UserLock

, , , Comments Off on Concurrent Session Control in Healthcare for CMS compliance

Concurrent Session Control in Healthcare for CMS compliance

Concurrent Session Control in Healthcare for CMS compliance

“UserLock is the only solution on the market that allows our organisation to fulfill the CMS compliance requirements for its government contracts. It is absolutely critical to our business in this respect, but brings with it numerous other benefits in usability and reporting functionality.” Technology Editor for Active Directory, Leading US Healthcare Insurance Provider   … Continued

, , Comments Off on Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

Relevance is the key to better user security awareness

A recent piece of research IS Decisions recently conducted found that a shocking seven out of ten office workers admitted that, should they become aware of a security breach at work, they wouldn’t know who to report it to. This survey was across a sample of 2,000 people in the UK and the US, and … Continued

, , , Comments Off on HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

HIPAA unique user identification in a Windows System

Healthcare is one of the most information intensive industries in society today, with patient data naturally being of a very sensitive nature, and the handling of that data often very complex. So to help protect this information, US medical organizations must adhere to HIPAA (Health Insurance Portability and Accountability Act), a set of regulations enforced … Continued

, , Comments Off on Check Users Logged into Windows Server, Computers and all RDP Connections

Check Users Logged into Windows Server, Computers and all RDP Connections

Check Users Logged into Windows Server, Computers and all RDP Connections

IT Administrators often need to know who is currently logged on to any computer or connected to a server, either whilst at the console or through a remote desktop session. Spend a few minutes perusing online forums and common questions include: Who is logged into Windows Server 2012? How can I view all active remote … Continued

, , Comments Off on Managing Temporary Changes to Users Access Control Policy

Managing Temporary Changes to Users Access Control Policy

Managing Temporary Changes to Users Access Control Policy

The release of UserLock 8.5 strengthens user access control policy by enabling administrators to securely manage temporary changes to users’ network access rights. Temporary network access rights To secure sensitive information, an organization may need to restrict the amount of time employees, contractors or external partners can access certain systems. Users should be provided with … Continued

, , , Comments Off on Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

Secure Network Access & Avoid Security Breaches from your Employees

So you want to secure network access (and access attempts) across your Windows Server-based Network? You’re absolutely right. Security breaches are often caused by a combination of human error and security inadequacies related to authenticated users access. This post will outline how UserLock can help provide organizations with the automated safeguards and real-time visibility that … Continued

, , Comments Off on Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

Windows Security Authenticated Users: How to start taking internal security more seriously

On average, a total of about 1,200 internal security breaches occur in UK businesses every single day. In the US, the figure is over 2,500. These figures are based on recent research in which 500 IT decision makers whether they had had an internal security breach in the last year. Yet despite this huge prolificacy, … Continued

, , , , Comments Off on How to make your school network secure from the inside

How to make your school network secure from the inside

How to make your school network secure from the inside

IT infrastructure is the backbone of a modern educational institution. From the largest secondary boasting thousands of pupils to the smallest primary with a mere hundred pupils, accessing the network is as much a regular a part of a student life as school dinners. Every day, pupils up and down the country log on to … Continued

, , Comments Off on Enhanced network logon security

Enhanced network logon security

Enhanced network logon security

When thinking seriously about Windows network security, an absolute must for an organization is to create a well structured security policy. However, regardless of the best intention from management, gaining top to bottom commitment is difficult to the point of being nigh on impossible. Humans are the weakest link Research conducted by IS Decisions found … Continued

, , Comments Off on Monitor user activity on Windows Server Network

Monitor user activity on Windows Server Network

Monitor user activity on Windows Server Network

Monitor user activity across a Windows Server-based network is key to knowing what is going on in your Windows environment. User activity monitoring is vital in helping mitigate increasing insider threats, implement CERT best practices and get compliant. However, it is important to stress that without multi-factor authentication, enhanced user access controls or the ability … Continued

Secured By miniOrange