How To: Report On Date and Time A Site Was Visited

One of the most common things we hear is ‘how do I report on when a site was visited’. While this poses a few potential problems, this article will look at some possible solutions.

5 Top Tips for Safer Social Networking

Majority of our social networking tips and ‘How to’ articles are aimed at organizations managing and reporting on network traffic to improve online safety at work. This time around I thought I share some tips focusing on how individuals can ensure they’re being smart and safe when engaging in social networking activities. Hopefully these tips …

Latest Research and 5 Tips for Managing Web 2.0 in the Workplace

Clearswift (network security vendor and WebSpy technology partner) recently released their first report, in a series of three, on the use of social media and web 2.0 in the workplace. From not wanting to touch social media with a ten foot pole, employers are these days increasingly aware of the benefits of social media and …

Notes on E-Security Development

Today, I had the pleasure of attending Western Australian Internet Association’s first (out of four) breakfast events. The main topic on the agenda was E-Security and a panel of expert, representing commercial, government and educational bodies, were there to shed a light on the latest developments.

How to Educate your Workforce and Strengthen Security with Internet Monitoring

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large …

Internet Monitoring Best Practices – 10 Valuable Tips

The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend …

Unlocking the Value of your Log Data. 10 tips to help you get started

This is a popular WebSpy article that we decided to re-post. Click here to download pdf version. What can log data do for you? Organisations today are deploying a variety of security solutions to counter the ever increasing threat to their email and Internet investments. Often, the emergence of new threats spawns solutions by different …