Cyber Liability Insurance and MFA

Cyber Liability Insurance and MFA on both internal and remote access

| | IT Security
  Cyber insurance is driving a long overdue improvement in user access security. Multi-factor authentication (MFA) is fast becoming a requirement for all privilege and non-privilege accounts, whether users are working on the internal network or remotely. Not a requirement in previous cyber insurance renewals, cyber insurers are demanding firms ... Read More
user access for it security compliance

Addressing User Access in IT Security Compliance

| | IT Security
The risks of non-compliance are not worth taking. You face fines and even imprisonment — not to mention that non-compliance could lead to a serious data breach that might ultimately lose you clients and damage your reputation. But addressing the murky waters of compliance has never been an easy task, ... Read More
single sign on userlock

Secure SSO for Cloud Access Using Existing On-Premise Active Directory Identities

| | Company News
The new release of UserLock 11 provides secure single sign-on (SSO) for existing on-premises Active Directory (AD) identities, extending access protection to the cloud. Combined with enhanced multi-factor authentication (MFA) and remote access controls, this new release completes UserLock’s comprehensive security solution – protecting network, remote and cloud access, from anywhere. Optimal ... Read More
UserLock | Two Factor Authentication & Access Management for Windows Active Directory

RDP Gateway MFA

| | IT Security
Multi-factor authentication (MFA) for Remote Desktop Gateway and RDP connections should be very high on your security to-do list. Some or even your entire workforce might now be dispersed but their access to company networks still needs to be protected. Here we look at why a second factor of authentication ... Read More
After ransomware

Understanding the “After Ransomware” helps MSPs protect against it

| | IT Security
Today we have all unfortunately heard about this type of criminal moneymaking scheme. We know – more or less – how to catch it, what happens during the ransomware attack, but we have much less visibility on the ‘after’. It is only by understanding what happens ‘after’, do we quickly ... Read More
Two-Factor Authentication (2FA) for Windows and RDP Logons

Windows Domain 2 Factor Authentication (2FA)

| | IT Security
Windows domains and Active Directory (AD) makes it easy for administrators to control a large number of business PCs and devices from a central location. Today, a huge percentage of enterprises continue to rely on Windows domain AD to manage assets, users, systems, policies, profiles, and rights. Even after all these ... Read More
Why your VPN connections need two-factor authentication (2FA)

Why your VPN connections need two-factor authentication (2FA)

| | IT Security
Virtual private networks (VPNs) are very popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote machines and your servers, VPNs solve some very important problems. They prevent hackers from finding and entering your servers while allowing ... Read More
Session history

Windows Logon Audit Far Beyond Native Windows Security

| | IT Security
Windows logon auditing is an important activity for diverse security and compliance needs. Businesses may require a full and accurate logon audit to: perform accurate forensics demonstrate they are protecting data from unauthorized access – for regulatory compliance verify the attendance / working hours of any employee monitor specific session ... Read More
YubiKey & UserLock: Two-Factor Authentication for Active Directory Logins

Yubikey 2 Factor Authentication for Windows Logins

| | IT Security
UserLock makes it easy for a business to enable two-factor authentication on Windows accounts, managed by Active Directory. Watch how UserLock works with YubiKey – the hardware security keys manufactured by Yubico. YubiKey offers users an easy and secure second factor of authentication In addition to mobile authentication and Token2, ... Read More
windows file auditing log

Windows File Auditing Log and more with FileAudit

| | IT Security
FileAudit is an intuitive tool that simplifies native Windows file auditing log. With a simple agentless deployment, FileAudit enables IT professionals to proactively monitor access to company-sensitive files and folders stored on Windows systems in real time. Free 20 Day Trial Download of FileAudit FileAudit goes further than just logs ... Read More

Secure Guardrails