If you’re responsible for school network management at a school, college or university, I don’t envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers and the like from your network; you need to ensure that you protect against students’ … Continued
Network security in Universities, Colleges and Schools.
IT teams responsible for network security in Universities, Colleges and Schools are experiencing more and more pressure to secure their networks from both external and insider threats. According to the CSO,13% of data breaches last year happened at educational institutions. According to EDUCAUSE, a nonprofit association of IT leaders in higher education, information security remains the #1 issue in 2018 for the third … Continued
Context-Aware Security Leaves Leaked Employee Passwords Useless
At 221 of the leading Fortune 500 companies, employees’ credentials are posted publicy online for hackers to steal and reuse in cyberattacks. This research is just one of many stories we see every year about how leaked employee passwords leave companies vulnerable to hackers who can use the data to break into networks or mount … Continued
Active Directory User Logon Logoff Security
So you want to control Active Directory (AD) user access in a more granular way than native Windows’ Group Policy? You want to add multi-factor authentication? You want to further restrict users from accessing the network based on criteria you specify? And you want to be alerted to any other suspicious logon activity – crucially before that activity becomes a serious problem? Your absolutely right. … Continued
How UserLock Guards against Shared or Stolen Windows AD Network Logins
If you ask your neighbors to watch your house and keep an eye out for any signs of forced entry when you go on holiday, you’re going to miss the burglar who steals your keys and walks right through the front door. The most worrying thing about compromised credentials is that you’re not likely to … Continued
Are you sure of your Windows Users claimed identity?
Verifying Windows users claimed identity to guard against unauthorized access from stolen or shared credentials. 1. Contextual access controls Contextual access controls can define and restrict network access conditions for each authenticated Windows user. If credentials are compromised, any attempted access outside of these logon rules is automatically blocked. Shared or stolen passwords are therefore unsuccessful … Continued
Protection from Password Sharing
Employees are arguably the greatest security risk to modern businesses. Though it is often assumed that IT viruses and hackers should be your biggest concern, the reality is that it is your own staff, whether maliciously or accidentally, that are the most likely cause of a breach. But how much do you really know about … Continued
Are you Identifying and Monitoring End-Users Network and File Access?
Recent IS Decisions research among 1500 healthcare, finance, and legal sector workers in both the US and the UK highlighted the current status of how organizations are securing their networks and sensitive information within. The results shed light on how much more needs to be done to mitigate the risk of both security and compliance … Continued
Stopping Legitimate Login Credentials being used for Security Breaches
Many data breaches involve the use of legitimate login credentials. Guarding against these ‘insider threats’ means better protecting all authenticated users access to the network, and the sensitive information within. The Threat from Human and Authenticated Users There is now widespread recognition that the insider threat is very serious but in most sectors there is insufficient … Continued
HIPAA Access Control
Access control is the first Technical Safeguard Standard of the HIPAA Security Rules. It is described in HIPAA compliance as the responsibility for all healthcare providers to allow access only to those users (or software programs) that have been granted access rights. So no matter how much healthcare organizations spend on protecting their network perimeter, the … Continued