officers Ask Santa For This Christmas?

For Christmas this year the CSO should be looking for any tool available to help strengthen employee vulnerability…

Read the entire article from TechWeek Europe

09th December 2014

Your password isn’t the problem, it’s you

There’s no ‘one way’ to protect company systems and data but with each layer of protection that training and technology gives, you can make it harder for breaches to occur and be quicker to respond to those that do…

Read the entire article from Professional Security Magazine

23rd October 2014

The case for ‘zero trust’ internal security in law

Why law firms are the world’s worst for security leaks and how to help…

Read the entire article from Legal Technology

29th August 2014

Why Are Security Pros Blasé About Compliance?

What will it take for Security Teams to show less indifference toward Compliance?…

Read the entire article from Dark Reading

15th August 2014

They're sharing usernames and passwords again!

Are your staff more careful than the average employee is with passwords?…

Read the entire article from CFO Daily News

11th August 2014

What security experts tell their kids

Security experts, including IS Decisions CEO François Amigorena, offer their advice on how to keep children safe online…

Read the entire article from The Guardian

11th August 2014

Security risks: ‘Insider Threats’ from ex-employees

How much is the security risk each time an employee leaves a company?…

Read the entire article from Source Security

06th August 2014

Sharing, not caring: Users pass around credentials

One of the most basic security mistakes out there is sharing account credentials and passwords…

Read the entire article from IT Manager Daily

04th August 2014

Passwords Are Like Underwear—They Aren’t Meant to Be Shared

Despite all the complaints about the lowly password, it’s still the most prevalent security measure in use today. IS Decisions report looks to help companies understand who is most likely to share a password with someone or exhibit other behavior that can put a network at risk…

Read the entire article from Security Bistro

28th July 2014

Sharing Log-In Details Presents a Security Threat

In a recent study of 2,000 employees, IS Decisions found that alarming numbers of workers don't believe their log-in details represent a security threat…

Read the entire article from Baseline

24th July 2014

HR one of biggest culprits in allowing ex-employees access to network

The industries that perhaps should know better are in fact worse than the rest…

Read the entire article from HR Review

24th July 2014

One in three employees retain access to company data after they leave

IS Decisions’ research showed that around 36 per cent of recent departures retain access…

Read the entire article from Business Technology

24th July 2014

One in Three Ex-employees Can Access Corporate Networks

Unauthorized access to corporate networks and resources by ex-employees is a documented issue. IS Decisions research has revealed how companies are neglecting to deploy vigilant post-termination processes, allowing ex-employees continued access to systems and data…

Read the entire article from InfoSecurity Magazine

23th July 2014

Inside Threat levels from ex-staffers greater than expected

A third of ex-employees have access to company data and 9 percent have used their access privileges, says new research from IS Decisions.…

Read the entire article from SC Magazine

22th July 2014

Ex-Employees enjoy free reign over company data in over a third of companies

Former employees are probably the greatest insider threat, yet they are the easiest to address; just make changing passwords and deactivating accounts a part of the termination process…

Read the entire article from ITProPortal

21th July 2014

The threat from within. How to start taking internal security more seriously

How the insider threat needs to be addressed with a combination of cultural and technological solutions…

Read the entire article from Computer Fraud & Security

30th June 2014

Password sharing : How to stamp out a dangerous habit

Industry Voice. Francois Amigorena looks at how creating a transparent security policy and using technology to implement it properly, there is no reason why users cannot work in a more secure fashion…

Read the entire article from TechRadar

25th June 2014

Majority if desk-based employees see no security risk in sharing logins

Over half (52%) of desk-based employees don’t think that sharing work related logins represents a risk to their employer…

Read the entire article from Information Age

08th June 2014

Why User Education On Security Needs To Start At The Top

Security can no longer be the responsibility of IT Managers and CIOs alone…

Read the entire article from Business Computing World

05th May 2014

Dentists are reminded to stay secure in this digital age

Following the recent research from IS Decisions, Dento-legal advisers at Dental Protection Limited are reminding dentists on all matters concerning data security…

Read the entire article from Dental Protection Limited

11th April 2014

Study: Greatest PHI Threat comes from within

IS Decisions study cites internal threats as the greatest danger to the security of protected health information…

Read the entire article from HealthITOutcomes

21th April 2014

Employee background checks can help protect your business

One way to help protect your business from insider threats is to conduct background checks of future employees…

Read the entire article from BankoftheWest

19th April 2014

The Edward Snowden effect : is awareness of insider threats growing?

Industry Voice: Francois Amigorena looks at IT departments tackling insider threats…

Read the entire article from TechRadar

16th April 2014

1 in 5 healthcare workers share passwords, survey warns

More than 1 in 5 healthcare workers share their passwords with colleagues, a security no-no!…

Read the entire article from Modern Healthcare

16th April 2014

IT security study cites healthcare insider threat concerns

A recent report released by IS Decisions highlighted how healthcare suffered double the average amount of internal security breaches compared to other industries…

Read the entire article from Health IT Security

11th April 2014

Blue Turtle locks down corporate environments with IS Decisions

Leading South African enterprise technology company Blue Turtle Technologies are working with their customers to minimize the risk of inappropriate access to their corporate environments…

Read the entire article from ITWeb

3rd April 2014

The Football Stadium & Internal Network Security

IS Decisions’ CEO Francois Amigorena contributes to the Analogies Project…

Read the entire article from The Analogies Project

21st February 2014

Data and security breach notification rules must not place unnecessary burdens on businesses

Unfair and unnecessary to require businesses to report every minor security breach they experience…

Read the entire article from Out-law

19th February 2014

Analyst says insider threat mainly down to lack of understanding

The Insider Threat can mainly be mitigated with an investment in tools that monitor and, to a certain extent, control users, for their own benefit and for that of the organisation they work for…

Read the entire article from SC Magazine

19th February 2014

300,000 internal security breaches in UK last year

Beware of disgruntled employees - a new report from IS Decisions reveals that UK businesses are being hit by over 1,000 internal security breaches every day…

Read the entire article from SC Magazine

19th February 2014

UK firms see 1,000+ internal data breaches a day

Network management under par, addressing internal security weakness and 10 Steps to beating Insider Threats…

Read the entire article from ComputerWeekly

19th February 2014

Why companies need to check their handling of internal threats

New study from IS Decisions indicates that security teams lack awareness regarding the seriousness of insider threats…

Read the entire article from CSO Online – Security & Risk

12th February 2014

How IT can outsmart the intelligentsia

Francois Amigorena, CEO of IS Decisions, discusses how we can overcome those smart enough to get around Active Directory security policies…

Read the entire article from Educational Technology

16th January 2014

Insider Threats abound

Industry Voice: Why a User Access Control Policy is crucial for your organization…

Read the entire article from TechRadar

20 December 2013

Rogue employees on the hunt for confidential information

Network Managers are more aware than ever of the security risk that insider threat pose.…

Read the entire article from SC Magazine

03 January 2014

The Edward Snowden Effect

PRISM Fiasco Highlights Dangers of Password Sharing. Inside threat is a very real concern and password sharing a very real cause. Learn more on a technology solution that helps organizations protect against the Snowden effect…

Read the entire article from Business Computing World

03 January 2014

Extending Microsoft Active Directory

Analysts Quocirca discuss how to extend security for Microsoft Active Directory. The need to apply further restrictions on what users can do once authenticated can be achieved with UserLock from IS Decisions…

Read the entire article from ComputerWeekly

29 November 2013

Uservoice success stories.

Build it and they will come. How IS Decisions moves beyond social media to create an invested user base…

Read the entire article from UserVoice

11 September 2013

File System Auditing. Video Tutorials for FileAudit

A new series of quick how-to video tutorials on FileAudit - the file system auditing software for Windows environment that's both intuitive and easy…

Read the entire article from IS Decisions Blog

10 September 2013

How I sold 48,000 software licenses to the FBI: François Amigorena at TEDx

How IS Decisions make and implement innovative solutions for the management and security of a Microsoft Windows Infrastructure…

Watch the video here from TEDx

01 September 2013

The Analogies Project

Why I joined the Analogies Project…

Read the entire article from The Analogies Project

13 August 2013

Four Steps to ensure your Windows Network isn't at risk

IT managers today spend a lot of time and effort protecting their Windows and Active Directory networks from external attacks. However, it is insider threats…

Read the entire article from Wired Innovation Insights

19 June 2013

IS Decisions’ UserLock 7 Introduces WiFi Session Control

Learn about the new features of IS Decision's Userlock 7.0…

Read the entire article from Windows ITPro

14 June 2013

CIAB FEBRABAN offers Financial Institutions a look at UserLock

CIAB FEBRABAN 2013 focuses on the challenges that face the financial sector. Solutions to mitigate risks in network security include UserLock from IS Decisions.…

Read the entire article from IS Decisions Blog

25 March 2013

TV report from LCI

A focus on how IS Decisions is intent on growing its International presence from its base in the Basque Country…

Read the entire article from LCI TV News Channel

28 February 2013

FileAudit 4 Review & Rating

With FileAudit, organizations have an easy yet robust tool for auditing files and folders that reside on Windows systems, run audit reports without the help of IT, and even send alerts about audited events…

Read the entire article from PCMag

22 February 2013

IS Decisions releases FileAudit 4

IS Decisions released FileAudit 4, its file audit, archiving and reporting tool. It is the only file auditing solution Microsoft-certified for compliance with Windows 8 and Windows Server 2012…

Read the entire article from Net-Security

22 February 2013

IS Decisions featured on TV.

See how IS Decisions helps organizations from around the world secure their Microsoft Windows and Active Directory Infrastructure…

Read the entire article from France 3 TV

29 February 2012

How IS Decisions is winning the hearts & minds of IT Pros, curating content that catches their attention

Back 6 months ago, François Amigorena, CEO of Software Publisher IS Decisions was wondering how to make its business more visible on the Web. He had great products with …

Read the entire article from Scoop.it

01 February 2011

Review: IS Decisions FileAudit - TechRepublic

Derek Schauland reviews the RemoteExec 5 utility for performing remote administration tasks…

Read the entire article from TechRepublic.com

01 June 2010

Review: IS Decisions RemoteExec 5 - TechRepublic

Derek Schauland evaluates a file audit application from IS Decisions that helps you track down actions taken on files on volumes running the NTFS file system…

Read the entire article from TechRepublic.com

15 November 2010

Why concurrent logins to a Windows network are a (very) bad idea

Once hackers gain legitimate Windows login credentials, they have unfettered use of them…

Read the entire article from Network World

11 March 2010

UserLock rated "excellent" and an "impressive product" from PCMag.

UserLock takes away pain using Group Policy for user account control. Intuitive interface. Easy install…

Read the entire article from PCMag