Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

6 Features for Good Internet Traffic Monitoring

on October 14, 2011

If you asked an employee what they understood by ‘monitoring Internet traffic’, they would probably say it is a simple process which is meant to ensure users do not access websites that they are not meant to visit on the company network. That’s part of the equation of course, but in reality there’s more to monitoring Internet Traffic.

Below are six main features good Internet traffic monitoring software should have:

1.     Monitoring and controlling what websites users visit

Among the many benefits of monitoring and controlling what websites users visit, one finds:

  • Protection against cyber-slacking
  • Protection against legal liability
  • Protection against malware infection

Simply put, monitoring and controlling what websites users visit is essential to a business’s well-being.

2.     Ensuring users don’t download malware

Users can come across malware in various ways. They might accidentally click on innocuous-looking websites that are infected with malware, for example. Sometimes even high-profile websites get hacked and distribute malware. There are other cases, however, where employees infect the system with malware intentionally. This could be because they would want to hack some resource they do not have access to, to play a joke on some workmate, or even out of spite – especially if they are leaving the organization on bad terms. These events can avoided when internet control software is used.

3.     Protecting users against phishing attacks

It is in an organization’s best interest to protect its employees against phishing attacks. Falling victim to a phishing attack can be devastating and troublesome. Fixing the damage caused by the attack can take a lot of time – affecting productivity. As the saying goes, prevention is better than cure. Beyond this, a phishing attack might trick an employee into disclosing confidential business information which is obviously undesirable.

4.     Controlling instant messaging

Unrestricted instant messaging (IM) can be a risk to the organization resulting in cyber-slacking, and impacting security. Files transferred through IM can be infected with malware and an employee could also leverage an IM solution to leak confidential information, such as customer lists or source codes.

5.     Controlling streaming media

Streaming media can be a source of excessive bandwidth consumption and legal liability. Controlling streaming media can cut down company costs, as well as increase performance of internet-based services such as email and legitimate web browsing. An employee streaming offensive material, such as pornographic or offensive videos, might also put your company at legal risk.

6.     Monitoring Bandwidth usage

Although monitoring bandwidth usage might seem unnecessary, especially when the above controls are taken into consideration, it does bring some advantages to the table that the other controls do not. Bandwidth usage monitoring can allow an organization to detect intrusions, malware operating on the network, and identify troublesome websites that slow down the internet operations.

Monitoring internet traffic can help an organization in several ways. It provides the organization with web security, can be used to cut down unnecessary costs, and helps detect malicious activity on the network.

 
Comments
George Kerry October 14, 20117:25 pm

People complain about internet monitoring, but it’s no different at virtually any job you go to. Someone’s gotta keep people on task, it comes with the territory. The nice thing about internet monitoring is it affects everybody. If your boss is streaming sports and music, it’s going to take bandwidth down for everybody. Delicate as it may be, they’ll understand it hurts overall productivity.

Mr_Coffee_Lover October 14, 201110:39 pm

If you’ll control instant messaging, you should also restrict the use of email. As we all know, IM and email are slowly integrating into one platform. This was started by Gtalk wherein you can simultaneously use your email and your IM accounts all at once. Yahoo Mail and Yahoo Messenger followed suit. And now, Facebook embedded its inbox and chat system all together.

Controlling streaming media is really a must these days. Internet radio and podcasting are rapidly growing, and within a few years they’re going to be a mainstream – just like FM radios. I’m not saying they’re bad, they just need to be controlled especially in workplaces.

 
Gilbert Mason October 26, 20119:36 am

I beg to differ. IM and email are not integrating each other and forming into one platform. IM is an off-shot of email. The former is the by-product of the latter. Email will be email no matter what system is integrated into it. IM is different.

I agree with controlling the use of IMs especially in a big corporate environment. Organizations can get rid of slacks and office politics if they can control all IM (Yahoo Messenger, Google Talk, Skype, etc) usage.

Did you know that most employees are now spreading office gossips through IMs? It’s not anymore through water jug stations. Just a thought…

 
KC Merks October 17, 20119:40 am

In the company I’m with right now, they have a specific rule regarding employees who are leaving: you’ll have a restricted access to the company’s network system, websites you want to visit (even if it’s part of your work), and the actual machine (PC or Mac) you’re currently using. They have this rule on their handbook, and the HR department made sure that all new and old employees understand what it means.

Even though some employees who are resigning resent this rule, it’s for the better good of the entire organization, especially these days where almost all businesses are prone to hacks and other types of internal attacks.

Sabine Lenz October 31, 20119:52 pm

Good Internet traffic monitoring encompasses several platforms – browsing the web, sending and receiving email messages, chatting through instant messengers, sending files through FTP, uploading and downloading documents, etc.

Because of this, A good Internet monitoring software should be comprehensive enough to cover all the platforms mentioned above.