How to Improve Public Proxy Management and Control

Using public proxies generally involves browsing to a public proxy website to request access to another site, usually blocked or prohibited by organizational policy. When accessing sites in this fashion, firewalls, filtering devices and monitoring solutions are only aware that an employee, or student, has accessed the public proxy site, and not the actual end …

Notes on E-Security Development

Today, I had the pleasure of attending Western Australian Internet Association’s first (out of four) breakfast events. The main topic on the agenda was E-Security and a panel of expert, representing commercial, government and educational bodies, were there to shed a light on the latest developments.

How to Educate your Workforce and Strengthen Security with Internet Monitoring

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large …

Internet Monitoring Best Practices – 10 Valuable Tips

The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend …