25th December 2014
For Christmas this year the CSO should be looking for any tool available to help strengthen employee vulnerability…
09th December 2014
There’s no ‘one way’ to protect company systems and data but with each layer of protection that training and technology gives, you can make it harder for breaches to occur and be quicker to respond to those that do…
23rd October 2014
Why law firms are the world’s worst for security leaks and how to help…
29th August 2014
What will it take for Security Teams to show less indifference toward Compliance?…
15th August 2014
Are your staff more careful than the average employee is with passwords?…
11th August 2014
Security experts, including IS Decisions CEO François Amigorena, offer their advice on how to keep children safe online…
How much is the security risk each time an employee leaves a company?…
06th August 2014
One of the most basic security mistakes out there is sharing account credentials and passwords…
04th August 2014
Despite all the complaints about the lowly password, it’s still the most prevalent security measure in use today. IS Decisions report looks to help companies understand who is most likely to share a password with someone or exhibit other behavior that can put a network at risk…
28th July 2014
In a recent study of 2,000 employees, IS Decisions found that alarming numbers of workers don't believe their log-in details represent a security threat…
24th July 2014
The industries that perhaps should know better are in fact worse than the rest…
IS Decisions’ research showed that around 36 per cent of recent departures retain access…
Unauthorized access to corporate networks and resources by ex-employees is a documented issue. IS Decisions research has revealed how companies are neglecting to deploy vigilant post-termination processes, allowing ex-employees continued access to systems and data…
23th July 2014
A third of ex-employees have access to company data and 9 percent have used their access privileges, says new research from IS Decisions.…
22th July 2014
Former employees are probably the greatest insider threat, yet they are the easiest to address; just make changing passwords and deactivating accounts a part of the termination process…
21th July 2014
How the insider threat needs to be addressed with a combination of cultural and technological solutions…
30th June 2014
Industry Voice. Francois Amigorena looks at how creating a transparent security policy and using technology to implement it properly, there is no reason why users cannot work in a more secure fashion…
25th June 2014
Over half (52%) of desk-based employees don’t think that sharing work related logins represents a risk to their employer…
08th June 2014
Security can no longer be the responsibility of IT Managers and CIOs alone…
05th May 2014
Following the recent research from IS Decisions, Dento-legal advisers at Dental Protection Limited are reminding dentists on all matters concerning data security…
11th April 2014
IS Decisions study cites internal threats as the greatest danger to the security of protected health information…
21th April 2014
One way to help protect your business from insider threats is to conduct background checks of future employees…
19th April 2014
Industry Voice: Francois Amigorena looks at IT departments tackling insider threats…
16th April 2014
More than 1 in 5 healthcare workers share their passwords with colleagues, a security no-no!…
A recent report released by IS Decisions highlighted how healthcare suffered double the average amount of internal security breaches compared to other industries…
Leading South African enterprise technology company Blue Turtle Technologies are working with their customers to minimize the risk of inappropriate access to their corporate environments…
3rd April 2014
IS Decisions’ CEO Francois Amigorena contributes to the Analogies Project…
21st February 2014
Unfair and unnecessary to require businesses to report every minor security breach they experience…
19th February 2014
The Insider Threat can mainly be mitigated with an investment in tools that monitor and, to a certain extent, control users, for their own benefit and for that of the organisation they work for…
Beware of disgruntled employees - a new report from IS Decisions reveals that UK businesses are being hit by over 1,000 internal security breaches every day…
Network management under par, addressing internal security weakness and 10 Steps to beating Insider Threats…
New study from IS Decisions indicates that security teams lack awareness regarding the seriousness of insider threats…
12th February 2014
Francois Amigorena, CEO of IS Decisions, discusses how we can overcome those smart enough to get around Active Directory security policies…
16th January 2014
Industry Voice: Why a User Access Control Policy is crucial for your organization…
03 January 2014
PRISM Fiasco Highlights Dangers of Password Sharing. Inside threat is a very real concern and password sharing a very real cause. Learn more on a technology solution that helps organizations protect against the Snowden effect…
Analysts Quocirca discuss how to extend security for Microsoft Active Directory. The need to apply further restrictions on what users can do once authenticated can be achieved with UserLock from IS Decisions…
Select language:
Business privacy policy - User License Agreement - General conditions - Manage your cookies
© IS Decisions