Syndicated Blog

Enterprise Network Security Blog from IS Decisions
The IS Decisions Blog covers Enterprise Network Security for Windows Server and Active Directory
The world’s most searched-for cyber attacks and prevention measures

The world’s most searched-for cyber attacks and prevention measures

| | SBN News
Searches for cyber threats have seen a steady increase worldwide, particularly in the last year, proving that it’s a major concern for people all around the world. In fact, according to IBM’s ...
Scheduled report configuration

Get Quick Insights with Improved NTFS Permissions Reporting

| | Company News, IT Management
The latest FileAudit updates help make NTFS permissions reporting easy – and add the ability to migrate or archive your database.   You want quick insights into access rights across the entire file ...
Stand Down, Marketers: Zero Trust is Not a Product

Stand Down, Marketers: Zero Trust is Not a Product

| | IT Security
Thanks to relentless marketing, Zero Trust is quickly turning into another buzzword. It’s time security professionals claim to the term. Once and for all: Zero Trust is not a product, it’s a ...
UserLock Web App

Simplify MFA & Session Management With the New, Intuitive UserLock Web App

| | Company News
The UserLock Web App allows IT teams to easily, quickly monitor, respond to, and report on MFA and network session activity – from anywhere. Now available in UserLock 11.2, the UserLock Web ...
Salesforce MFA requirements via SSO with Active Directory

Meet Salesforce MFA Requirements via SSO With Active Directory Identities

| | IT Security
This article explains how UserLock can deliver SSO and MFA access to Salesforce from anywhere for on-premise Active Directory identities. In response to the global threat landscape, Salesforce now requires multi-factor authentication ...
recovering data from fire and water damaged hard drive

Master Your Data Lifecycle to Improve Data Security

| | IT Security
  A data lifecycle is hard to pin down. Depending on your industry or profession, what makes up a data lifecycle can vary widely. For example, Harvard Business School claims there are ...
Potential insider threat indicators

Is It Paranoia If It’s Real? Know These Insider Threat Indicators

| | IT Security
“Just because you’re paranoid doesn’t mean they’re not out to get you.” More than just a great Nirvana lyric, this also sounds like an apt mantra for modern-day cybersecurity. Because if administrators ...
Why Using SMS Authentication for 2FA Is Not Secure

Why Using SMS Authentication for 2FA Is Not Secure

| | IT Security
Two-factor authentication (2FA) is now a part of daily life, and most of us have had first-hand experience with SMS authentication. You enter your password, then you get a prompt to enter ...
Multi Factor Authentication in a Holistic Context

Multi Factor Authentication in a Holistic Context

| | IT Management
  The following is a guest post from Techni Team, an ICT-Full-Service Provider and the distributor for UserLock in the Netherlands. As many of you are aware, that when it comes to protecting ...
Stop the Frustration of Unchecked Access to Files and Folders

Stop the Frustration and Risk of Unchecked Access to Files and Folders

| | IT Security
Following the recent updates to FileAudit, we discuss how automated responses to file moves, deletions and other access events can help SMBs, and the MSPs that service them, protect sensitive data from ...