Enterprise Network Security Blog from IS Decisions

The cyber attack report

The cyber attack report

Organizations around the world face an expanding cyber threat landscape. With at least 30,000 daily cyber incidents and a growing list of attack methods, protecting access to corporate networks has never been more critical. At IS Decisions, we’ve analyzed the last eight years of open-source data to uncover how specific industries, like government and public … Continued

Quickly approve 2FA push notifications with the UserLock Push App

Quickly approve 2FA push notifications with the UserLock Push App

  We’re excited to announce the public beta release of UserLock 2FA push notifications with the UserLock Push app, making MFA frictionless for your team. MFA is a must for security, but it can’t get in the way of your…

Simplify MSP Licensing and Billing with the UserLock MSP Console

Simplify MSP Licensing and Billing with the UserLock MSP Console

Test the UserLock MSP Console – now in beta – and simplify your MSP licensing and billing. We’re pleased to announce the beta release of the new UserLock MSP console, a web-based licensing management platform. Now, managed service providers (MSPs)…

The Best Single Sign-On Solution for Active Directory

The Best Single Sign-On Solution for Active Directory

Managing multiple user identities and passwords can be a hassle for employees and IT departments. Allowing password sprawl to spread to multiple corporate and cloud services can also pose a significant security risk for an organization. That’s where single sign-on…

The Best Multi-factor Authentication (MFA) Solutions for Active Directory

The Best Multi-factor Authentication (MFA) Solutions for Active Directory

Active Directory (AD) is a widely used authentication and authorization system that provides access management for corporate networks. But, as cyberattacks become increasingly sophisticated and target user login credentials as the easiest point of entry, there is a critical need…

Protect Patients’ Data in Healthcare Using Multi-factor Authentication

Protect Patients’ Data in Healthcare Using Multi-factor Authentication

Technology has transformed healthcare but this digital innovation also has one notable downside: cyber threats. And the price of stolen data shows just how much patient information is worth. As reported by credit rating agency Experian, hackers stand to make substantial sums from selling data on the dark web. In fact, stolen medical records can … Continued

Can MFA Be Phished? How to Avoid Getting Scammed

Can MFA Be Phished? How to Avoid Getting Scammed

The unpleasant genius of phishing attacks is that almost anything is phishable. Most phishing attacks are an attempt to steal a user’s credentials – a username and password – which, as everyone in cybersecurity knows, is relatively easy to do. But can MFA be phished? For years now, we’ve known that the only protection against … Continued

UserLock: A Duo MFA Alternative

UserLock: A Duo MFA Alternative

The importance of implementing multi-factor authentication (MFA) is hard to overstate. With tens of thousands of cyber attacks occurring every day and ever-more sophisticated attack methods, most organizations now recognize that protecting access requires more than a password. Having two…

Exploring the evolving landscape of cybersecurity patents and innovations

Exploring the evolving landscape of cybersecurity patents and innovations

Today, innovation within cybersecurity is critical. The rise in remote working and cloud computing, among other factors, continues to expose vulnerabilities that cyber attackers are quick to exploit. As cyber threats become more sophisticated, cybersecurity prevention measures must evolve as…

How Can Granular MFA Help Balance Security and Productivity?

How Can Granular MFA Help Balance Security and Productivity?

In less than a decade, how organizations apply multi-factor authentication (MFA) with Active Directory has rapidly evolved. What was once a specialized security technology to secure privileged accounts is now a best practice to secure all user and service accounts.…

The world’s most searched-for cyber attacks and prevention measures

The world’s most searched-for cyber attacks and prevention measures

Searches for cyber threats have seen a steady increase worldwide, particularly in the last year, proving that it’s a major concern for people all around the world. In fact, according to IBM’s Cost of a Data Breach report, the average…

Get Quick Insights with Improved NTFS Permissions Reporting

Get Quick Insights with Improved NTFS Permissions Reporting

The latest FileAudit updates help make NTFS permissions reporting easy – and add the ability to migrate or archive your database.   You want quick insights into access rights across the entire file system directory. And you need more control over your data. You spoke, we listened. Easily report on NTFS permissions & permission changes With … Continued

Stand Down, Marketers: Zero Trust is Not a Product

Stand Down, Marketers: Zero Trust is Not a Product

Thanks to relentless marketing, Zero Trust is quickly turning into another buzzword. It’s time security professionals claim to the term. Once and for all: Zero Trust is not a product, it’s a security strategy. While a product or service can indeed be part of a Zero Trust security strategy, no single product can satisfy all … Continued

Simplify MFA & Session Management With the New, Intuitive UserLock Web App

Simplify MFA & Session Management With the New, Intuitive UserLock Web App

The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere. Now available in UserLock 11.2, the UserLock Web App complements your existing UserLock software with: An…

Meet Salesforce MFA Requirements via SSO With Active Directory Identities

Meet Salesforce MFA Requirements via SSO With Active Directory Identities

This article explains how UserLock can deliver SSO and MFA access to Salesforce from anywhere for on-premise Active Directory identities. In response to the global threat landscape, Salesforce now requires multi-factor authentication (MFA) for all logins. While Salesforce has enabled…

Master Your Data Lifecycle to Improve Data Security

Master Your Data Lifecycle to Improve Data Security

  A data lifecycle is hard to pin down. Depending on your industry or profession, what makes up a data lifecycle can vary widely. For example, Harvard Business School claims there are eight data life cycle stages. But some count…

Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities

Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities

The new release of UserLock 11 provides secure single sign-on (SSO) for existing on-premises Active Directory (AD) identities, extending access protection to the cloud. Combined with enhanced multi-factor authentication (MFA) and remote access controls, this new release completes UserLock’s comprehensive security…

Is It Paranoia If It’s Real? Know These Insider Threat Indicators

Is It Paranoia If It’s Real? Know These Insider Threat Indicators

“Just because you’re paranoid doesn’t mean they’re not out to get you.” More than just a great Nirvana lyric, this also sounds like an apt mantra for modern-day cybersecurity. Because if administrators are feeling paranoid these days, it’s for good reason. External attacks abound, and insider threats tend to fly under the radar until it’s … Continued

Secured By miniOrange