News 2014

25th December 2014

What should Chief Security Officers Ask Santa For This Christmas?

For Christmas this year the CSO should be looking for any tool available to help strengthen employee vulnerability…

Read the article

09th December 2014

Your password isn’t the problem, it’s you

There’s no ‘one way’ to protect company systems and data but with each layer of protection that training and technology gives, you can make it harder for breaches to occur and be quicker to respond to those that do…

Read the article from

23rd October 2014

The case for ‘zero trust’ internal security in law

Why law firms are the world’s worst for security leaks and how to help…

Read the article

29th August 2014

Why Are Security Pros Blasé About Compliance?

What will it take for Security Teams to show less indifference toward Compliance?…

Read the article

15th August 2014

They're sharing usernames and passwords again!

Are your staff more careful than the average employee is with passwords?…

Read the article

11th August 2014

What security experts tell their kids

Security experts, including IS Decisions CEO François Amigorena, offer their advice on how to keep children safe online…

Read the article

11th August 2014

Security risks: ‘Insider Threats’ from ex-employees

How much is the security risk each time an employee leaves a company?…

Read the article

06th August 2014

Sharing, not caring: Users pass around credentials

One of the most basic security mistakes out there is sharing account credentials and passwords…

Read the article

04th August 2014

Passwords Are Like Underwear—They Aren’t Meant to Be Shared

Despite all the complaints about the lowly password, it’s still the most prevalent security measure in use today. IS Decisions report looks to help companies understand who is most likely to share a password with someone or exhibit other behavior that can put a network at risk…

Read the article

28th July 2014

Sharing Log-In Details Presents a Security Threat

In a recent study of 2,000 employees, IS Decisions found that alarming numbers of workers don't believe their log-in details represent a security threat…

Read the article

24th July 2014

HR one of biggest culprits in allowing ex-employees access to network

The industries that perhaps should know better are in fact worse than the rest…

Read the article

24th July 2014

One in three employees retain access to company data after they leave

IS Decisions’ research showed that around 36 per cent of recent departures retain access…

Read the article

24th July 2014

One in Three Ex-employees Can Access Corporate Networks

Unauthorized access to corporate networks and resources by ex-employees is a documented issue. IS Decisions research has revealed how companies are neglecting to deploy vigilant post-termination processes, allowing ex-employees continued access to systems and data…

Read the article

23th July 2014

Inside Threat levels from ex-staffers greater than expected

A third of ex-employees have access to company data and 9 percent have used their access privileges, says new research from IS Decisions.…

Read the article

22th July 2014

Ex-Employees enjoy free reign over company data in over a third of companies

Former employees are probably the greatest insider threat, yet they are the easiest to address; just make changing passwords and deactivating accounts a part of the termination process…

Read the article

21th July 2014

The threat from within. How to start taking internal security more seriously

How the insider threat needs to be addressed with a combination of cultural and technological solutions…

Read the article

30th June 2014

Password sharing : How to stamp out a dangerous habit

Industry Voice. Francois Amigorena looks at how creating a transparent security policy and using technology to implement it properly, there is no reason why users cannot work in a more secure fashion…

Read the article

25th June 2014

Majority if desk-based employees see no security risk in sharing logins

Over half (52%) of desk-based employees don’t think that sharing work related logins represents a risk to their employer…

Read the article

08th June 2014

Why User Education On Security Needs To Start At The Top

Security can no longer be the responsibility of IT Managers and CIOs alone…

Read the article

05th May 2014

Dentists are reminded to stay secure in this digital age

Following the recent research from IS Decisions, Dento-legal advisers at Dental Protection Limited are reminding dentists on all matters concerning data security…

Read the article

11th April 2014

Study: Greatest PHI Threat comes from within

IS Decisions study cites internal threats as the greatest danger to the security of protected health information…

Read the article

21th April 2014

Employee background checks can help protect your business

One way to help protect your business from insider threats is to conduct background checks of future employees…

Read the article

19th April 2014

The Edward Snowden effect : is awareness of insider threats gsingleing?

Industry Voice: Francois Amigorena looks at IT departments tackling insider threats…

Read the article

16th April 2014

1 in 5 healthcare workers share passwords, survey warns

More than 1 in 5 healthcare workers share their passwords with colleagues, a security no-no!…

Read the article

16th April 2014

IT security study cites healthcare insider threat concerns

A recent report released by IS Decisions highlighted how healthcare suffered double the average amount of internal security breaches compared to other industries…

Read the article

11th April 2014

Blue Turtle locks down corporate environments with IS Decisions

Leading South African enterprise technology company Blue Turtle Technologies are working with their customers to minimize the risk of inappropriate access to their corporate environments…

Read the article

3rd April 2014

The Football Stadium & Internal Network Security

IS Decisions’ CEO Francois Amigorena contributes to the Analogies Project…

Read the article

21st February 2014

Data and security breach notification rules must not place unnecessary burdens on businesses

Unfair and unnecessary to require businesses to report every minor security breach they experience…

Read the article

19th February 2014

Analyst says insider threat mainly down to lack of understanding

The Insider Threat can mainly be mitigated with an investment in tools that monitor and, to a certain extent, control users, for their own benefit and for that of the organisation they work for…

Read the article

19th February 2014

300,000 internal security breaches in UK last year

Beware of disgruntled employees - a new report from IS Decisions reveals that UK businesses are being hit by over 1,000 internal security breaches every day…

Read the article

19th February 2014

UK firms see 1,000+ internal data breaches a day

Network management under par, addressing internal security weakness and 10 Steps to beating Insider Threats…

Read the article

19th February 2014

Why companies need to check their handling of internal threats

New study from IS Decisions indicates that security teams lack awareness regarding the seriousness of insider threats…

Read the article

12th February 2014

How IT can outsmart the intelligentsia

Francois Amigorena, CEO of IS Decisions, discusses how we can overcome those smart enough to get around Active Directory security policies…

Read the article

16th January 2014

Insider Threats abound

Industry Voice: Why a User Access Control Policy is crucial for your organization…

Read the article

03 January 2014

The Edward Snowden Effect

PRISM Fiasco Highlights Dangers of Password Sharing. Inside threat is a very real concern and password sharing a very real cause. Learn more on a technology solution that helps organizations protect against the Snowden effect…

Read the article

03 January 2014

Extending Microsoft Active Directory

Analysts Quocirca discuss how to extend security for Microsoft Active Directory. The need to apply further restrictions on what users can do once authenticated can be achieved with UserLock from IS Decisions…

Read the article