News, discussion and expertise on helping you to manage and secure your IT Infrastructure. Focused on solutions for Windows Networks and Active Directory.

IT Infrastructure

Comments Off on Managing Call Center Access to a Windows Network

Managing Call Center Access to a Windows Network

Managing Call Center Access to a Windows Network

  The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within – is exactly who they say they are. This is especially important when dealing with agents and customer service representatives who have access to vast amounts of sensitive data. … Continued

, , , , Comments Off on Are you Identifying and Monitoring End-Users Network and File Access?

Are you Identifying and Monitoring End-Users Network and File Access?

Are you Identifying and Monitoring End-Users Network and File Access?

Recent IS Decisions research among 1500 healthcare, finance, and legal sector workers in both the US and the UK highlighted the current status of how organizations are securing their networks and sensitive information within. The results shed light on how much more needs to be done to mitigate the risk of both security and compliance … Continued

, Comments Off on Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

Information Security in Banking and the Insider Threat

The biggest threat for the banking sector is coming from within. How can a bank mitigate against the risk from malicious, careless or exploited users? This week saw U.S. law enforcement officials arrest five individuals who reportedly were involved in the high-profile 2014 security breach of JPMorgan. The breach was one of the largest attacks … Continued

Comments Off on Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

Insider Threat Protection. People, Process and Technology

When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion that IT security is a combination of people, process and technology is nothing new. The triangle … Continued

, Comments Off on Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

Six steps to multi device security in the age of BYOD

The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently requesting to be able to use their own devices for work, and the practice is … Continued

, , , , Comments Off on How to make your school network secure from the inside

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued

Comments Off on Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Windows Active Directory Security with IS Decisions

Securing your Windows Active Directory infrastructure. Every day here at IS Decisions, we’re lucky to engage with individuals from all over the world. Security and emergency response truly are global issues. We speak with individuals from organizations, companies and government departments that recognize their security needs go beyond what’s available in native Windows controls. We speak … Continued

, , , , , Comments Off on Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

Securing Authorized User Access on Windows Networks

How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years.   IT administrators spend a lot of … Continued

Comments Off on BYOD Security for Windows Networks

BYOD Security for Windows Networks

BYOD Security for Windows Networks

BYOD security is a concern for many IT departments. Because of this, UserLock includes a Wi-Fi and VPN session control feature that permits an organization to control their wireless networks and help secure BYOD environments. With UserLock an organization can monitor, restrict and record every Wi-Fi and/or VPN session. How to restrict Wi-Fi & VPN sessions … Continued

, Comments Off on PowerShell Commands for Active Directory Security

PowerShell Commands for Active Directory Security

PowerShell Commands for Active Directory Security

With the release of UserLock 7 comes PowerShell commands for Active Directory Security. Yes, it is now possible to manage/administer UserLock with PowerShell cmdlets! UserLock is an enterprise software solution that controls and restricts user access offering Identity and Access Management to Windows and Active Directory networks. Gaining in popularity and importance, Windows PowerShell is … Continued

Secured By miniOrange