But for that to happen, Sub7 needs to get into your computer…and unfortunately, there are a few ways that can happen to you: Sub7 can work its way into your computer through an email, or the program can be “delivered” to you if you use the Internet Relay Chat (IRC) protocol. One way hackers have attacked computers in the past is through a program call “Sub7” (or SubSeven). Of course, they can’t do anything until they get “inside” your computer, but there are plenty of ways they can make that happen. Yes, it may seem that hackers primarily attack large companies, but the truth is that they can also target your computer just as easily. Whatever you discover–whether it’s a time-wasting Website that everyone is watching this week or a single person who is addicted to solitaire–you can often fix problems with a simple e-mail that tells your team you know what’s up: “Just a reminder, people: Chatroulette is not an appropriate use of company time.Talk about a bad day: That’s how you’d feel if a hacker managed to gain access to your home computer. Take the time to at least spot-check the reports that your monitoring software generates so that you can identify potential problems early and take remedial action. By limiting the ways your staffers can get into trouble, you can prevent problems up front.Ĭheck reports regularly: There’s little point in generating usage reports if you’re not going to look at them. Letting employees know that their behavior is being monitored can serve as a powerful deterrent against unwanted online activity.įilter proactively: Most good endpoint-security tools include Web and e-mail content filters that can block inappropriate sites and prevent users from sending or receiving files that can jeopardize your business. Many companies accomplish this with a simple statement in the employee handbook telling workers plainly that everything they do on company computers, including individual keystrokes, can and will be tracked. Unless you think someone on your team poses a serious threat that requires covert monitoring, it’s best to be up front with staffers about what you track and why. Better still, these hosted systems effectively protect laptops that frequently leave the office.īe forthright: Nobody likes being spied on unwittingly. They also deploy system security updates automatically, block malware, and protect sensitive files to prevent data from leaking out of your company. These services are relatively inexpensive and easy to set up compared with server offerings, and they give you the flexibility to set and monitor compliance with acceptable-use policies from a single management interface. Unless you have a dedicated IT staff or the budget to bring someone in on a regular basis to check on things, a cloud-based service–such as Symantec.cloud or Trend Micro Worry-Free Business Security–is probably the best choice. Symantec’s cloud-based endpoint-protection service can monitor all of your company’s PCs with minimal setup time.The most secure way to monitor PC use is to deploy a system that consists of a host, server, or appliance together with client-installed software. Or, if your company is very small and your budget is tight, you can adopt free tools à la carte. You can combine a few complementary tools, such as a desktop security suite and professional tracking software. You can install a Web-hosted system that combines software on the PC with remote monitoring services to protect your computers and enforce compliance with company policies. But in this guide, I’ll be looking primarily at simpler tools designed for smaller organizations.įor a small business, you have several good ways to achieve endpoint security. These systems tend to be complex enough to require the expertise of a trained IT pro. Large enterprise computing environments demand comprehensive endpoint-security systems, consisting of server software coupled with client software on each user’s machine, that can handle many of these functions at once. Even something as simple as a worker’s failure to keep up with Windows patches can be a threat to your business, so don’t think of monitoring as merely snooping.Įmployee monitoring is just one facet of a larger discipline known as endpoint security, which includes everything from malware protection to policy enforcement and asset tracking. And, of course, unchecked Web activity can expose your network and systems to dangers from malware and other intrusions.
0 Comments
Leave a Reply. |