The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within – is exactly who they say they are. This is especially important when dealing with agents and customer service representatives who have access to vast amounts of sensitive data. … Continued
Are you Identifying and Monitoring End-Users Network and File Access?
Recent IS Decisions research among 1500 healthcare, finance, and legal sector workers in both the US and the UK highlighted the current status of how organizations are securing their networks and sensitive information within. The results shed light on how much more needs to be done to mitigate the risk of both security and compliance … Continued
Information Security in Banking and the Insider Threat
The biggest threat for the banking sector is coming from within. How can a bank mitigate against the risk from malicious, careless or exploited users? This week saw U.S. law enforcement officials arrest five individuals who reportedly were involved in the high-profile 2014 security breach of JPMorgan. The breach was one of the largest attacks … Continued
Insider Threat Protection. People, Process and Technology
When it comes to protecting against the Insider Threat, too often overlooked (often critically) is how people and process should be set up to mitigate the risk from employee behavior. Such behavior that often causes or aides security breaches. The notion that IT security is a combination of people, process and technology is nothing new. The triangle … Continued
Six steps to multi device security in the age of BYOD
The reason BYOD (bring your own device) causes concern for IT managers is it equates to a wider base of devices gaining access to network resource, often devices outside of the IT department’s control. We know that employees are frequently requesting to be able to use their own devices for work, and the practice is … Continued
How to make your school network secure from the inside
IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued
Windows Active Directory Security with IS Decisions
Securing your Windows Active Directory infrastructure. Every day here at IS Decisions, we’re lucky to engage with individuals from all over the world. Security and emergency response truly are global issues. We speak with individuals from organizations, companies and government departments that recognize their security needs go beyond what’s available in native Windows controls. We speak … Continued
Securing Authorized User Access on Windows Networks
How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years. IT administrators spend a lot of … Continued
BYOD Security for Windows Networks
BYOD security is a concern for many IT departments. Because of this, UserLock includes a Wi-Fi and VPN session control feature that permits an organization to control their wireless networks and help secure BYOD environments. With UserLock an organization can monitor, restrict and record every Wi-Fi and/or VPN session. How to restrict Wi-Fi & VPN sessions … Continued
PowerShell Commands for Active Directory Security
With the release of UserLock 7 comes PowerShell commands for Active Directory Security. Yes, it is now possible to manage/administer UserLock with PowerShell cmdlets! UserLock is an enterprise software solution that controls and restricts user access offering Identity and Access Management to Windows and Active Directory networks. Gaining in popularity and importance, Windows PowerShell is … Continued