News 2018

21st December 2018

Securing Network Access for Call Center Staff

Here are details on four of the most common mistakes when it comes to managing access across your networks.

Read the article

18th December 2018

Call Center Network Security - Verifying User Identity at Teleperformance

To protect against fraud and be compliant, Teleperformance needed to verify that the person who authenticates is who they say they are.

Read the article

29th November 2018

Securing Network Access for Call Center Staff

The importance of getting access management right cannot be overstated. You need to make sure that anybody accessing your systems – and the data within - is exactly who they say they are.

Read the article

26th November 2018

Stop Blaming Your Agents for Call Center Breaches

No matter what the industry, consumers trust organizations to look after their data. No more so when dealing with agents and customer service representatives who have access to vast amounts of sensitive data.

Read the article

16th November 2018

Spotted a data breach in your call center? You’re already too late.

Whether managed by the company or outsourced, organizations must better secure information, appropriate access and confidentiality within the call center.

Read the article

15th November 2018

IT Security Solutions for an SMB Don’t Have to Be Any Less Effective Than Those for a Large Enterprise

SMBs have become a lucrative target for cyberattacks because most do not have sufficient defenses in place to protect, detect or react to attacks.

Read the article

25th October 2018

Securing Access to your Education Network with UserLock

Educational organizations represent a repository of so many valuable data types (personal information, payment information, health records, cutting-edge research data, etc.) which makes them a leading target for attacks.

Read the article

12th October 2018

Product Review: UserLock

UserLock is reviewed by IT Security Guru and given an overrall score of 5/5.

Read the review

12th October 2018

Reach beyond user security awareness. Training will never be enough

The data held by the healthcare industry is highly confidential. As a key target for hackers and state sponsored cyber-thieves it is thought that the value of a healthcare record is seven to ten times greater than a credit card record.

Read the article
Information Security Buzz

7th October 2018

IT security: spotting the attacker at the logon

Education institutions need to be able to identify when any kind of threat actor tries to hit, without obstructing the abilities of faculty, staff, and students.

5th October 2018

Eight tips for choosing the right IT security solutions

More than 61% of small and medium-sized businesses (SMBs) have fallen victim to hackers in the last 12 months.

Read the article

4th October 2018

Information Security Advice For Small And Medium Business

Most small and medium sized businesses (SMBs) do not have enough defenses in place to protect, detect or react to attacks, making them an easy target for cyber attackers.

Read the article

19 September 2018

Cybersecurity advice for the Education sector

How can educational institutions keep pace with security threats and challenges?

Read the article

4th September 2018

IT matters to SMB success, and security matters to IT success...

How does an SMB – and the Managed Service Providers servicing them - build the best security to safeguard their organization, users and data?

Read the article article

3rd August 2018

Cybersecurity Advice for SMB

Moving forward from just protect, pray and then react.

Read the article

1st August 2018

Data Breach: What Does a Compromise Look Like and How to Spot One

Compromises can show themselves as irregularities in user activity in a number of forms. Organizations need to spot and stop it before damage is done.

Read the article

24th July 2018

How SMBs can help stop a data breach before it starts

Data breaches are too costly to any sized organisation to be left to just protect, pray and react.

Read the article

13th July 2018

Stop blaming your users for compromised credentials

Users remain the biggest threat to a company’s security, but blaming your users is never the right route to take.

Read the article

9th July 2018

No Easy Feat: The Challenge of Securing the SMB

SMBs need to get the big business protection in terms of focus and effectiveness, but with SMB sensibilities in terms of implementation and use.

Read the article

2nd July 2018

Addressing insider threats with logon management

The common factor to every insider scenario is the logon. By leveraging Logon Management, you can stop the insider dead in their tracks.

Read the article

29th June 2018

Information security advice for SMBs

8 SMB-friendly criteria that achieve maximum impact for minimum effort.

Read the article

27 June 2018

SMEs: Don’t just wait for a security compromise

SMEs today are under attack but with the right strategy they can start to improve their security stance.

Read the article

21 May 2018

Is there a patch for my users?

Attackers love exploiting the naivety of users because it’s so easy. How can IT spot the threat and patch the user.

Read the article

18 April 2018

Important Considerations for Security Administrators to Guard Against Compromised Credentials

For a security administrator, it can be a daunting task trying to identify suspicious or malicious activity when the adversary has valid and authorized credentials.

Read the article

09 March 2018

Why are most Compliance Requirements Completely Nonsensical?

Each compliance regulation gets a collective groan from businesses whenever it arises on the agenda.

Read the article

02 March 2018

Those who write compliance requirements should hang their heads in shame

Francois Amigorena, CEO and Founder of IS Decisions discusses the problem with some vague and ambigious compliance requirements.

Read the article

07th January 2018

Logon management and security in higher education

CEO and Founder of IS Decisions talks to ET about keeping university networks protected, and why logon security is the first port of call.

Read the article