Enterprise Network Security Blog from IS Decisions

Protecting Active Directory logins for remote working

Protecting Active Directory logins for remote working

  The boom in working from home has become a bonanza for cyber attackers. Each time an employee connects to the corporate network from their home they create an access point that can often be exploited. With Windows Active Directory (AD) still being the core identity and access platform for businesses around the world, the … Continued

Stay Safe but Stay in Business

Stay Safe but Stay in Business

COVID-19, 5 letters and 2 numbers that have turned everyday life upside down for millions of people and organizations across the globe. In an effort to slow the propagation of the virus, governments of several countries have put in place…

Login Logout Time Tracking for Employees

Login Logout Time Tracking for Employees

With more and more organizations allowing flexible work hours and users working remotely, it is increasingly important to be able to manage and monitor employee’s working hours.  Being able to track not only login and logout times, but lock and…

Secure Active Directory Users’ Accounts

Secure Active Directory Users’ Accounts

Users are most of the time the weakest link in your organization. But you need to stop blaming them. It’s your job to secure the organization from unwanted access. You need to protect them from their own careless behavior and…

Why do you need Multifactor Authentication?

Why do you need Multifactor Authentication?

Without Multifactor Authentication, organizations are wide open to attack when their employees fall for phishing scams or share passwords. What’s holding them back? Stolen credentials are one of the biggest threats to businesses today. The reason behind that is simple,…

MFA for Windows Login to Address the Vulnerabilities of Corporate Passwords

MFA for Windows Login to Address the Vulnerabilities of Corporate Passwords

Easy for both administrators and employees, UserLock now offers multi-factor authentication (MFA) for Windows login alongside contextual controls, for the best balance of security, usability and cost available today. IS Decisions, a provider of access management software, today announced a significant update to its flagship product UserLock. Multi-factor authentication, also known as MFA, is now … Continued

How to Avoid Data Breaches on Windows Infrastructure

How to Avoid Data Breaches on Windows Infrastructure

It seems like IT’s general approach to any kind of attack – which includes data breaches – is a reactive one. Think about it, in every kind of attack-related scenario – whether an external attack, an insider threat, malware infection, ransomware attack, etc. – the “business as usual” methodology is to detect the attack/infection and … Continued

Windows Group Policy for Login Security

Windows Group Policy for Login Security

The use of Windows Group Policy is often the tool of choice for the strict administration of Active Directory (AD) user accounts. But for logon and access policies, Group Policies can be tedious to configure, particularly so for small and…

Find Active Directory Users Logged on in a Domain – and more

Find Active Directory Users Logged on in a Domain – and more

To detect where your Active Directory users are logged on in real-time, watch this 2-minute overview of UserLock. It will also show you how to react and respond to any login, direct from the UserLock console, and how to start…

Why SMBs believe their data is unsafe in the cloud

Why SMBs believe their data is unsafe in the cloud

Two thirds (61%) of small to medium-sized businesses (SMBs) believe that their data is unsafe in the cloud, with almost a third (29%) saying that they have suffered a breach since moving to the cloud for storage. Our new report,…

School Network Management. You’ve got your work cut out!

School Network Management. You’ve got your work cut out!

  If you’re responsible for school network management at a school, college or university, I don’t envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers…

On-Premises & Cloud Storage. Audit & Respond to your Hybrid File Environment.

On-Premises & Cloud Storage. Audit & Respond to your Hybrid File Environment.

With the new launch of FileAudit 6, IT professionals can now get insights into the access to and usage of data stored across both cloud and on-premises environments. Furthermore, FileAudit can now automatically respond and take action when an alert is triggered.     What’s new with FileAudit 6.0 IS Decisions has made two major … Continued

Windows File System Auditing. Video Tutorials for FileAudit

Windows File System Auditing. Video Tutorials for FileAudit

The IS Decisions team have made a new series of video tutorials on FileAudit – the file system auditing software. The Video Tutorials are designed to further complement existing resources that include support, documentation and a help section that includes your frequently asked questions. A how-to on Windows File System Auditing The full tutorial playlist … Continued

Who Last Accessed, or Attempted to Access your Shared Folders

Who Last Accessed, or Attempted to Access your Shared Folders

As an important security and compliance measure, watch how you can easily identify activity on your most sensitive shared files and folders. FileAudit not only gives you optimal visibility into what is happening to your organization’s data but the opportunity to…

Stronger Access Control Management

Stronger Access Control Management

If your Windows network has data that could be of any value to someone without proper authorization to access it, then your organization needs stronger access control. The demand for secure access poses a serious challenge to IT professionals. IT…

Monitor File Changes on Windows Servers

Monitor File Changes on Windows Servers

Monitoring file changes is one of the simplest tasks in keeping sensitive data safe but also one of the most neglected areas in many environments. Who accessed a particular file share, and what changes happened? If you’re not able to…

Force Remote Logoff after Idle Time

Force Remote Logoff after Idle Time

With UserLock, watch how IT administrators can easily set an automatic forced logoff, on all locked or open machines, after a certain idle time. This can include remote desktop sessions opened by the domain user.     Resolving Optimization and…

Managing Call Center Access to a Windows Network

Managing Call Center Access to a Windows Network

  The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within – is exactly who they say they are. This is especially important when dealing with agents and customer service representatives who have access to vast amounts of sensitive data. … Continued

Secured By miniOrange