Get Quick Insights with Improved NTFS Permissions Reporting
IS Decisions
by Chris Bunn
1y ago
The latest FileAudit updates help make NTFS permissions reporting easy – and add the ability to migrate or archive your database.   You want quick insights into access rights across the entire file system directory. And you need more control over your data. You spoke, we listened. Easily report on NTFS permissions & permission changes With the new FileAudit update, you now have the ability to view and report on all NTFS permission changes for every impacted user/group on a file/folder. Need more detail? You can easily drill down to view permissions added, removed or modified, al ..read more
Visit website
Stand Down, Marketers: Zero Trust is Not a Product
IS Decisions
by Chris Bunn
1y ago
Thanks to relentless marketing, Zero Trust is quickly turning into another buzzword. It’s time security professionals claim to the term. Once and for all: Zero Trust is not a product, it’s a security strategy. While a product or service can indeed be part of a Zero Trust security strategy, no single product can satisfy all Zero Trust requirements and transform your organization.  Why All the Hype with Zero Trust? It’s surprising what marketing has been able to do with such an off-putting term. In almost any context outside of security, zero trust has few, if any, positive connotations ..read more
Visit website
Simplify MFA & Session Management With the New, Intuitive UserLock Web App
IS Decisions
by Chris Bunn
2y ago
The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere. Now available in UserLock 11.2, the UserLock Web App complements your existing UserLock software with: An easy-to-use, visual interface that puts key network session monitoring controls at IT’s fingertips. Accessible, simplified daily management that opens up UserLock access to IT teams wherever they work, streamlining day-to-day management. Enhanced features that offer early access to enhanced and new UserLock capabilities that are on the roadmap but n ..read more
Visit website
Meet Salesforce MFA Requirements via SSO With Active Directory Identities
IS Decisions
by Chris Bunn
2y ago
This article explains how UserLock can deliver SSO and MFA access to Salesforce from anywhere for on-premise Active Directory identities. In response to the global threat landscape, Salesforce now requires multi-factor authentication (MFA) for all logins. While Salesforce has enabled MFA on direct Salesforce logins, MFA is also a contractual requirement for users who access Salesforce products through a single sign-on (SSO) service. Here’s how to comply with the Salesforce MFA requirement, while providing secure access and easy adoption for your team. How Can Active Directory Users Meet the S ..read more
Visit website
Master Your Data Lifecycle to Improve Data Security
IS Decisions
by Michael O'Dwyer
2y ago
  A data lifecycle is hard to pin down. Depending on your industry or profession, what makes up a data lifecycle can vary widely. For example, Harvard Business School claims there are eight data life cycle stages. But some count only seven stages, and some just five. When it comes to cybersecurity, a more concrete, not to mention secure, and comprehensive approach is necessary to ensure data security. One of Many Ways to Improve Data Security Before we go further, it’s worth noting that having 100% security in all areas happens about as often as a blue moon, finding the Holy Grail, or a ..read more
Visit website
Is It Paranoia If It’s Real? Know These Insider Threat Indicators
IS Decisions
by Michael O'Dwyer
2y ago
“Just because you’re paranoid doesn’t mean they’re not out to get you.” More than just a great Nirvana lyric, this also sounds like an apt mantra for modern-day cybersecurity. Because if administrators are feeling paranoid these days, it’s for good reason. External attacks abound, and insider threats tend to fly under the radar until it’s too late. And even if your employees are honest and trustworthy, what if it could happen to you? Do you know what motivates an inside actor, and what insider threat indicators to watch out for? Step One: Build Insider Threat Awareness Think your organization ..read more
Visit website
Why Using SMS Authentication for 2FA Is Not Secure
IS Decisions
by Chris Bunn
2y ago
Two-factor authentication (2FA) is now a part of daily life, and most of us have had first-hand experience with SMS authentication. You enter your password, then you get a prompt to enter a code or pin that’s sent to your phone number. After you type in the code, you’re in. Simple, right? We all have access to cell phones, so it’s no surprise that SMS two-factor authentication is one of the most widespread types of multi-factor authentication (MFA). You don’t need any apps or digital keys, and it’s not tied to a specific ecosystem. Unfortunately, it’s also not a secure MFA method (and Microso ..read more
Visit website
Multi Factor Authentication in a Holistic Context
IS Decisions
by Chris Bunn
2y ago
  The following is a guest post from Techni Team, an ICT-Full-Service Provider and the distributor for UserLock in the Netherlands. As many of you are aware, that when it comes to protecting the ICT infrastructure, many organizations need to rapidly upgrade to a higher level of security. This is particularly true for SME companies. This is evident not only from the staggering number of reported hacking incidents in the last year but also from expert reports published in recent months. As a result, the industry is now facing a double challenge, since not only are the SME companies be ..read more
Visit website
Stop the Frustration and Risk of Unchecked Access to Files and Folders
IS Decisions
by Chris Bunn
2y ago
Following the recent updates to FileAudit, we discuss how automated responses to file moves, deletions and other access events can help SMBs, and the MSPs that service them, protect sensitive data from theft, alteration and loss. Have you ever been asked to find out who moved years of archived PDF files, who deleted important client folders, or prove that only authorized access has been granted? That feeling of frustration is when you realize unchecked access to files and folders such as a file move, deletion, rename etc. is risking the alteration or loss of your company data. An Industry stu ..read more
Visit website
Techni Team appointed exclusive distributor of UserLock MFA for the Netherlands
IS Decisions
by Chris Bunn
2y ago
A next step in their ambition to make a difference in IT-Security for Dutch SMEs Full-service ICT-supplier Techni Team ICT BV (Veenendaal, NL) and IS Decisions SA (Bidart, France) have entered into a partnership agreement for the distribution and support of Userlock Multi-Factor Authentication (MFA) in the Netherlands. Techni Team will implement this Access Management solution at its current customers and offer this solution to other small-and-medium size businesses (SME’s) and their IT providers. The partnership is an important step for IS Decisions, an innovative player in the global IT-Sec ..read more
Visit website

Follow IS Decisions on FeedSpot

Continue with Google
Continue with Apple
OR