file system auditing tutorials

FileAudit reviewed and recognized as a leading cyber security software

| | Company News
IS Decisions has much to celebrate after our proactive auditing and monitoring software, FileAudit, won two awards under the top cyber security software of the FinancesOnline software review platform. FinancesOnline, a platform for business software reviews, conferred FileAudit with the 2018 Rising Star and 2018 Great User Experience awards in ... Read More
userlock logon protect

Beyond Group Policy to Control Active Directory Accounts

| | IT Security
With the GDPR (General Data Protection Regulation) now in full force, businesses must protect confidential data from unauthorized access. Strict administration of Active Directory (AD) user accounts is essential and although Group Policy is the tool of choice, processes such as logon and access policies can be tedious to configure ... Read More
Windows file server auditing with FileAudit

Windows File Server Auditing with FileAudit

With the limited usefulness of native Windows Tools, FileAudit is a software solution that greatly enhances file and folder access auditing across Windows file servers. Windows File Server Auditing Software When native Windows tools don’t cut it, admins turn to third party software to enhance security and ease regulatory compliance ... Read More
network security in universities colleges and schools

Network security in Universities, Colleges and Schools.

IT teams responsible for network security in Universities, Colleges and Schools are experiencing more and more pressure to secure their networks from both external and insider threats. According to the CSO,13% of data breaches last year happened at educational institutions. According to EDUCAUSE, a nonprofit association of IT leaders in ... Read More
file auditing a modern user interface

Nine Steps to better File Auditing

File auditing helps organizations secure their most sensitive data and simplifies adherence to compliance standards. When successful file auditing is in place it can help both identify a data breach as well as to potentially stop a breach. Attacks are looking for one thing – files Across almost all industries, ... Read More
insider threat best practice

Insider Threat Best Practice – without the need for an SIEM solution

| | IT Security
With so much news focusing on external attacks, one of the greatest threats to your organization’s data security, revenue, and reputation is insider threats. Insiders – employees with access to data that is externally valuable – are responsible for 28% of all data breaches. While 28% may not seem as ... Read More
file monitoring software

New distribution agreement for the Netherlands

| | Company News
Dutch organizations set to benefit from enhanced file auditing to protect against data breaches. Global cybersecurity vendor IS Decisions today announces an exclusive distribution agreement with NVB ICT DIENSTEN, an ICT specialist, to deliver its security solution FileAudit across the Netherlands. FileAudit is a comprehensive file monitoring tool that enables ... Read More
What lessons can companies learn from getting breached?

What lessons can companies learn from getting breached?

| | IT Security
In a sense, getting stung can be the key to taking notice — and maybe that’s a blessing in disguise. IT security is a topic often seen as solely the IT department’s concern. For management, the means taken to protect the company from cyber-crime can often be viewed as an ... Read More
Cybersecurity advice for Higher Education

Cybersecurity advice for Higher Education

Information security continues to challenge both large and small institutions alike. According to EDUCAUSE, a nonprofit association of IT leaders in higher education, information security remains the #1 issue in 2018 for the third year in a row. Perhaps this is not a surprise when you learn the education sector ... Read More
Avoid data breaches

Taking a Proactive Approach to Avoid Data Breaches

It seems like IT’s general approach to any kind of attack – which includes data breaches – is a reactive one. Think about it, in every kind of attack-related scenario – whether an external attack, an insider threat, malware infection, ransomware attack, etc. – the “business as usual” methodology is ... Read More
Loading...