27 11, 2009

Another Reason Organizations Should Avoid Excessive Internet Blocking

By | 2009-11-27T07:52:01+00:00 November 27th, 2009|How To, Sales and Marketing, Tips and Best Practices, Uncategorized, Web Browsing Analysis|0 Comments

Google Alerts have become an invaluable tool to keep track of WebSpy’s online presence and mentions. I’m also alerted on keywords related to other players in the Internet Security Industry. The last couple of weeks I have noticed quite a steep increase in alerts on a well-known internet blocking and filtering vendor. Majority of these [...]

16 11, 2009

Santa Claus is Coming to Town – Ho, Ho, How will it Affect your Workplace?

By | 2009-11-16T03:25:44+00:00 November 16th, 2009|Tips and Best Practices, Uncategorized|0 Comments

Tis should be the season to be jolly but it looks like employers have reasons to watch out, and maybe even cry, all because Santa Claus is coming to town. Gallup has reported that Christmas spending intentions are currently down, compared to last year. Americans are planning to spend an average of $740 on gifts [...]

7 10, 2009

How to Improve Public Proxy Management and Control

By | 2009-10-07T04:28:28+00:00 October 7th, 2009|How To, Tips and Best Practices, Uncategorized|0 Comments

Using public proxies generally involves browsing to a public proxy website to request access to another site, usually blocked or prohibited by organizational policy. When accessing sites in this fashion, firewalls, filtering devices and monitoring solutions are only aware that an employee, or student, has accessed the public proxy site, and not the actual end [...]

29 09, 2009

How to Educate your Workforce and Strengthen Security with Internet Monitoring

By | 2009-09-29T08:03:38+00:00 September 29th, 2009|How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage|0 Comments

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large [...]

2 09, 2009

Internet Monitoring Best Practices – 10 Valuable Tips

By | 2009-09-02T13:43:44+00:00 September 2nd, 2009|Tips and Best Practices, Uncategorized, WebSpy|0 Comments

The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend [...]

15 07, 2009

Business benefits from monitoring and reporting on Internet, email and network log files

By | 2009-07-15T04:21:42+00:00 July 15th, 2009|Articles, Email Analysis, Firewall Analysis, Log File Analysis, Sales and Marketing, Uncategorized, Web Browsing Analysis, Windows Event Logs|0 Comments

In previous blogs I have covered why internet access is so important in the workplace, why blocking and filtering should be minimized, and why monitoring is preferred. Today I thought I’d focus on the specific benefits of monitoring and reporting on log files. To some it might be obvious, but plenty of search queries used [...]

15 06, 2009

U.S Army End Ban on Social Media Sites

By | 2009-06-15T05:44:22+00:00 June 15th, 2009|Uncategorized, WebSpy, WebSpy News Update|0 Comments

After blogging about an increase in Australian employers blocking social network access it is refreshing to see a more positive trend. Certain U.S. Army bases, that formerly blocked access to Web 2.0 sites, now permit users to surf to sites such as Facebook and Flickr. The Army has ordered its network managers to give soldiers [...]