5 01, 2011

5 Top Tips for Safer Social Networking

By | 2011-01-05T13:43:50+00:00 January 5th, 2011|social networking, Tips and Best Practices, Uncategorized, WebSpy, WebSpy News Update|0 Comments

Majority of our social networking tips and ‘How to’ articles are aimed at organizations managing and reporting on network traffic to improve online safety at work. This time around I thought I share some tips focusing on how individuals can ensure they’re being smart and safe when engaging in social networking activities. Hopefully these tips [...]

10 12, 2010

Latest Research and 5 Tips for Managing Web 2.0 in the Workplace

By | 2010-12-10T12:26:46+00:00 December 10th, 2010|ClearSwift, Sales and Marketing, Tips and Best Practices, Uncategorized, WebSpy News Update|0 Comments

Clearswift (network security vendor and WebSpy technology partner) recently released their first report, in a series of three, on the use of social media and web 2.0 in the workplace. From not wanting to touch social media with a ten foot pole, employers are these days increasingly aware of the benefits of social media and [...]

29 09, 2009

How to Educate your Workforce and Strengthen Security with Internet Monitoring

By | 2009-09-29T08:03:38+00:00 September 29th, 2009|How To, Log File Analysis, Tips and Best Practices, Uncategorized, Vantage|0 Comments

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large [...]

2 09, 2009

Internet Monitoring Best Practices – 10 Valuable Tips

By | 2009-09-02T13:43:44+00:00 September 2nd, 2009|Tips and Best Practices, Uncategorized, WebSpy|0 Comments

The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend [...]

9 07, 2009

Unlocking the Value of your Log Data. 10 tips to help you get started

By | 2009-07-09T03:40:58+00:00 July 9th, 2009|Articles, Uncategorized|0 Comments

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different [...]