“UserLock is the only solution on the market that allows our organisation to fulfill the CMS compliance requirements for its government contracts. It is absolutely critical to our business in this respect, but brings with it numerous other benefits in usability and reporting functionality.” Technology Editor for Active Directory, Leading US Healthcare Insurance Provider … Continued
Relevance is the key to better user security awareness
A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This survey was across a sample of 2,000 people in the UK and the US, and … Continued
HIPAA unique user identification in a Windows System
Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued
Check Users Logged into Windows Server, Computers and all RDP Connections
IT Administrators often need to know who is currently logged on to any computer or connected to a server, either whilst at the console or through a remote desktop session. Spend a few minutes perusing online forums and common questions include: Who is logged into Windows Server 2012? How can I view all active remote … Continued
Managing Temporary Changes to Users Access Control Policy
The release of UserLock 8.5 strengthens user access control policy by enabling administrators to securely manage temporary changes to users’ network access rights. Temporary network access rights To secure sensitive information, an organization may need to restrict the amount of time employees, contractors or external partners can access certain systems. Users should be provided with … Continued
Secure Network Access & Avoid Security Breaches from your Employees
So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will outline how UserLock can help provide organizations with the automated safeguards and real-time visibility that … Continued
Windows Security Authenticated Users: How to start taking internal security more seriously
On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they had had an internal security breach in the last year. Yet despite this huge prolificacy, … Continued
How to make your school network secure from the inside
IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued
Enhanced network logon security
When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of being nigh on impossible. Humans are the weakest link Research conducted by IS Decisions found … Continued
Monitor user activity on Windows Server Network
Monitor user activity across a Windows Server-based network is key to knowing what is going on in your Windows environment. User activity monitoring is vital in helping mitigate increasing insider threats, implement CERT best practices and get compliant. However, it is important to stress that without multi-factor authentication, enhanced user access controls or the ability … Continued