<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Talk Tech To Me - GFI Blog &#187; Jeremy Pullicino</title>
	<atom:link href="http://www.gfi.com/blog/author/jeremy-pullicino/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 16:51:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>What Principles to Consider when Optimizing Web Security</title>
		<link>http://www.gfi.com/blog/what-principles-to-consider-when-optimizing-web-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-principles-to-consider-when-optimizing-web-security</link>
		<comments>http://www.gfi.com/blog/what-principles-to-consider-when-optimizing-web-security/#comments</comments>
		<pubDate>Mon, 24 Oct 2011 14:00:13 +0000</pubDate>
		<dc:creator>Jeremy Pullicino</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[TTTM]]></category>
		<category><![CDATA[cyber slacking]]></category>
		<category><![CDATA[malicious websites]]></category>
		<category><![CDATA[web filtering]]></category>
		<category><![CDATA[web monitoring]]></category>
		<category><![CDATA[web security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3570</guid>
		<description><![CDATA[In order to optimize the organization’s web security strategy, businesses should invest in good web filtering and web monitoring software, complementing the other security solutions they may have. Web filtering does to your organization what a mosquito net does to &#8230;]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.gfi.com/blog/wp-content/uploads/2011/10/web-security-web-monitoring-web-filtering.jpg"><img class="alignright size-medium wp-image-3571" style="border: 0px solid black; margin: 10px;" title="web-security-web-monitoring-web-filtering" src="http://www.gfi.com/blog/wp-content/uploads/2011/10/web-security-web-monitoring-web-filtering-300x222.jpg" alt="" width="300" height="222" /></a>In order to optimize the organization’s web security strategy, businesses should invest in good web filtering and web monitoring software, complementing the other security solutions they may have.</p>
<p>Web filtering does to your organization what a mosquito net does to your skin &#8211; it keeps the bugs away whilst allowing air to pass through. The trick to effective web filtering is to carefully tune the list of websites on the whitelist, and those on the blacklist. A good web filter can do this balancing act automatically and constantly by feeding off information kept on global servers that are monitoring the Internet in real-time, looking for new emerging threats. Most web filters will also allow companies to customize what is on the whitelist and blacklist and will be able to filter out websites based on lists of keywords.<span id="more-3570"></span></p>
<p>Web filtering will give both the business and its employees several benefits. Employees are prone to click on innocuous-looking malicious websites. These websites inject malicious code into the user’s browser which, in turn, can infect the user’s entire computer – transforming it into anything from a mad spam spewing machine to an infected zombie PC listening for commands from a hacker on the other side of the world. This type of attack is often called a “drive-by download” and affects all browsers on all operating systems, so nobody is safe. Web filtering increases the web security for your organization by blocking any site that delivers malware in this way.</p>
<p>Web filtering is then complemented by web monitoring in two ways. First of all, it keeps track of the websites that actually do make it through the filters. These websites are generally legitimate; however they might still violate the company policy and must therefore be tracked. Secondly, web monitoring involves the analysis of the Internet usage patterns of your users. This will help you identify cyber-slackers, or people who are exchanging too much information with external websites.</p>
<p>By eliminating cyber-slacking, companies benefit from an increase in productivity. These days it is very common that unsupervised employees spend many hours engaged on social networking or gaming sites during work hours. By monitoring Internet usage instead of blocking it, employees can do their jobs without unnecessary restrictions that can be counterproductive. Monitoring allows more freedom and flexibility for an organization and does not need to be intrusive. Good web monitoring software can generate powerful reports allowing you to see a graph of your entire company. In this way you can identify the biggest time-wasters and adjust your web filters to block them.</p>
<p>Web filtering and web monitoring are clearly very important to enforce web security in your company, giving benefit both to the business and to employees.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/what-principles-to-consider-when-optimizing-web-security/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>3 Compelling Reasons to Implement Network Internet Control</title>
		<link>http://www.gfi.com/blog/3-compelling-reasons-implement-network-internet-control/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=3-compelling-reasons-implement-network-internet-control</link>
		<comments>http://www.gfi.com/blog/3-compelling-reasons-implement-network-internet-control/#comments</comments>
		<pubDate>Tue, 11 Oct 2011 14:00:00 +0000</pubDate>
		<dc:creator>Jeremy Pullicino</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[Bandwidth Hogging]]></category>
		<category><![CDATA[cyber slacking]]></category>
		<category><![CDATA[Malicious Conten]]></category>
		<category><![CDATA[Network Internet Control]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3511</guid>
		<description><![CDATA[Having network Internet control in place is a must for any business to run smoothly. The Internet is an essential tool for most of your employees, so blocking it off completely is not an option. Instead you should implement proper &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-3512" style="margin: 10px; border: 0px solid black;" title="3 Reasons for Network Internet Control" src="http://www.gfi.com/blog/wp-content/uploads/2011/10/3-Reasons-for-Network-Internet-Control-300x200.jpg" alt="" width="300" height="200" />Having network Internet control in place is a must for any business to run smoothly. The Internet is an essential tool for most of your employees, so blocking it off completely is not an option. Instead you should implement proper network Internet control to prevent the following threats: bandwidth hogging, cyber-slacking and risks associated with malicious content.<span id="more-3511"></span></p>
<p><strong>1. Bandwidth      Hogging</strong></p>
<p>Recently I was at a client who was having issues with his Internet bandwidth. Every morning access to the Internet would slow down to a crawl but then improve in the afternoon. After a short period of network monitoring I discovered that his part-time secretary would turn on an Internet radio station during her morning shift and saturate the already limited bandwidth that was available. This scenario is very common in businesses and is aggravated when numerous employees decide to use streaming content. Content such as YouTube videos and online radio are bandwidth-hungry and can easily eat up bandwidth. This can have an effect on the entire company because critical systems could be impacted while other employees who need Internet access may not be able to do so effectively.</p>
<p>When implementing network Internet control, be sure to select a solution that is capable of distinguishing between streaming content and other traffic. This will allow you to selectively block traffic based on its bandwidth requirements.</p>
<p><strong>2. Cyber-Slacking</strong></p>
<p>The Internet is a great tool but it is also a temptation and employees will always find an excuse to waste time online instead of doing their job. Social networks, news portals and entertainment web sites, can waste many hours of your employees’ time; furthermore Instant Messaging (IM) can continuously disrupt their workflow throughout the day.</p>
<p>To counter this, you should have strict network Internet control policies – however this may come at a price. Tight Internet controls can hinder productivity for some employees who need unrestricted access for particular jobs. To strike a balance, some Internet control software packages should offer a feature called “Soft Blocking” that will allow you to over-ride block policies for certain trusted users or groups.</p>
<p>To counter the threat of IM clients, make sure you select a solution that is IM client aware. This will enable it to distinguish between normal Internet traffic and IM client conversations, and selectively block this type of communication.</p>
<p><strong>3. Malicious      Content</strong></p>
<p>In a perfect world you might be able to trust all your employees and allow them to surf the net without restrictions. In a perfect world employees will be careful not to hog bandwidth, nor waste time nor chat with friends instead of working. In a perfect world, network Internet control would still be a requirement. While you could trust your employees, you can never trust the websites they visit.</p>
<p>The web is a dangerous place for the unwary. Malware is rife and comes in many forms: viruses, Trojans, worms, spyware, key loggers and other malicious content. A recent study found that over 60,000 new malware strains are released into the wild every single day, making your employees more vulnerable than they have ever been before when browsing the Internet.</p>
<p>Good network Internet control software will automatically blacklist any website that is found serving malicious content. It does this by tracking new threats in real-time and keeping your blacklist updated so that you do not need to intervene manually.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/3-compelling-reasons-implement-network-internet-control/feed/</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>5 Ways Employees Steal Data</title>
		<link>http://www.gfi.com/blog/5-ways-employees-steal-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-ways-employees-steal-data</link>
		<comments>http://www.gfi.com/blog/5-ways-employees-steal-data/#comments</comments>
		<pubDate>Mon, 22 Aug 2011 14:00:45 +0000</pubDate>
		<dc:creator>Jeremy Pullicino</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[information leak]]></category>
		<category><![CDATA[Leak Vector]]></category>
		<category><![CDATA[theft]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3444</guid>
		<description><![CDATA[Companies are building vast databases of information which need to be protected against hackers, viruses, natural disasters and other threats. In this post I talk about the biggest threat of them all: your trusted employees. Your employees have many reasons &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-3445" style="margin: 10px; border: 0px solid black;" title="employee stealing data" src="http://www.gfi.com/blog/wp-content/uploads/2011/08/employee-stealing-data-300x200.jpg" alt="" width="300" height="200" /></p>
<p>Companies are building vast databases of information which need to be protected against hackers, viruses, natural disasters and other threats.</p>
<p>In this post I talk about the biggest threat of them all: your trusted employees.</p>
<p>Your employees have many reasons to steal your data. They might be planning to move to a competitor or begin their own venture in your market, or they could be bribed by a third party who has interest in your company’s secrets.</p>
<p>Knowing the methods and tricks they use to steal data can help you stop a major information leak before it happens. Below I describe the five most common leak vectors that any company should protect against.<span id="more-3444"></span></p>
<p><strong><em>Leak Vector 1 &#8211; The Internet</em></strong><strong><br />
</strong></p>
<p>The Internet is the biggest hole in your defenses against information leaks. Employees who have access to the Internet can transmit data files to computers outside of your private network. There are a lot of applications that facilitate the transfer of data files over the Internet. These applications should be blocked, restricted or monitored.</p>
<p>Email: Users can send files as attachments to any public mailbox.</p>
<p>Websites: Many websites allow file uploads through the HTTP POST method.</p>
<p>Peer to peer: P2P protocols were designed for fast file transfer amongst vast amounts of users. In fact, these technologies are still the preferred choice for the illegal sharing of songs, movies and digital books.</p>
<p>File Transfer Protocol: As its name implies, FTP facilitates the transfer of files and is supported by many major browsers such as Internet Explorer.</p>
<p>Instant Messaging: IM protocols such as MSN Messenger, Skype and Google Talk allow for the transfer of files to online chat buddies anywhere in the world.</p>
<p><strong><em>Leak Vector 2 &#8211; The SneakerNet</em></strong></p>
<p>The Pentagon had countless virus outbreaks on their internal computers caused by unsafe Internet browsing. To ward off the problem they disconnected their LAN from the Internet. A few weeks later they suffered a large virus outbreak. An investigation found that an infected USB drive introduced the virus. The USB virus was transferred over the SneakerNet, a network created by human beings walking around in sneakers.</p>
<p>In order for this network to function, a storage medium needs to be available. CDs and DVDs are popular because they are cheap, easily available and inconspicuous. USB drives and SD cards are very dangerous because they are very fast and can store large amounts of data. They are also very small and easy to conceal. Mobile phones also pose a threat. They can record conversations, take video and relay information over the Internet using the cellular network. Laptops are also dangerous and are often taken in and out of the premises freely.</p>
<p><strong><em>Leak Vector 3 &#8211; Physical Theft</em></strong></p>
<p>The digital world is not the only one where you must watch your back. Theft is rampant in the real, physical world. Employees can print or photocopy documents and take them off-site. Physical files can also be taken out of cabinets, and the more technically inclined can pull out hard disks from computers, steal backup tapes or even entire computers!</p>
<p><strong><em>Leak Vector 4 &#8211; Radio Frequency Networks</em></strong></p>
<p>RF networks drive all wireless communication including WiFi, Bluetooth and cellular networks. These days RF devices are very common in smartphones, which can communicate over several RF technologies at the same time. Modern WiFi network devices are increasing their range drastically and the 3G network allows data transfer from almost anywhere.</p>
<p><strong> </strong></p>
<p><strong><em>Leak Vector 5 &#8211; Their own minds</em></strong></p>
<p>Last, but not least is the knowledge your employees have acquired whilst working with your company. If an employee was involved in the design of a new product, he has inadvertently gained knowledge that he can replicate elsewhere. Whilst there is no true defense against this type of threat, it pays to treat key employees well to reduce the chances of them becoming disgruntled and taking off with your company secrets!</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/5-ways-employees-steal-data/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>5 Tips to Ensure Corporate Email Compliance</title>
		<link>http://www.gfi.com/blog/5-tips-ensure-corporate-email-compliance/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-tips-ensure-corporate-email-compliance</link>
		<comments>http://www.gfi.com/blog/5-tips-ensure-corporate-email-compliance/#comments</comments>
		<pubDate>Tue, 16 Aug 2011 14:00:04 +0000</pubDate>
		<dc:creator>Jeremy Pullicino</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[Company Policy]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[email compliance]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3435</guid>
		<description><![CDATA[A competent technical manager knows that his company needs to adhere to email compliance laws and regulations. Compliance however, is not easy! There is literally an alphabet soup of laws and regulations &#8211; the SOX, HIPAA, GLB and others. In &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-3437" style="margin: 10px; border: 0px solid black;" title="shutterstock_70375231" src="http://www.gfi.com/blog/wp-content/uploads/2011/08/shutterstock_70375231-205x300.jpg" alt="" width="205" height="300" />A competent technical manager knows that his company needs to adhere to email compliance laws and regulations. Compliance however, is not easy! There is literally an alphabet soup of laws and regulations &#8211; the SOX, HIPAA, GLB and others.</p>
<p>In this post I offer five tips that you can use to avoid all of the common pitfalls that every technical manager, CTO or CIO has to deal with.<span id="more-3435"></span></p>
<p><strong>1. Understand Compliance</strong></p>
<p><strong> </strong></p>
<p>You need to understand the compliance laws that affect your country or state. The two major laws are the Sarbanes-Oxley Act (SOX) and the Health Insurance Portability and Accountability Act (HIPAA). Email regulations also exist in the Gramm-Leach-Bliley Act (GLB), Securities and Exchange Commission laws (SEC 17a) and the National Association of Securities Dealers (NASD 3010).</p>
<p>You should find out which laws apply to your industry. The medical and financial sectors tend to have more laws and compliance is very rigorous. In the e-commerce markets, laws tend to change very quickly and country boundaries are blurred, adding to the challenges.</p>
<p>Breaking the regulations can involve imprisonment in some cases, or very large fines in others, giving companies no choice than to strictly adhere to whatever compliancy laws are put into place.</p>
<p>The major requirements of all compliancy are email retention (email stored for a period of time), and email extraction (email can be pulled from the archive upon request).</p>
<p><strong> </strong></p>
<p><strong>2. Have a good Company Policy</strong></p>
<p><strong> </strong></p>
<p>A company policy sets down the rules that govern the organization. A good company ensures that its employees are trained in the areas that affect them. This improves their performance and helps them understand their responsibilities.</p>
<p>Policy sections that deal with emails and messaging should include information on which parts other relevant laws are being applied in the organization. Users should know which devices and are allowed and which ones are forbidden, and they should be told what kind of personal information is being retained.</p>
<p><strong>3. Personal email accounts</strong></p>
<p><strong> </strong></p>
<p>It is very common these days for employees to have at least two accounts; their corporate account, and their personal account. These accounts could pose a threat to your organization. It is vital that all communication that is related to the organization is only expressed over the company’s approved email accounts because these are the ones covered by the policy.</p>
<p>There is an increasing trend for employees to use their corporate email accounts from their personal mobile devices. In this case you need to ensure compliance of how the device is configured and used.</p>
<p><strong>4. Tools and Services for Compliancy</strong></p>
<p><strong> </strong></p>
<p>There is a lot of software as well as services out there that should be used to satisfy the technical requirements for compliance. When selecting email technologies and tools it is important to see which laws and regulations they cover, and whether they cover them adequately. Good email archiving software should conform too many of the email compliance standards, but in some particular situations not all packages will suit your needs, so make sure you read the software specifications before you buy.</p>
<p>Regulation compliance is also being offered as a service where your email traffic is archived in the cloud. When choosing these services, be diligent to where your data is hosted and the amount of control you have over it.</p>
<p><strong>5. Continuous Compliance</strong></p>
<p><strong> </strong></p>
<p>Email compliance is a moving target. It is not enough to set it up once and forget about it. You need to continuously monitor and upgrade your email systems. Each time there is a change, compliance can be affected. New employees also need to be trained on company policies, and when policies change, existing staff need to know about the changes. Remain up to date on the latest trends in technology and keep an eye out for new trends that can affect your state of compliance.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/5-tips-ensure-corporate-email-compliance/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Why do you need effective web content filtering?</title>
		<link>http://www.gfi.com/blog/web-content-filtering/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=web-content-filtering</link>
		<comments>http://www.gfi.com/blog/web-content-filtering/#comments</comments>
		<pubDate>Mon, 04 Jul 2011 16:29:04 +0000</pubDate>
		<dc:creator>Jeremy Pullicino</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[SMB Zone]]></category>
		<category><![CDATA[employee productivity]]></category>
		<category><![CDATA[internal network]]></category>
		<category><![CDATA[liability]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[web content filtering]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3410</guid>
		<description><![CDATA[In the early days of web content filtering it was enough to configure a firewall to block certain sites from being accessed. An SME would maintain a blacklist of forbidden sites and update that list from time to time. This &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-3411" style="margin: 10px; border: 0px solid black;" title="web content filtering" alt="" src="http://www.gfi.com/blog/wp-content/uploads/2011/07/web-content-filtering-200x300.jpg" width="200" height="300" />In the early days of web content filtering it was enough to configure a firewall to block certain sites from being accessed. An SME would maintain a blacklist of forbidden sites and update that list from time to time. This method did not offer deep packet inspection and only filtered Internet access based on a domain name.</p>
<p>A modern and effective web content filtering solution scans more than the domain name. It is able to break down and analyze web traffic making it capable to accurately pinpoint portions of a web page which should not be allowed into the internal network.</p>
<p>An effective web content filtering solution is essential for an SME because granting your employees unfettered access to the Internet opens your company to a multitude of problems.<span id="more-3410"></span></p>
<p>The main ones that I wish to point out are the following:</p>
<p>●        Security: Grave risk to the companies’ security.</p>
<p>●        Legal Trouble: Liability of inappropriate content.</p>
<p>●        Productivity: Loss of employee productivity due to Internet abuse.</p>
<p><strong>Security</strong></p>
<p>With the advent of Web 2.0 technologies, websites are now mash-ups of content that is aggregated from many other sites. This scenario adds complexity to filtering websites based on domain names alone and also opens up new avenues of attack for hackers and virus writers who are becoming increasingly successful at compromising syndicated feeds. If just one feed of data is compromised, all the websites that pull in that feed will deliver malicious code to their trusted users.</p>
<p>An effective content filtering solution will judge incoming web data based on its content and not its source alone. Malicious content that is smuggled into trusted sites will still be detected and filtered out, thus protecting the internal network.</p>
<p><strong>Inappropriate Content</strong></p>
<p>Companies can be liable for the data that is transferred into their internal networks and servers. In an ideal world, you should be able to trust all your employees that they will only use the Internet for the jobs they do. The reality is unfortunately very different, and one single rogue user’s actions can create serious legal problems if his or her actions are not monitored. Pornography at work and downloading of copyrighted materials are a real and dangerous threat to an SME.</p>
<p>If a good web content filtering solution is in place, an SME is protected against this type of threat. Pornography and copyrighted material is blocked using standard filters. A web content filtering solution from a trusted vendor will also protect you legally because it shows your commitment to stopping this type of crime in your workplace.</p>
<p><strong>Employee Productivity</strong></p>
<p>A security breach due to lack of web content filtering will undoubtedly affect your employee productivity; however, an ineffective or badly configured web content filter can also have a negative effect on productivity if it blocks legitimate content that is needed by your employees to do their job.</p>
<p>A good web content filter acts very much like a sieve. Legitimate data should fall through the filter whilst bad data should be stopped. This means that a requested web page with some forbidden content will still load, but with some bits missing. This will allow the user to get the parts of the web page that are needed whilst remaining protected.</p>
<p>To recap, web content filtering will directly affect three important issues that all SMEs face:</p>
<p>●        System Security</p>
<p>●        Illegal Content</p>
<p>●        Employee Productivity</p>
<p>Having an effective web content filtering strategy that aligns itself with your <a href="http://www.gfi.com/internet-monitoring-software?adv=13558&amp;loc=14">internet monitoring software</a> will ensure that you are protected from a security and legal standpoint and will improve the productivity of your work force.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/web-content-filtering/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Monitoring Internet Usage in the Workplace</title>
		<link>http://www.gfi.com/blog/monitoring-internet-usage/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=monitoring-internet-usage</link>
		<comments>http://www.gfi.com/blog/monitoring-internet-usage/#comments</comments>
		<pubDate>Thu, 09 Jun 2011 12:14:25 +0000</pubDate>
		<dc:creator>Jeremy Pullicino</dc:creator>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Tech Zone]]></category>
		<category><![CDATA[internet monitoring]]></category>
		<category><![CDATA[Internet usage]]></category>
		<category><![CDATA[monitoring Internet usage]]></category>
		<category><![CDATA[productivity]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3318</guid>
		<description><![CDATA[Most employees require full Internet connectivity in order to work productively. Opening the Internet to employees can come at a large cost however &#8211; if Internet usage is not monitored, employees can make bad use of it to the detriment &#8230;]]></description>
				<content:encoded><![CDATA[<p><img class="alignright size-medium wp-image-3319" style="margin: 10px; border: black 0px solid;" title="Internet usage monitoring improves productivity and security" src="http://www.gfi.com/blog/wp-content/uploads/2011/06/Internet-usage-monitoring-improves-productivity-and-security1-200x300.jpg" alt="" width="200" height="300" />Most employees require full Internet connectivity in order to work productively. Opening the Internet to employees can come at a large cost however &#8211; if Internet usage is not monitored, employees can make bad use of it to the detriment of the company. <a href="http://www.gfi.com/blog/reasons-monitor-internet-usage-organization/">Monitoring Internet usage</a> is an essential activity for small to medium-sized enterprises (SMEs). In this article I will discuss what I think are the two major problems associated with bad Internet usage – loss of productivity and danger to your security – and will explain how monitoring Internet usage can solve these issues.</p>
<p> <span id="more-3318"></span></p>
<p><span style="text-decoration: underline;">Productivity</span></p>
<p>With social media sites like Facebook and Twitter which can be a great marketing tool for companies, the Internet can be seen as a blessing for businesses. Yet these sites can also be a huge time-drain for employees as they constantly feed users with new distractions that can easily get people hooked. Organizations are often tempted to simply block certain domains from being accessed, however this might not be necessary if a good Internet usage monitoring policy is in place.</p>
<p>Recently a client of mine was unhappy with sales performance from satellite offices so we blocked all social media sites because employees were spending too many hours on Facebook instead of preparing quotations for customers. Surprisingly after blocking these sites, productivity decreased further and sales never picked up. It became apparent that morale of employees dropped when they were denied social interaction. In light of this we implemented an Internet usage monitoring policy and told employees they were allowed up to one hour a day on Facebook during certain hours. This strategy worked; employees were more productive and motivated and their managers were able to reprimand those who did not stick to the rules.</p>
<p><span style="text-decoration: underline;">Security</span></p>
<p>When dealing with security we need to consider two things – preventing a security incident from happening, and being able to investigate an incident if it does happen.</p>
<p>When monitoring Internet usage, detecting a security breach early becomes much easier. Viruses and other intrusions generate irregular patterns of Internet activity that can be detected by Internet usage monitoring. This allows you to stop an incident early, contain the damage and reduce the impact of the breach. Another threat comes from so-called “drive-by-downloads” which are malicious scripts that infect a user’s computer with a virus when an infected website is visited. If these websites are properly monitored the likelihood of this happening is reduced.</p>
<p>Despite all the security you implement, security breaches will still happen. Trusted employees might access prohibited sites or download malicious code, sometimes intentionally and sometimes accidentally. Having an Internet monitoring system in place will allow you to investigate these breaches, find the root cause and determine who was responsible. Without monitoring Internet usage this would be a daunting task.</p>
<p> </p>
<p>Having an Internet usage monitoring policy in place is a great deterrent. Employees who know that you are monitoring Internet usage are much less likely to abuse of the Internet freedoms they are granted. When you chose to implement Internet usage monitoring, make sure that you make your employees aware of the system and educate them on how to use the Internet responsibly. This will decrease loss of productivity and keep your internal network secure.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.gfi.com/blog/monitoring-internet-usage/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:18:23 by W3 Total Cache --