UserLock

, , Comments Off on Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This survey was across a sample of 2,000 people in the UK and the US, and … Continued

, , , Comments Off on HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued

, , Comments Off on How to check users logged into Windows Server Network

How to check users logged into Windows Server Network

How to check users logged into Windows Server Network

IT Administrators often need to know who is currently logged on / connected to a server. With UserLock, an organization can track and record all user access to know who is logged into the Windows Server network environment, from which system(s), since what time and for how long. Once deployed, every user session on the … Continued

, , Comments Off on Managing Temporary Changes to Users Access Control Policy

Managing Temporary Changes to Users Access Control Policy

Managing Temporary Changes to Users Access Control Policy

The release of UserLock 8.5 strengthens user access control policy by enabling administrators to securely manage temporary changes to users’ network access rights. Temporary network access rights To secure sensitive information, an organization may need to restrict the amount of time employees, contractors or external partners can access certain systems. Users should be provided with … Continued

, , , Comments Off on Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will outline how UserLock can help provide organizations with the automated safeguards and real-time visibility that … Continued

, , Comments Off on Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they had had an internal security breach in the last year. Yet despite this huge prolificacy, … Continued

, , , , Comments Off on How to make your school network secure from the inside

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued

, , Comments Off on Enhanced network logon security

Enhanced network logon security

Enhanced network logon security

When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of being nigh on impossible. Humans are the weakest link Research conducted by IS Decisions found … Continued

, , Comments Off on Monitor User Activity on Windows Server Network

Monitor User Activity on Windows Server Network

Monitor User Activity on Windows Server Network

Being able to audit and monitor user activity across a Windows Server based Network is key to knowing what is going on in your Windows environment. Monitoring user activity is vital in helping mitigate increasing insider threats, implement CERT best practices and get compliant. However it is important to stress that without enhanced user access … Continued

, , Comments Off on Strengthen your Windows network password security and stop blaming the users

Strengthen your Windows network password security and stop blaming the users

Strengthen your Windows network password security and stop blaming the users

The problem with the password is not the password, it’s more the human use of passwords is flawed. We pick simple ones, we forget complex ones, we share them with our colleagues or our boss, or anyone else that appears to have an air of authority. IS Decisions research has shown that as many as … Continued

Secured By miniOrange