Category Archives: Acceptable Use Policy

Wait Until You Hear How Many Hours a Day an EPA Official Confessed to Watching Porn at Work

Bad-Press-PublicityIn today’s world, many if not most employees have access to the Web at work. For the most part, that’s a good thing, and in some cases essential.  Unfortunately, that same access has a dark side. That’s because certain workers will inevitably visit illicit or risky Web sites, and such visits can expose the organization to serious legal liability.  The most troublesome sites are those devoted to pornography.  Sites devoted to gambling, illegal drugs, hate speech and criminal activity can also create legal issues, albeit to a lesser extent.  In addition to exposing the organization to legal liability, visits to inappropriate sites cause other serious issues such as lost productivity and wasted bandwidth.

To read the full article about the EPA official click here.

 

For more information about Wavecrest’s product offerings.

Toll Free:

877-442-9346 (U.S. and Canada) Ext. 3

E-Mail:

sales@wavecrest.net

Website:

https://www.wavecrest.net

            

March Madness Starts This Week! – Estimated $1.9 billion Lost for Every Unproductive Hour

This week is the beginning of one of the most popular events of the year… March Madness!  An exciting month for sports fans everywhere!

The exMarch Madnesscitement during the tournament is addictive! Employees have office pools and discuss the games all through the day. The trouble with March Madness? It occurs during the work day. “An average of 10.7 million people watched March Madness games in 2013, the most since 1994.” During this time, an organization does need to worry.

Management needs to be concerned about low productivity, “An MSN poll in 2012 found that 56% of respondents, equivalent to 77.1 million employees, planned to devote at least one hour to March Madness. Using those figures, the damages rise to $1.9 billion for every unproductive hour.” IT, as well as management, needs to worry about the risk of lower bandwidth for critical business operations, “Turner Sports, which operates the NCAA’s website, said 6.8 million unique visitors watched games online during the first week of last year’s tournament. Visitors spent an average of 1 hour and 51 minutes online each time they opened a stream.” These disruptions can cause major problems with the normal operations of any business.

March Madness begins March 18th and runs through the beginning of April. Revisit your organization’s AUP and let your employees know the negative impact their actions could have on the organization.

It is a good time to think seriously about making one of Wavecrest Computing’s CyBlock Advanced Web Security solutions a priority. Whether you are thinking you would like to block all access to sports, or thinking you would like to allow some time for your employees to enjoy March Madness while maintaining control over crucial business operations. CyBlock Advanced Web Security solutions can do both. CyBlock can easily block sports or, just as easily, allow for filtering by time frame. Implement flexible filtering by day, hour, or half hour while controlling bandwidth, threat protection, and enforcing your AUP in an easy to manage interface. With deployments options of CyBlock Cloud with the optional CyBlock Mobile Security App, CyBlock Software, CyBlock ISA/TMG, or CyBlock Appliance, Wavecrest can help you find the solution that you need now.  Many of these options can be up and running the day you purchase. Do not wait until the Final Four’s final basket!

 

*Excerpts from Foxbusiness.com, March Madness Ready to Distract Workers Nationwide, By Matthew Rocco Published March 11, 2014

What employers need to know about online holiday shopping

It’s that time of year again. Christmas is coming, and it’s time to find the best deals and research the best products. And where does everyone go these days to find the deals and do their product research?  You guessed it. The Internet.  Should employers be concerned with this? Absolutely!  Online shopping results in significant productivity losses, excessive bandwidth usage and serious threats to cybersecurity.

Lost productivity can mean big bucks for your company. A recent study by Comscore found that 50% of all online holiday purchases occur during working hours. For the companies in the study, the typical productivity loss during the short holiday season averages $15,000.

Adding insult to injury, the additional traffic will lead to network slowdowns due to significant increases in bandwidth usage. Just as they did in previous years, online retailers are now preparing bandwidth-hogging promotional videos to help sell their products. Remember last year?  On Cyber Monday 2011, video views increased by 897 percent over the previous year. And now the number of views this coming Cyber Monday are expected to exceed last year’s. So, it is critical to prevent vital bandwidth from being consumed by non-productive Web-use.

Contributing to the danger, hackers and identity thieves are very aware of these online shopping patterns. They are fully prepared to deceive online holiday shoppers with very appealing schemes – “deals” that require them to click a link to special discount or filling in personal information before they can get the deal. These acts can lead to malware infection or pose significant risks to your organization’s network and sensitive data.

The peak period for all these holiday-related problems is coming soon. The Comscore study tells us that 80% of all annual online purchases occur between Nov 26th (CyBer Monday) and Dec 14th.  So now is a good time to remind your employees of your organization’s Web-use policy and make sure you have the right protections in place.

Dennis McCabe, President of Wavecrest Computing, recommends that companies monitor and/or filter employee Web-use to better protect themselves from lost productivity, excessive bandwidth usage and security threats. His company is ready to help them do this.  Easy to use and priced to fit any budget, Wavecrest products are tailored to address all aspects of Web-use management reliably and cost-effectively.

About Wavecrest

Since 1996, Wavecrest Computing has developed, marketed, and supported a spectrum of innovative Internet usage monitoring, analysis, filtering, and reporting solutions. Their products help all types of organizations manage employees’ online activities, ensure compliance with acceptable use policies, preclude legal liability and prevent bandwidth abuse. Founded 15 years ago, their client base has grown to more than 3,000 organizations, including many prominent Fortune 500 companies and high-profile government agencies.

Monitoring Internet Usage … From the IT Department

During July, August, and September of 2011, Commtouch assessed categories of Web sites most likely to be home to malware, below are the top ranking offenders.  The Portals category includes those sites offering free hosting which are often abused to publish malware and phishing content or will redirect to sites with this content.

What were the most-visited categories by your employees during 2011?

Are you currently monitoring and/or blocking the existing Spyware/Malicious, Phishing/Fraud, Public Proxy, and Hacking categories to help protect your network?

Source: Commtouch

In today’s wired workplace, internet security and bandwidth consumption are top concerns for IT professionals while employee productivity and legal liability ail management and HR professionals.  As a major contributor to the Web-use management effort, IT typically becomes deeply involved in planning, testing, selecting, installing, and administering Internet monitoring software.  With the different departments playing a role in deciding on the best product to fit their vast needs, most are left without a solution.  Fortunately, Wavecrest’s products have been reviewed by our customers as meeting each role’s needs most effectively, offering manager-ready, easy-to-interpret reports that can be accessed without the IT personnel in addition to providing a robust, truly scalable IT-friendly remedy.

With Wavecrest Computing, customers have the insight needed to proactively monitor / block the notorious malicious sites based on custom categories, the Wavecrest Control List, and a real-time deep packet analysis process.  Plus, our 19 comprehensive templates provide a variety of summarized and detailed Web-use activity reports on users, groups, categories, sites, acceptability ratings, and bandwidth consumption.  Conveniently import your current Web Use Policy to easily customize or classify categories, implement abuse thresholding, and monitor employee productivity while our Administrator and Operator Accounts allow for non-IT personnel to create and obtain their role-specific reports.

While serving a diverse mixture of commercial businesses, industrial firms, government agencies, military units, educational institutions, and non-profit organizations since 1996, our products continue to present the most up-to-date, proactive coverage in line with the one factor that underlies all Web-use management issues, human online activity. Wavecrest’s managers and developers understand human resource management well and we use that knowledge to develop features that prevent productivity losses, legal liability problems, network issues, and unnecessary costs.

What’s Hogging Your Company’s Bandwidth? Causes for Slow Network Speed this Holiday.

If you haven’t noticed, online holiday shopping lasts well beyond Cyber Monday.  According to a ComScore report, after the 2010 holiday shopping season, more than 85% of Americans online visited a retail site in December of last year.  Employees shopping online at work are likely causing critical applications, like Voice over IP (VoIP) and video conferencing, to perform poorly if at all.  The last thing you and your company need is network latency or slowdowns due to non-work related online activity.  Many of our clients are seeing a spike in bandwidth usage from shopping websites and have quickly taken measures to filter browsing to that category.  Which sites consumed the most bandwidth for your company this month?  Determine what factors are impacting your network speed before you decide to purchase more bandwidth – an expense that could be avoided with the right tools and a bit of discipline.

With 19 different types of highly customizable employee Web-use reports, Cyfin Reporter offer insights as to which types of traffic consume the maximum volume throughout the workday.  Monitor, filter, and report over 500 million Web pages in 74 categories and set throttling thresholds for sites that are slowing your company’s Internet speed with CyBlock Proxy.  Now is the time to address your poor network performance, slow applications, and bandwidth congestion.

We’re so sure you’ll benefit from our solutions that we offer a free 30-day product trial. Both products provide quantified data to help IT personnel keep track of bandwidth utilization by users as well as by type of usage (appropriate versus not so appropriate). After you’ve downloaded our products, take advantage of the User Comparison Trend Chart to detect unexpected spikes that could indicate excessive bandwidth or Web use.  Then review your Top Sites Bandwidth Chart (example seen below) and find out which ten sites are consuming the most bandwidth or had the most hits or visits for the time period you specify.

Top Sites Bandwidth Chart

 

Top Sites Bandwidth Chart for both Cyfin and CyBlock

Online Holiday Shopping Can Cost Your Business More Than Time

Online Shopping Risks

Cyber Monday is no more – in an uncertain economy, post-Thanksgiving online holiday shopping has increased since coined in 2005 and now lasts for one month with more than 50% of all online spending taking place during working hours1.  What does this mean for your business?  A large decrease in employee productivity, a boost in bandwidth consumption, and one of the most popular times for cybercriminals to attack your secure data.

Lost productivity can mean big bucks for your company, reducing employee output to a mere 60%2.  A survey by CareerBuilder states that more than half of the 4,000 respondents polled intend on shopping online while at work with one third of those planning for more than one hour each day, in addition to the two typical hours daily already reported by respondents (time excludes lunch hour and scheduled breaks).  If you do not have a Web-use policy or Internet Acceptable Use Policy (AUP) in place, one is necessary to help report, monitor, and prevent employee Internet abuse in addition to protecting your company from legal liability.

Downloading malware is another risk as employees use the Internet for personal reasons. Spyware and malicious code are big threats to company networks as they can consume bandwidth and compromise security.  Recent studies show that company networks are being infected with spyware and malicious code most often through employees surfing the Web; with the holidays increasing that risk, these threats make it imperative for companies to enforce an AUP to protect their networks. Wavecrest Computing suggests that companies monitor and/or filter employee Web use in order to better protect themselves from security threats. In addition to the inherent risks associated with hacking your online security – loss of company reputation, destruction of company data, and the downtime employees face while systems are restored – the costs to mitigate attacks are extraordinary and rising each year.  This year, U.S. companies are expected to spend more than triple the costs spent in 20063.

To ensure these threats do not happen to your company this holiday season, run through our checklist and remember to check it twice!

  • Install all applicable system and program updates to avoid malware from infiltrating any system frailty that could have easily been patched with an update.
  • Create a Web usage policy and clearly communicate it to your employees.
  • Be cautious prior to clicking on links to different websites particularly those found on social networking sites as they’re often a hotspot for malware.
  • Avoid the use of pirated / illegal software as many contain malware.
  • Never open email attachments from unknown senders and make sure to scan attachments you do decide to download.
  • Make steps to consistently back up your computer in the case that malware wipes your hard drive clean.
  • Monitor servers and security devices 24x7x365 for security issues and require preventative actions be taken on security threats in real time – this is where we come in!

CyBlock can be set up to block Web access by categories and by hour so employees can access shopping sites on their lunch break or after hours. This approach can help sustain morale while minimizing the risks associated with online shopping.  With Cyfin, you can monitor employees’ Web use to ensure that Web-use policies are followed or that unwanted spyware or malware is not downloaded as a result.  Let us guide you to a safer, more reliable, robust security solution with exceptional support at an unbeatable price!

Sources:

1https://blog.comscore.com/2011/11/cyber_monday_work_computers.html

2 https://www.wavecrest.net/editorial/costsavings.html

3https://money.cnn.com/galleries/2011/technology/1107/gallery.cyber_security_costs/index.html?iid=EL

 

Wavecrest Computing: Fourteen Years of Internet Monitoring and Filtering

Wavecrest Computing, a leading developer of Internet usage management products, has now been in business for fourteen years. Since 1996, from their base in Melbourne, Florida, Wavecrest Computing has developed, marketed and supported a spectrum of innovative Internet monitoring and reporting solutions. Their products help all types of organizations manage employees’ online activities and ensure compliance with acceptable use policies. Starting fourteen years ago with a single customer, their client base has grown to more than 3,000 organizations, many of them Fortune 500 companies and high profile government agencies.

What makes Wavecrest stand out from competitors is their on-going commitment to customer service. When customers call, they talk to a real person from Wavecrest’s Melbourne, Florida location, and they get personalized attention. Their support personnel know that customer satisfaction is key to the company’s (and their own) success. For years these dedicated men and women have listened to Wavecrest customers and made sure that Wavecrest consistently delivers the products and services needed to meet the many dynamic challenges associated with use of the Internet in the workplace.

Those challenges have certainly evolved over the years. Examples include the very real and seriously increasing risks of social networking, video streaming and other Web 2.0 technologies that produce productivity losses, bandwidth drains, legal liability, and network security threats in the workplace.

As the Internet grows and the challenges escalate, Wavecrest has kept pace every step of the way.

Taking a look at Wavecrest’s product history, they started with a basic software application called ProxyReporter. It read and analyzed employers’ outbound Web logs. From that data, it then produced reports that helped management and IT monitor employees’ use of Web access.

As the Internet became more sophisticated, Wavecrest went on to develop a series of increasingly robust Web-use monitoring and filtering products designed to suit a variety of customers and network infrastructures. Their monitoring products now include Cyfin Reporter–a highly sophisticated and scalable logfile analyzer/reporter–and Cyfin Proxy, a standalone Web proxy/monitor/reporter. Their combination filtering/reporting products include CyBlock for ISA/TMG–a combination filter/reporter system for use with Microsoft ISA and TMG products–and CyBlock Proxy, a standalone proxy/filter/reporting solution.

Wavecrest’s latest innovation is CyBlock Appliance, a hardware based Internet-usage management device. Designed to monitor and help control use of all Internet protocols, CyBlock Appliance is a standalone proxy, monitor, filter and reporter.

Through the years, Wavecrest products have been well received and proven to be highly reliable and cost-effective. They are all backed with a 90-day money-back guarantee. Wavecrest frequently incorporates new features to keep up with the ever-changing Internet and marketplace demands. Dennis McCabe, VP of Business Development, states, “Our main goals at Wavecrest are to provide outstanding customer service and a reliable and robust product that stands above the competition.”

About Wavecrest
Founded in 1996, Wavecrest Computing is a recognized B2B leader in policy-based Web-use management solutions. The company’s products are relied on by IT personnel, HR professionals and business managers around the world to proactively address issues of Internet abuse, legal liability, security threats, workforce productivity and misuse of bandwidth. Wavecrest has been profitable since 1997, and sales have increased steadily since then. Among their more than 3,000 clients are Procter & Gamble, British Telecom, US Department of State, Edward Jones, IBM, IKEA, MillerCoors, Siemens, Burlington Northern Santa Fe Railway (BNSF) and a growing list of global enterprises and government agencies.

Best Practices for Monitoring Employee Computer Use

We recently came across “Best Practices Regarding Employee Computer Use,” written by Dandford Grant, a partner at Stafford Frey Cooper law firm, and thought it could be a great resource for Wavecrest customers and others thinking about implementing a filtering or monitoring solution. The paper discusses employee privacy rights, monitoring and surveillance of employees, and recommended policies & practices. It also gives examples of past legal cases and their rulings.  Below are a few highlights and good points to take away from the paper.

  • “In most situations, a certain amount of monitoring is good business and may be required.”
  • An employer should inform employees that Internet and email use will be monitored.
  • “Monitoring should be fair and consistent,” i.e., run and review the same reports regularly and dig deeper when the data warrants it.
  • Most importantly, communicate with employees frequently about your organization’s acceptable use policy and best practices when using email and Internet sites, such as social networks, blogging, etc.

Stop A Pornography Surfing Problem Before It Starts: Why Monitoring Is Important

USA Today reported today that “several top Security and Exchange Commission staffers surfed porn sites as economy teetered.”  While many of us like to think that “everyone” knows it’s inappropriate to surf porn at work using the office computer, time and time again stories like these still pop up.  While whether or not to allow social networking in the office and how to control the use of these sites seems to be the big surfing topic today, apparently we still cannot forget about pornography.  Pornography poses several risks to businesses and government agencies. These include productivity losses, security issues and legal liability.  No matter how strict or lenient your acceptable use policy is, one thing is clear.  Communicating your Web-use policy and regularly monitoring employees’ Web use is important.  You want to stop the problem before it starts or turns into an employee spending “up to eight hours a day looking at and downloading pornography.”

Source: https://content.usatoday.com/communities/ondeadline/post/2010/04/ig-report-several-top-sec-staffers-surfed-porn-sites-as-economy-teetered/1

Set Your Block Policies For Newly Released Categories

The new categories released and updated in your product on April 3 are set to “Allow” by default (for all CyBlock products).  This means that you will need to review these new categories and set your policy to “Block” those categories for which you want to restrict access.  Set your block policies at the Advanced Settings – Filter Settings – Block Web Categories screen.

For reporting and monitoring purposes, you may also want to change the new category’s classification statuses at the Advanced Settings – Category Setup – Classification screen to match your organization’s Acceptable Use Policy.

See the Category Update Data Sheet for a full list of categories and their descriptions.