When it comes to data security, regardless of your industry sector, you’re likely to have to deal with compliance regulations. If you’re in the legal industry, there is the Law Society’s Lexcel standards. If you handle cardholder data, you’ll have to comply with PCI DSS. And if you work in healthcare, there are guidelines from … Continued
PCI Control Over Access: 4 Steps to Compliance
By providing visibility and control of corporate access and data, IS Decisions software solutions help companies ensure compliance with the Payment Card Industry (PCI) Data Security Standard (DSS). In this article we’ll focus on how to get compliant by strengthening PCI control over access with need-to-know restrictions, multi-factor authentication, enhanced monitoring and detailed reporting. What … Continued
HIPAA & Network Security for Windows Active Directory
Secure your organization’s network for HIPAA compliance. New revisions to federal privacy and security regulations (the HIPAA Omnibus Final Rule) are now in place with full effect from September 23rd. It concerns the necessary safeguards for protected health information – and stem from changes made under the Health Information Technology for Economic and Clinical Health … Continued
Securing Authorized User Access on Windows Networks
How can organizations safeguard and secure their Windows infrastructure to mitigate insider threat, ensure regulatory compliance and respond to IT emergencies? Rahul Bhatt is a Security Consultant at LOGON Software Asia Limited, a leading independent supplier of security software to the Asian IT communities for over 10 years. IT administrators spend a lot of … Continued
Auditing Logon Events. Why stop there?
Auditing logon events across a Windows network is often a priority for organizations wanting to secure access to their network and better understand user activity. What’s more it is required for an Information System to comply with most major regulatory constraints. However, auditing logon events on their own is not enough for organizations who are … Continued
FISMA Compliance: Key Security Requirements
In the United States, the Federal Information Security Management Act (FISMA) compliance is a matter of national security. And, for even the most seasoned and savvy IT pros, navigating security compliance is anything but simple. What is FISMA? Signed into law in 2002 and updated in 2014 as the Federal Information Security Modernization Act, FISMA … Continued