Enterprise Network Security Blog from IS Decisions

The cyber attack report
Organizations around the world face an expanding cyber threat landscape. With at least 30,000 daily cyber incidents and a growing list of attack methods, protecting access to corporate networks has never been more critical. At IS Decisions, we’ve analyzed the last eight years of open-source data to uncover how specific industries, like government and public … Continued

Quickly approve 2FA push notifications with the UserLock Push App
We’re excited to announce the public beta release of UserLock 2FA push notifications with the UserLock Push app, making MFA frictionless for your team. MFA is a must for security, but it can’t get in the way of your…

Simplify MSP Licensing and Billing with the UserLock MSP Console
Test the UserLock MSP Console – now in beta – and simplify your MSP licensing and billing. We’re pleased to announce the beta release of the new UserLock MSP console, a web-based licensing management platform. Now, managed service providers (MSPs)…

The Best Single Sign-On Solution for Active Directory
Managing multiple user identities and passwords can be a hassle for employees and IT departments. Allowing password sprawl to spread to multiple corporate and cloud services can also pose a significant security risk for an organization. That’s where single sign-on…

The Best Multi-factor Authentication (MFA) Solutions for Active Directory
Active Directory (AD) is a widely used authentication and authorization system that provides access management for corporate networks. But, as cyberattacks become increasingly sophisticated and target user login credentials as the easiest point of entry, there is a critical need…

Protect Patients’ Data in Healthcare Using Multi-factor Authentication
Technology has transformed healthcare but this digital innovation also has one notable downside: cyber threats. And the price of stolen data shows just how much patient information is worth. As reported by credit rating agency Experian, hackers stand to make substantial sums from selling data on the dark web. In fact, stolen medical records can … Continued

Can MFA Be Phished? How to Avoid Getting Scammed
The unpleasant genius of phishing attacks is that almost anything is phishable. Most phishing attacks are an attempt to steal a user’s credentials – a username and password – which, as everyone in cybersecurity knows, is relatively easy to do. But can MFA be phished? For years now, we’ve known that the only protection against … Continued

UserLock: A Duo MFA Alternative
The importance of implementing multi-factor authentication (MFA) is hard to overstate. With tens of thousands of cyber attacks occurring every day and ever-more sophisticated attack methods, most organizations now recognize that protecting access requires more than a password. Having two…

Exploring the evolving landscape of cybersecurity patents and innovations
Today, innovation within cybersecurity is critical. The rise in remote working and cloud computing, among other factors, continues to expose vulnerabilities that cyber attackers are quick to exploit. As cyber threats become more sophisticated, cybersecurity prevention measures must evolve as…

How Can Granular MFA Help Balance Security and Productivity?
In less than a decade, how organizations apply multi-factor authentication (MFA) with Active Directory has rapidly evolved. What was once a specialized security technology to secure privileged accounts is now a best practice to secure all user and service accounts.…

The world’s most searched-for cyber attacks and prevention measures
Searches for cyber threats have seen a steady increase worldwide, particularly in the last year, proving that it’s a major concern for people all around the world. In fact, according to IBM’s Cost of a Data Breach report, the average…

Get Quick Insights with Improved NTFS Permissions Reporting
The latest FileAudit updates help make NTFS permissions reporting easy – and add the ability to migrate or archive your database. You want quick insights into access rights across the entire file system directory. And you need more control over your data. You spoke, we listened. Easily report on NTFS permissions & permission changes With … Continued

Stand Down, Marketers: Zero Trust is Not a Product
Thanks to relentless marketing, Zero Trust is quickly turning into another buzzword. It’s time security professionals claim to the term. Once and for all: Zero Trust is not a product, it’s a security strategy. While a product or service can indeed be part of a Zero Trust security strategy, no single product can satisfy all … Continued

Simplify MFA & Session Management With the New, Intuitive UserLock Web App
The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere. Now available in UserLock 11.2, the UserLock Web App complements your existing UserLock software with: An…

Meet Salesforce MFA Requirements via SSO With Active Directory Identities
This article explains how UserLock can deliver SSO and MFA access to Salesforce from anywhere for on-premise Active Directory identities. In response to the global threat landscape, Salesforce now requires multi-factor authentication (MFA) for all logins. While Salesforce has enabled…

Master Your Data Lifecycle to Improve Data Security
A data lifecycle is hard to pin down. Depending on your industry or profession, what makes up a data lifecycle can vary widely. For example, Harvard Business School claims there are eight data life cycle stages. But some count…

Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities
The new release of UserLock 11 provides secure single sign-on (SSO) for existing on-premises Active Directory (AD) identities, extending access protection to the cloud. Combined with enhanced multi-factor authentication (MFA) and remote access controls, this new release completes UserLock’s comprehensive security…

Is It Paranoia If It’s Real? Know These Insider Threat Indicators
“Just because you’re paranoid doesn’t mean they’re not out to get you.” More than just a great Nirvana lyric, this also sounds like an apt mantra for modern-day cybersecurity. Because if administrators are feeling paranoid these days, it’s for good reason. External attacks abound, and insider threats tend to fly under the radar until it’s … Continued