Enterprise Network Security Blog from ISDecisions

Windows Group Policy for Login Security

Windows Group Policy for Login Security

The use of Windows Group Policy is often the tool of choice for the strict administration of Active Directory (AD) user accounts. But for logon and access policies, Group Policies can be tedious to configure, particularly so for small and medium-sized business (SMBs) with limited on-site IT expertise.  GDPR introduction has upped the stakes All … Continued

Find where a user is logged on in a domain – and more

Find where a user is logged on in a domain – and more

To detect where your users are logged on in real-time, watch this 2-minute overview of UserLock. It will also show you how to react and respond to any login, direct from the UserLock console, and how to start controlling and…

Why SMBs believe their data is unsafe in the cloud

Why SMBs believe their data is unsafe in the cloud

Two thirds (61%) of small to medium-sized businesses (SMBs) believe that their data is unsafe in the cloud, with almost a third (29%) saying that they have suffered a breach since moving to the cloud for storage. Our new report,…

School Network Management. You’ve got your work cut out!

School Network Management. You’ve got your work cut out!

  If you’re responsible for school network management at a school, college or university, I don’t envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers…

On-Premises & Cloud Storage. Audit & Respond to your Hybrid File Environment.

On-Premises & Cloud Storage. Audit & Respond to your Hybrid File Environment.

With the new launch of FileAudit 6, IT professionals can now get insights into the access to and usage of data stored across both cloud and on-premises environments. Furthermore, FileAudit can now automatically respond and take action when an alert…

Windows File System Auditing. Video Tutorials for FileAudit

Windows File System Auditing. Video Tutorials for FileAudit

The IS Decisions team have made a new series of video tutorials on FileAudit – the file system auditing software. The Video Tutorials are designed to further complement existing resources that include support, documentation and a help section that includes your frequently asked questions. A how-to on Windows File System Auditing The full tutorial playlist … Continued

Who Last Accessed, or Attempted to Access your Shared Folders

Who Last Accessed, or Attempted to Access your Shared Folders

As an important security and compliance measure, watch how you can easily identify activity on your most sensitive shared files and folders. FileAudit not only gives you optimal visibility into what is happening to your organization’s data but the opportunity to react quickly to events.   Video Transcription: In this video, I’m going to show you … Continued

Stronger Access Control Management

Stronger Access Control Management

If your Windows network has data that could be of any value to someone without proper authorization to access it, then your organization needs stronger access control. The demand for secure access poses a serious challenge to IT professionals. IT…

Monitor File Changes on Windows Servers

Monitor File Changes on Windows Servers

Monitoring file changes is one of the simplest tasks in keeping sensitive data safe but also one of the most neglected areas in many environments. Who accessed a particular file share, and what changes happened? If you’re not able to…

Force Remote Logoff after Idle Time

Force Remote Logoff after Idle Time

With UserLock, watch how IT administrators can easily set an automatic forced logoff, on all locked or open machines, after a certain idle time. This can include remote desktop sessions opened by the domain user.     Resolving Optimization and…

Managing Call Center Access to a Windows Network

Managing Call Center Access to a Windows Network

  The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within – is exactly who they say they are. This is especially important when dealing…

FileAudit reviewed and recognized as a leading cyber security software

FileAudit reviewed and recognized as a leading cyber security software

IS Decisions has much to celebrate after our proactive auditing and monitoring software, FileAudit, won two awards under the top cyber security software of the FinancesOnline software review platform. FinancesOnline, a platform for business software reviews, conferred FileAudit with the 2018 Rising Star and 2018 Great User Experience awards in recognition of its highly positive … Continued

Windows File Server Auditing with FileAudit

Windows File Server Auditing with FileAudit

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers. Windows File Server Auditing Software When native Windows tools don’t cut it, admins turn to third party software to enhance security and ease regulatory compliance. Although Windows Active Directory includes native policies … Continued

Network security in Universities, Colleges and Schools.

Network security in Universities, Colleges and Schools.

IT teams responsible for network security in Universities, Colleges and Schools are experiencing more and more pressure to secure their networks from both external and insider threats. According to the CSO,13% of data breaches last year happened at educational institutions. According to EDUCAUSE, a nonprofit association…

Nine Steps to better File Share Auditing

Nine Steps to better File Share Auditing

File share auditing helps organizations secure their most sensitive files, folders and file shares and simplifies adherence to compliance standards. When successful file auditing is in place it can help both identify a data breach as well as to potentially…

Insider Threat Best Practice – without the need for an SIEM solution

Insider Threat Best Practice – without the need for an SIEM solution

With so much news focusing on external attacks, one of the greatest threats to your organization’s data security, revenue, and reputation is insider threats. Insiders – employees with access to data that is externally valuable – are responsible for 28%…

How Strong is Your SMB Security Strategy?

How Strong is Your SMB Security Strategy?

SMBs today are under attack from malware, ransomware, external threats and data breaches. But, with the lack of sophistication around most SMBs security stances, the prospect of remaining unaffected by attacks is bleak. So, SMB’s and MSPs servicing them need…

New distribution agreement for the Netherlands

New distribution agreement for the Netherlands

Dutch organizations set to benefit from enhanced file auditing to protect against data breaches. Global cybersecurity vendor IS Decisions today announces an exclusive distribution agreement with NVB ICT DIENSTEN, an ICT specialist, to deliver its security solution FileAudit across the Netherlands. FileAudit is a comprehensive file monitoring tool that enables organizations to proactively track, audit … Continued

Secured By miniOrange