Home
Join
Content Block
Ask IS Decisions a question
Author Joe Mallen
JoeLiveInSA
Feb 1, 2017 at 16:32 UTC | IS Decisions

lock icon Question about UserLock

How do I go about purchasing or getting a quote for UserLock?

Author vendorpageid_815

lock icon The Three hack. Take control to stop a breach using an employee login

Nov 18, 2016 at 16:58 UTC | IS Decisions

UK telecoms company Three confirmed news of the security breach on Thursday, revealing that hackers accessed its systems using an employee login, potentially putting the personal data of six million customers at risk. This is the umpteenth time a major company has suffered a data breach as a result of an employee login falling into the wrong … ContinuedOpens a new window

The post The Three hack. Take control to stop a breach using an employee loginOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Context-Aware Security Leaves Leaked Employee Passwords Useless

Oct 26, 2016 at 14:12 UTC | IS Decisions

At 221 of the leading Fortune 500 companies, employees’ credentials are posted publicy online for hackers to steam and reuse in cyberattacks. This research is just one of many stories we see every year about how leaked employee passwords leave companies vulnerable to hackers who can use the data to break into networks or mount … ContinuedOpens a new window

The post Context-Aware Security Leaves Leaked Employee Passwords UselessOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Active Directory User Logon Logoff Security

Oct 18, 2016 at 14:52 UTC | IS Decisions

So you want to control Active Directory (AD) user access in a more granular way than native Windows’ Group Policy? You want to restrict users from accessing the network based on criteria you specify? And you want to be alerted to any other suspicious logon activity – crucially before that activity becomes a serious problem? Your absolutely right. This type of logon/logoff security is no longer … ContinuedOpens a new window

The post Active Directory User Logon Logoff SecurityOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Windows File Server Auditing with FileAudit

Oct 6, 2016 at 15:44 UTC | IS Decisions

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers. Windows File Server Auditing Software Although Windows Active Directory includes native policies to audit file changes, admins turn to third party software to enhance security and ease regulatory compliance. As an agentless solution, … ContinuedOpens a new window

The post Windows File Server Auditing with FileAuditOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Software for fighting internal and external network threats

Sep 23, 2016 at 13:37 UTC | IS Decisions

If you missed us at InfoSecurity London, and with over 300 exhibitors and over 13,000 visitors that is perhaps possible…. here’s your chance for you to get to know us. The following is a short interview from Global Security Magazine. Can you introduce to us your business IS Decisions is a global IT security vendor that … ContinuedOpens a new window

The post Software for fighting internal and external network threatsOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Half of US organizations reject multi-factor authentication, report finds

Sep 8, 2016 at 15:25 UTC | IS Decisions

Nearly half of US organizations do not use multi-factor authentication to protect against compromised credentials, a survey by global IT security vendor IS Decisions finds today, with organizations citing ‘ infrastructure complexity’ (28%) and ‘time needed to manage and oversee’ (18%) as two of the biggest barriers to adoption. The news comes off the back … ContinuedOpens a new window

The post Half of US organizations reject multi-factor authentication, report findsOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Companies are failing to balance User Security & User Productivity

Jun 30, 2016 at 09:10 UTC | IS Decisions

Large US firms are losing 182 days of employee productivity every year due to over complex security. IS Decisions research highlights a failure of both US and UK businesses to find the right balance between user security and user productivity. Our research reveals that on average, each (US) employee loses 21.88 minutes every week because of … ContinuedOpens a new window

The post Companies are failing to balance User Security & User ProductivityOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon How UserLock Guards against Shared or Stolen Windows AD Network Logins

Jun 21, 2016 at 08:57 UTC | IS Decisions

If you ask your neighbors to watch your house and keep an eye out for any signs of forced entry when you go on holiday, you’re going to miss the burglar who steals your keys and walks right through the front door. The most worrying thing about compromised credentials is that you’re not likely to … ContinuedOpens a new window

The post How UserLock Guards against Shared or Stolen Windows AD Network LoginsOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon User security compliance – Where industries are getting compliance badly wro...

Jun 14, 2016 at 12:22 UTC | IS Decisions

When it comes to data security, regardless of your industry sector, youre likely to have to deal with compliance regulations. If youre in the legal industry, there is the Law Societys Lexcel standards. If you handle cardholder data, youll have to comply with PCI DSS. And if you work in healthcare, there are guidelines from … ContinuedOpens a new window

The post User security compliance – Where industries are getting compliance badly wrong.Opens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Are you sure of your Windows Users claimed identity?

Jun 10, 2016 at 13:34 UTC | IS Decisions

Verifying Windows users claimed identity to guard against unauthorized access from stolen or shared credentials. 1. Contextual access controls Contextual access controlscan define and restrict network access conditions for each authenticated Windows user. If credentials are compromised, any attempted access outside of these logon rules is automatically blocked. Shared or stolen passwords are therefore unsuccessful … ContinuedOpens a new window

The post Are you sure of your Windows Users claimed identity?Opens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon 6 things you never want to hear a user say….

Jun 3, 2016 at 15:54 UTC | IS Decisions

It was reported this week that user error accounted for the vast majority of UK security breach incidents. The CERT Insider Threat Center also recently determined that most security incidents initiated through phishing and other social engineering are carried out by acquiring and misusing usercredentialsto secure systems. The challenge is that users are indeed human. … ContinuedOpens a new window

The post 6 things you never want to hear a user say….Opens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Meeting HIPAA compliance to track and recover lost files.

May 31, 2016 at 14:29 UTC | IS Decisions

A world-class medical imaging practice chooses FileAudit to track and recover lost files. A medical practice based in New England offers diagnostic services to the medical profession. It has a network of private facilities, staffed by board-certified radiologists, registered technologists, and a team of dedicated staff that offers physicians and patients prompt and professional service. … ContinuedOpens a new window

The post Meeting HIPAA compliance to track and recover lost files.Opens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon Detect and alert on Windows File changes

May 23, 2016 at 14:41 UTC | IS Decisions

Industrial engineers figure out how to do things better. They engineer processes and systems that improve quality and productivity. They work to eliminate waste of time, money, materials, energy and other commodities. In such a highly competitive field, any sensitive data needs to be well protected from potential data breaches. Industrial engineers reacting quickly to … ContinuedOpens a new window

The post Detect and alert on Windows File changesOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Author vendorpageid_815

lock icon IT manager at a school or university? Youve got your work cut out for you

May 19, 2016 at 09:14 UTC | IS Decisions

If youre responsible for IT security at a school, college or university, I dont envy you. You have a tough job. Not only do you need to keep out the usual external threats like viruses, trojan horses, hackers and the like from your network; you need to ensure that you protect against students own blas … ContinuedOpens a new window

The post IT manager at a school or university? Youve got your work cut out for youOpens a new window appeared first on Enterprise Network Security Blog from ISDecisionsOpens a new window.


Read MoreOpens a new window
Show more

IS Decisions in Spiceworks

Edit
  • Francois (IS Decisions)
    Founder & CEO
    Apr 26, 2019 at 07:43 UTC
  • Chris (IS Decisions)
    Community Manager
    Nov 23, 2022 at 16:04 UTC
  • About IS Decisions