Monthly Archives: September 2009

New Advanced Reporting Options

New advanced reporting options were recently added to Cyfin and CyBlock. You can configure these options by going to Advanced Settings – Report Settings in your Cyfin or CyBlock product and clicking on the Advanced Options link. The new options include the following:

  • Check For New Logfiles. Before running a report, the product will check for any new logfiles. This option is selected by default.
  • Compress Reports For Email. This compresses the report attachment for read-only reports in an email as a .zip file.
  • Display Login Name and IP Address. Select this option if you want to see both the login name and IP address for each record in the report.
  • Include All Group´s Users. This will display a user ID even if there is no data for that ID in a User Audit Detail or Category Audit Detail report.

If you have any questions about these settings, contact technical support by phone at 321-953-5351, ext. 4 or by email at

More Businesses Monitoring Employees’ Internet Use

More businesses are monitoring their employees’ use of the Internet due to a constantly evolving Internet and increased security and productivity concerns.  A recent article, “Big Employer May Be Watching,” from the Tampa Bay Business Journal discusses these concerns in more detail and provides advice from various IT professionals in the field of Employee Internet Management.  Below is a snippet of the article with advice from Wavecrest Computing’s VP of Business Development, Dennis McCabe.

The reasons why companies monitor employees has changed over time, said Dennis McCabe, VP of business development at Wavecrest Computing Inc., a developer of management software based in Melbourne.

After the burst of the dot-com bubble companies grew increasingly concerned with productivity. The concern later shifted to security issues posed by unwanted e-mail or “spam.” Productivity is once again a concern with the economic downturn, as well as security within a company, he said.

“This is not a firewall where you might have unknown hackers that might attack you. These are people working in your building, colleagues,” McCabe said.

Communication between management and staff is essential.

“You need informed management about how employees are using it and based on companies’ philosophy,” McCabe said. “They need to formulate a policy based on that.”