Author Archives: Chris Bunn

Comments Off on UserLock named winner of selective Expert Insights award

UserLock named winner of selective Expert Insights award

UserLock named winner of selective Expert Insights award

We’re pleased to announce UserLock has won Expert Insights’ Editor’s Choice award in the Identity and Access Management category. Expert Insights is a leading resource for cybersecurity news, research and analysis. Their highly-selective Editor’s Choice award, limited to just six IAM solutions, recognizes UserLock as a Summer 2023 Editor’s Choice. This award highlights solutions that Expert Insights … Continued

Comments Off on Simplify MSP licensing and billing with the UserLock MSP console

Simplify MSP licensing and billing with the UserLock MSP console

Simplify MSP licensing and billing with the UserLock MSP console

Learn how the UserLock MSP Console simplifies your MSP licensing and billing. We’re pleased to announce the public release of the MSP console for UserLock. Now, managed service providers (MSPs) can easily administer UserLock licenses from our intuitive, web-based licensing management platform. Why use the UserLock MSP console? The UserLock MSP console is specially designed for … Continued

Comments Off on Windows Domain 2 Factor Authentication (2FA)

Windows Domain 2 Factor Authentication (2FA)

Windows Domain 2 Factor Authentication (2FA)

Windows domains and Active Directory (AD) makes it easy for administrators to control a large number of business PCs and devices from a central location. Today, a huge percentage of enterprises continue to rely on Windows domain AD to manage assets, users, systems, policies, profiles, and rights. Given that, it’s increasingly important to protect user account … Continued

Comments Off on The cyber attack report

The cyber attack report

The cyber attack report

Organizations around the world face an expanding cyber threat landscape. With at least 30,000 daily cyber incidents and a growing list of attack methods, protecting access to corporate networks has never been more critical. At IS Decisions, we’ve analyzed the last eight years of open-source data to uncover how specific industries, like government and public … Continued

Comments Off on The best single sign-on solution for Active Directory

The best single sign-on solution for Active Directory

The best single sign-on solution for Active Directory

Managing multiple user identities and passwords can be a hassle for employees and IT departments. Allowing password sprawl to spread to multiple corporate and cloud services can also pose a significant security risk for an organization. That’s where single sign-on (SSO) comes in. SSO allows users to access multiple applications using just one set of … Continued

Comments Off on The best multi-factor authentication (MFA) solutions for Active Directory

The best multi-factor authentication (MFA) solutions for Active Directory

The best multi-factor authentication (MFA) solutions for Active Directory

Active Directory (AD) is a widely used authentication and authorization system that provides access management for corporate networks. But, as cyberattacks become increasingly sophisticated and target user login credentials as the easiest point of entry, there is a critical need for strong authentication measures to increase protection. Multi-factor authentication (MFA) adds a layer of security … Continued

Comments Off on Protect patients’ data in healthcare using multi-factor authentication

Protect patients’ data in healthcare using multi-factor authentication

Protect patients’ data in healthcare using multi-factor authentication

Technology has transformed healthcare but this digital innovation also has one notable downside: cyber threats. And the price of stolen data shows just how much patient information is worth. As reported by credit rating agency Experian, hackers stand to make substantial sums from selling data on the dark web. In fact, stolen medical records can … Continued

Comments Off on The world’s most searched-for cyber attacks and prevention measures

The world’s most searched-for cyber attacks and prevention measures

The world’s most searched-for cyber attacks and prevention measures

Searches for cyber threats have seen a steady increase worldwide, particularly in the last year, proving that it’s a major concern for people all around the world. In fact, according to IBM’s Cost of a Data Breach report, the average cost of a data breach has reached an all-time high, climbing 12.7%, from $3.86 million … Continued

Comments Off on Get quick insights with improved NTFS permissions reporting

Get quick insights with improved NTFS permissions reporting

Get quick insights with improved NTFS permissions reporting

The latest FileAudit updates help make NTFS permissions reporting easy – and add the ability to migrate or archive your database.   You want quick insights into access rights across the entire file system directory. And you need more control over your data. You spoke, we listened. Easily report on NTFS permissions & permission changes With … Continued

Comments Off on Stand down, marketers: Zero Trust is not a product

Stand down, marketers: Zero Trust is not a product

Stand down, marketers: Zero Trust is not a product

Thanks to relentless marketing, Zero Trust is quickly turning into another buzzword. It’s time security professionals claim to the term. Once and for all: Zero Trust is not a product, it’s a security strategy. While a product or service can indeed be part of a Zero Trust security strategy, no single product can satisfy all … Continued

Secured By miniOrange