Results
No result found.
Compliance
- Compliance
History of the PCI DSS standard: How to become and stay compliant
Learn the history of the PCI DSS standard, how it came to be, how it's changed, and what tomorrow will bring.
Read - Compliance
MFA for Cyber Essentials Certification
Learn about the role of multi-factor authentication (MFA) in Cyber Essentials certification, and how UserLock can help your organization meet the MFA requirement.
Read - Compliance
CMMC compliance: MFA to strengthen security in the U.S. defense sector
Explore CMMC compliance for the U.S. defense sector, the role of MFA in CMMC compliance, as well as the challenges of implementing MFA for CMCC compliance.
Read - Compliance
What is TISAX: Here’s what you need to know about TISAX certification
Looking to understand the TISAX label and why TISAX certification is a key standard for the automotive sector? Read this guide.
Read - Compliance
A guide to the FTC Safeguards Rule’s FTC MFA requirement
The FTC MFA requirement is part of the latest FTC Safeguards Rule update. Here's what you need to know about compliance.
Read - Compliance
HIPAA multi factor authentication & technical safeguards
With medical data breaches on the rise, HIPAA multi factor authentication (MFA), access management and audit controls are a must for healthcare organizations. Here's what you need to know about protecting sensitive healthcare information.
Read - Compliance
Does meeting compliance include file servers?
Because applications run on, or utilize file servers and users put data data directly on them, some of your file servers will need your compliance efforts.
Read - Compliance
The role of file auditing in compliance
Learn how file auditing can help you meet compliance objectives, secure your data on Windows and cloud servers, and avoid costly penalties.
Read - Compliance
Why compliance starts with login security
Login security is the first step towards meeting compliance requirements across major data security standards.
Read - Compliance
HIPAA access control: The key to keeping patient data safe
With UserLock, healthcare organizations can meet HIPAA access control requirements and achieve HIPAA compliance around users' network access control — keeping patient data safe.
Read - Compliance
A failure to enforce unique employee logins for ISO 27001 compliance
A key element of ISO 27001 compliance is unique employee logins. The legal and law enforcement sector risks compliance and security issues by failing to provide and enforce unique employee logins.
Read - Compliance
How HIPAA technical safeguards are key to compliance
Learn how to meet HIPAA technical safeguards requirements with UserLock and FileAudit.
Read - Compliance
How to meet HIPAA's unique user identification requirement in a Windows System
HIPAA's unique user identification requirement is a key part of the HIPAA access control requirements in the HIPAA security rule. Here's how UserLock allows you to uniquely identify users in Windows systems.
Read - Compliance
PCI control over access: 4 steps to compliance
By providing visibility and control of corporate access and data, IS Decisions software solutions help you ensure PCI DSS compliance.
Read - Compliance
HIPAA compliance network security for Windows Active Directory
Learn how to meet HIPAA compliance network security by securing network and file access in Windows Active Directory.
Read - Compliance
FISMA compliance: Key security requirements
Read on for an overview of FISMA compliance and learn how UserLock and FileAudit are recognized as efficient software solutions for 3 key NIST 800-53 control families.
Read