A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This survey was across a sample of 2,000 people in the UK and the US, and … Continued
Better Understanding the Insider Threat
The fact is that many, if not most, security breaches involve internal users, and this risk is known as ‘Insider Threat’. Creating a culture of cybersecurity within and for your employees is paramount in helping to safeguard your company against insider threats. The theme of this year’s National Cyber Security Awareness Month (NCSAM) was ‘Our Shared … Continued
Raising User Security Awareness
IS Decisions has launched the first online game designed specifically to educate and raise awareness of user security and insider threat. ‘The Weakest Link: A User Security Game’ has been developed as a free resource for organizations in response to our own research that found 48% of IT professionals believe training is key to raising awareness … Continued
An Insider Threat Program to help tackle Internal Security Breaches
According to new research from IS Decisions, 2015 is set to see a huge rise in the number of IT Professionals taking action to address insider threat in their organization. Another day, another massive security breach of millions of consumer or company records. As the stories behind many of these breaches unravel, frequently the source appears … Continued
Secure Network Access & Avoid Security Breaches from your Employees
So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will outline how UserLock can help provide organizations with the automated safeguards and real-time visibility that … Continued
Enhanced network logon security
When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of being nigh on impossible. Humans are the weakest link Research conducted by IS Decisions found … Continued
Mitigating Credentials-based-attacks from Social Engineering
Following the recent CERT research on unintentional insider threats from social engineering, IS Decisions share their experience on how organisations are helping prevent security breaches that stem from credentials-based-attacks. Unintentional Insider Threats from Social Engineering The CERT Insider Threat Center recently published its research on unintentional insider threats focusing on the use of phishing and/or … Continued
From Brutus to Snowden. A Study of Insider Threat Personas
Today IS Decisions reveal a new study on the attitudes and behaviors of users with regards to internal security. From Brutus to Snowden: A study of Insider Threat Personas Following on from the ‘Insider Threat Manifesto‘ launched earlier this year which highlighted attitudes of IT Professionals, we now turn our spotlight on the users themselves. Learn who … Continued
What IT security pros can learn from a Dyson vacuum cleaner!
How can IT security professionals better succeed when engaging others on information security and awareness? Bruce Hallas is the creator and founder of The Analogies Project and the owner and principle consultant at Marmalade Box Ltd. As someone who trained in marketing, I learnt that if you wanted someone to buy your product, you needed … Continued
Password Security Policy: Managing the threat of shared passwords in enterprises.
The effectiveness of any password security policy depends on users not sharing passwords. Popular circumstances where users believe their actions are justified include; delegating work to others and vacation coverage. Here we look at the danger of shared passwords and how to stop the threat through UserLock’s multi-factor authentication and contextual access controls. An IT Security … Continued