Mitigating the Top 5 Threats to Your Business

Similar documents
How To Keep Your Employees Focused On Work

Internet Monitoring Versus Web Filtering

White Paper. Internet Monitoring Versus Web Filtering

Social Media and Content Marketing. A Guide for B2B Marketing Managers

Fireside Script. [INSERT VIDEO #4 WHAT KIDS ARE DOING/USING at

iiiiiiiiiiiiiiiiii iiiiiiiiiiiiiiiiii

National Cybersecurity Awareness Campaign. Kids Presentation

Copyright LisaCashHanson.com

National Cyber Security Month 2015: Daily Security Awareness Tips

INSTANT MESSAGING SECURITY

Creating a Great Video Testimonial

Monitor All Employee Activity Across PCs, Laptops & the Internet

Reputation Marketing

7 Reasons You Need a Social Media Manager Right Now!

Set internet safety parental controls with Windows

The Impact of Anonymous Proxies In Education

Digital Marketeers combines slick video production, highly target marketing and lead follow up services in a single BUSINESS GENERATOR PACKAGE.

This document has been produced following a request from the Hft National Speak Out Group for help with staying safe when using the internet.

Protect your business. with web security ControlNow TM Whitepaper

How To Behave At A School

Helping to keep your children safe online

Security and Employee Monitoring Security and

Sibford School Student Computer Acceptable Use Policy

WHITE PAPER WHAT HAPPENED?

2010 Middle School Internet Safety Survey Results

Organizational Policy

Staying Safe Online. A Practical Guide for Parents and Children.

mbackup 1.0 User's Guide

FIVE WAYS TO MAKE YOUR SUPPLY CHAIN MORE DYNAMIC

The Start Learning Joomla Video Companion Guide. Table of Contents

DEVELOPING A SOCIAL MEDIA STRATEGY

Nomadic Mattʼs Travel Planning Check List

Easy $100-$150 per Day with CPA offers

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

C-SAVE. Scenario #1 Jake and the Bad Virus. The two major C3 concepts this scenario illustrates are:

How to Use Windows Firewall With User Account Control (UAC)

AUP COMPLIANCE. Auditing the AUP compliance. by using a non-invasive surveillance solution.

STOP. THINK. CONNECT. Online Safety Quiz

4 Keys to Successful Project Collaboration & Execution

Becoming Proactive in Application Management and Monitoring

AVeS Cloud Security powered by SYMANTEC TM

YOUNG PEOPLE, MUSIC & THE INTERNET

NETREPS: MANAGING YOUR ONLINE REPUTATION

Pacific Northwest University of Health Sciences

Refog. Maxim Ananov, REFOG Help Desk

Sexual Harassment. Managers and supervisors can be named in that complaint if they failed to prevent or respond to the situation.

CYBERSAFETY USE AGREEMENT for Cambridge High School Students

Measuring Remote Employee Productivity

Social networking at work: Thanks, but no thanks?

The Effortless English Club. Club Leadership Manual

Would You Like To Earn $1000 s With The Click Of A Button?

Hint: Best actions: Find out more in videos and FAQ: Hint: Best actions: Find out more in videos and FAQ:

Front Range Christian School ipad Acceptable Use Policy

Sideways Spanish Transcript. Why Spanish Verb Charts Cause Failure and How to Fix It so Anyone at Any Age Can Speak Spanish

The importance of an Acceptable Use Policy

WELB YOUTH SERVICE INTERNET AND ACCEPTABLE COMPUTER USAGE POLICY

Google Lead Generation for Attorneys

BROADALBIN-PERTH CENTRAL SCHOOL ADOPTED 1/22/00 3 RD READING AND ADOPTION 5/21/12. Employee Computer Use Agreement. Terms and Conditions

WSI White Paper. Prepared by: Baltej Gill Social Media Strategist, WSI

Marketing Methods

Meeting Management - Someone s Got to Do It Thomas J. Shepstone

Employee Internet Usage February 15, 2007

FAMILY GUIDE TO. Mobile Safety. How to keep your children safe and connected in today s mobile world SPONSORED BY:

7 Secrets To Websites That Sell. By Alex Nelson

12Planet Chat end-user manual

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

Internet Filtering and Monitoring In your Business

SOCIAL NETWORKING SITES

INFORMATION TECHNOLOGY ACCEPTABLE USE & CYBER-SAFETY POLICY

Change your perspective of work

Media converging in the palm of your hand

High Speed Internet - User Guide. Welcome to. your world.

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

HEATHFIELD HIGH SCHOOL INFORMATION TECHNOLOGY ACCEPTABLE USE POLICY

Case study: What the? Online scams and identity theft

Welcome. Thank you for choosing Cogeco High Speed Internet.

Getting a head start in Software Asset Management

Annual HIPAA Security & Information Security Competency

Using Social Networking Safely. A guide for professionals working with young people

Guidelines for Preventing and Dealing with Bullying Issues

Common Facebook issues

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

Protecting Your Network Against Risky SSL Traffic ABSTRACT

SETTING UP AN INSTANT MESSAGING SERVER

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

What is Prospect Analytics?

Acceptable Use of ICT Policy. Staff Policy

Acceptable Use Policy for Technology Catholic Schools of the Diocese of Brooklyn

Directors' & Officers' Liability

Getting Started Guide

Reduce Your Network's Attack Surface

7 Biggest Mistakes in Web Design 1

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Melville Primary School. Bring Your Own ipad Connectable Device Program Usage Policy and Information for Parents and Students

Copyright (c) 2015 Christopher Small and The Art of Lawyering. All rights reserved.

Guideline on Windows 7 Parental Controls

CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910

Web Protection for Your Business, Customers and Data

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

Calwell High School Acceptable Use of ICT and Bring Your Own Device (BYOD) Guidelines & Agreement

Transcription:

Mitigating the Top 5 Threats to Your Business 1.888.598.2788 www.spectorsoft.com

When your employees think that theyʼre acting anonymously, and that their actions have no personal consequences, theyʼre liable to do anything including finding a way around your filtering software. Mitigating the Top 5 Threats to Your Business Most business leaders know to focus on certain specific threats to their business. You keep an eye on overhead costs, for example, so that they donʼt eat up your profit margin. You think about disasters, and how your business might survive during a power outage or a major event like a flood. You make sure youʼve got all the right liability and workerʼs compensation insurance. You hire a pest control firm to deal with insects, and a plumber to keep the water flowing in the restrooms. But most businesses completely overlook five of the biggest threats to productivity, to stability, and to legality. Overlooking these threats can even in a small business cost upwards of half a million dollars a year. Not dealing with these threats can land you in court with all of the costs that implies. Ignoring these threats can wipe out your competitive advantages and literally hand your most important business assets to your competition. These threats all stem from one source: your employees. Half the time, theyʼre not even creating these threats maliciously they just donʼt stop to think about what theyʼre doing. Threat 1: Harassment Lawsuits Not everyone thinks that every joke is funny, and when borderline humor starts making its way through your companyʼs email and instant messaging systems, you become the butt of the joke. When jokes contain racial slurs, sexual humor, or other inappropriate content, itʼs your duty to put a stop to it immediately, and to provide appropriate discipline and sensitivity training to the perpetrators. Failure to act swiftly and appropriate can make you and your business just as liable as the jokesters. The same applies to employees who visit an inappropriate website. Sure, just looking at a website doesnʼt harm anyone until someone else catches a glimpse over the offending employeeʼs shoulder. Most companies try to address this problem via filtering software. The problem is that inappropriate comments and websites spring up and evolve faster than filtering software can keep up. When your employees think that theyʼre acting anonymously, and that their actions have no personal consequences, theyʼre liable to do anything including finding a way around your filtering software. And when they find a way, and inevitably offend someone elseʼs sensibilities, it isnʼt your filtering software that ends up on the chopping block. Itʼs you, and your business. Threat 2: Loss of Information 2 Mitigating the Top 5 Threats to Your Business In todayʼs competitive marketplace, every piece of information is critical. Your employees, of course, have access to a great deal of confidential information. Theyʼre excited about what they do for a living, and theyʼre excited about what the company is about to do. Sometimes they just canʼt resist sharing a little perhaps leaking a rumor onto an Internet message board about an upcoming product launch, or providing just a bit too much detail when sending an email, or

confessing insider information over a chat message. Sometimes it isnʼt the information itself thatʼs a problem, but the timing, such as employees who discuss upcoming product and service plans during legally mandated quiet periods. In the end, of course, youʼre the one who pays the price. Once the information is out there, itʼs out there, and youʼll spend an infinite amount of time trying to track down who was responsible. Thatʼs especially true when employees use Internetemail accounts. You simply donʼt have an audit trail for those activities, making it incredibly difficult to track down the perpetrator and deal with the problem. Once again, many breaches of this kind arenʼt intentionally malicious your employees just arenʼt always armed with good decision-making skills, they get a little overexcited, and they let slip something that they shouldnʼt have. Itʼs the easy access, and the lack of personal consequences, that makes employees simply not think when theyʼre wasting time Threat 3: Wasted Time Letʼs say your average employee makes $60,000 per year. They sit in front of a computer for most of the day, and quite frankly they get a little bored. A little Facebook time here, a few minutes playing games there, and before long on average theyʼve wasted an hour of the day. Thatʼs just seven minutes out of every hour who can they be hurting with such a brief diversion? Theyʼre hurting you, and your business, to the tune of more than $7,000 per year in lost time. If youʼve got just 50 employees, youʼre probably burning more than a quarter million dollars a year keeping them amused and entertained. Now, none of your employees means to do it. Everyone expects to get a little brain-break now and again. But non-work surfing on the Internet is a little different from an hourly trip to the water cooler, because the Internet makes it easy to get carried away. You start catching up on Myspace, and before long itʼs not a 5-minute brain-break, itʼs an hour wasted out of the day. 250 hours a year. 12,500 hours a year across 50 employees. Itʼs insane. Itʼs the easy access, and the lack of personal consequences, that makes employees simply not think when theyʼre wasting time like this. And even if you decide you donʼt care about an hour waster per day, there are definitely employees whoʼll take advantage of that largesse, and take you for hours per day often wasting more time than they spend actually working. Businesses again turn to filtering software to help, with the idea of banning access to time wasting websites. Good luck. Some of those time wasters are actually legitimate for some employees, like the ones responsible for updating the companyʼs Facebook page or Twitter feed. And the number of time-wasting sites will grow faster than your filtering softwareʼs ability to keep up. So in addition to the wasted productivity which will still occur youʼll start wasting more time trying to manage your filtering system. Threat 4: Inappropriate Downloads The Internet, it sometimes seems, was born to make things difficult on businesses. If employees arenʼt wasting time surfing the latest Flash game website, theyʼre downloading illegal music, illegal videos, virus-infected 3 Mitigating the Top 5 Threats to Your Business

executables, and who knows what else. Yes, you can implement virus scanners and file blockers, but thereʼs an entire cottage industry dedicated to letting your employees bypass those protections. Itʼs the same mentality already covered: your employees arenʼt acting with deliberate malicious intent, they just want that ringtone or elf bowling game so badly, and thereʼs no personal consequence in them having it, so they find a way to get it. One virus-infected game on your network and youʼll spend thousands of manhours repairing the damage. One collection of illegal MP3 or video files and youʼll spend countless man-hours defending yourself in court, and thousands of dollars in fines. Donʼt you wish your employees could just think for a moment before they clicked download? Typically deployed as a small client application on your Windows and Mac computers, UAM software literally records your employeesʼ actions, including keystrokes and potentially even including screen snapshots every so often. Threat 5: Wasted Effort This is one of the most subtle threats of all, because your employees truly donʼt even know theyʼre hurting you. This is the time thatʼs wasted because your employees arenʼt trained to be as productive as they could be. Perhaps theyʼre wasting time formatting a Word document, not realizing that thereʼs a built-in template to do it for them. Or theyʼre struggling to operate a line-of-business application, without realizing that your developers built in a shortcut five versions back. Or itʼs your help desk, desperately trying to solve a userʼs technical problem, running around in circles because they canʼt duplicate the problem and the user canʼt describe how theyʼre causing the problem. Seems like thereʼs nothing you can do about this threat, and in fact most businesses just tend to throw up their hands and accept it as the cost of doing business. Pity. In this day and age, even minor productivity gains can make an enormous difference. Employees already feel overworked and underappreciated; if you could help them do their work with a bit less work, theyʼd certainly feel better about it. The Fix: A DVR For Your Employees The first four threats discussed above have a common theme: Your employees wouldnʼt engage in those activities if they thought there were personal consequences for doing so. In other words, if you could hire someone to stand and watch over their shoulders, all day, they wouldnʼt surf those websites. They wouldnʼt waste their time. They wouldnʼt download those files. Of course, youʼre not going to hire people just to stand and watch other people. But you can implement User Activity Monitoring (UAM) software. Typically deployed as a small client application on your Windows and Mac computers, UAM software literally records your employeesʼ actions, including keystrokes and potentially even including screen snapshots every so often. Malicious websites? Contextually blocked, and also logged so that you know about the attempt. Time-wasting sites? Logged. Inappropriate email messages? Logged. Rumors spread via Instant Messenger? Logged. 4 Mitigating the Top 5 Threats to Your Business

By letting your employees know that their activities in the workplace do matter and are being monitored, theyʼll think before engaging in reckless activity. With that information logged to a central data store, the UAM software can generate reports. Youʼll see the average amount of time spent on Facebook and be able to drill down to the employees who are at the top end of that average. Youʼll see whoʼs posting confidential information, and where theyʼre doing it, and even get real-time alerts when it happens. Youʼll also be able to mitigate threat number 5, by having training and productivity specialists review employees as theyʼre working. Youʼll see when theyʼre working harder than they need to, and be able to build training plans that better equip your employees to do their jobs. Your employees will appreciate you making that investment in them, and theyʼll enjoy a better quality of life simply because theyʼll work more efficiently, with less wasted effort. UAM software can do all of this, and more. By letting your employees know that their activities in the workplace do matter and are being monitored, theyʼll think before engaging in reckless activity. Knowing that personal consequences are possible, youʼll generally avoid the problems in the first place, simply because your employees will make better decisions. Then youʼll be able to help them work more efficiently and effectively. Itʼs a better way to run a business, and a better way to maintain relations with your employees. SpectorSoft s SPECTOR 360 offers an easy-to-deploy, comprehensive solution for User Activity Monitoring. Its flexible search and reporting features let you quickly drill down to specific traffic, replay activity, and more. Learn more at www.spector360.com 5 Mitigating the Top 5 Threats to Your Business