Enterprise Network Security Blog from IS Decisions

Simplify MFA & Session Management With the New, Intuitive UserLock Web App
The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere. Now available in UserLock 11.2, the UserLock Web App complements your existing UserLock software with: An easy-to-use, visual interface that puts key network session monitoring controls at IT’s fingertips. Accessible, simplified … Continued

Meet Salesforce MFA Requirements via SSO With Active Directory Identities
This article explains how UserLock can deliver SSO and MFA access to Salesforce from anywhere for on-premise Active Directory identities. In response to the global threat landscape, Salesforce now requires multi-factor authentication (MFA) for all logins. While Salesforce has enabled…

Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities
The new release of UserLock 11 provides secure single sign-on (SSO) for existing on-premises Active Directory (AD) identities, extending access protection to the cloud. Combined with enhanced multi-factor authentication (MFA) and remote access controls, this new release completes UserLock’s comprehensive security…

Is It Paranoia If It’s Real? Know These Insider Threat Indicators
“Just because you’re paranoid doesn’t mean they’re not out to get you.” More than just a great Nirvana lyric, this also sounds like an apt mantra for modern-day cybersecurity. Because if administrators are feeling paranoid these days, it’s for good…

Why Using SMS Authentication for 2FA Is Not Secure
Two-factor authentication (2FA) is now a part of daily life, and most of us have had first-hand experience with SMS authentication. You enter your password, then you get a prompt to enter a code or pin that’s sent to your phone number. After you type in the code, you’re in. Simple, right? We all have … Continued

Multi Factor Authentication in a Holistic Context
The following is a guest post from Techni Team, an ICT-Full-Service Provider and the distributor for UserLock in the Netherlands. As many of you are aware, that when it comes to protecting the ICT infrastructure, many organizations need to rapidly upgrade to a higher level of security. This is particularly true for SME companies. This … Continued

Stop the Frustration and Risk of Unchecked Access to Files and Folders
Following the recent updates to FileAudit, we discuss how automated responses to file moves, deletions and other access events can help SMBs, and the MSPs that service them, protect sensitive data from theft, alteration and loss. Have you ever been…

Techni Team appointed exclusive distributor of UserLock MFA for the Netherlands
A next step in their ambition to make a difference in IT-Security for Dutch SMEs Full-service ICT-supplier Techni Team ICT BV (Veenendaal, NL) and IS Decisions SA (Bidart, France) have entered into a partnership agreement for the distribution and support…

Hybrid Cloud Storage Protection for MSPs
Cyber threats such as ransomware, identity theft, and data exfiltration, which traditionally target on-premise resources are now a growing problem for cloud storage services. As companies continue to deploy resources to the cloud, the need to address these additional security challenges is a…

MFA and Cyber Liability Insurance: Understand the MFA Insurance Requirement
Cyber liability insurance (also known as cyber insurance) is driving a long-overdue improvement in user access security. Multi-factor authentication (MFA) is fast becoming a cyber insurance requirement for all accounts, privileged and non-privileged, to protect on-site and remote access. Here’s…

Addressing User Access in IT Security Compliance
The risks of non-compliance are not worth taking. You face fines and even imprisonment — not to mention that non-compliance could lead to a serious data breach that might ultimately lose you clients and damage your reputation. But addressing the murky waters of compliance has never been an easy task, and as regulators add more … Continued

RDP Gateway MFA
Multi-factor authentication (MFA) for Remote Desktop Gateway and RDP connections should be very high on your security to-do list. Some or even your entire workforce might now be dispersed but their access to company networks still needs to be protected. Here we look at why a second factor of authentication is recommended to protect remote … Continued

Why your VPN connections need two-factor authentication (2FA)
Virtual private networks (VPNs) are very popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote machines and your servers, VPNs solve some very important problems. They…

Windows Logon Audit Far Beyond Native Windows Security
Windows logon auditing is an important activity for diverse security and compliance needs. Businesses may require a full and accurate logon audit to: perform accurate forensics demonstrate they are protecting data from unauthorized access – for regulatory compliance verify…

Yubikey 2 Factor Authentication for Windows Domain Logins
UserLock makes it easy for a business to enable two-factor authentication on Windows domain accounts, managed by on-premise Active Directory. Watch how UserLock works with YubiKey – the hardware security keys manufactured by Yubico. YubiKey offers users an easy and secure second factor of authentication In addition to mobile authentication and Token2, UserLock now partners with Yubico … Continued