Category Archives: web-use management

Online Holiday Shopping: Here We Go Again

It’s that time of year again! The big Christmas shopping spree. As in previous years, the online version ‘officially’ starts on Cyber Monday – the day after the big T-Day weekend. And now this year we’ve got Green Monday (December 7) and Brown Monday (December 14). These are days on which, like Cyber Monday, online retailers put on a full court press to draw in ‘surfer-shoppers.’

And the whole circus runs through New Year’s Day.

The volume can be huge and problematical for employers. A survey conducted for ISACA, an association of 86,000 information technology professionals, states in part:

“Employees plan to spend nearly two full working days (14.4 hours) on average shopping online from a work computer this holiday season. One in 10 plans to spend more than 30 hours shopping online at work. Convenience (34%) and boredom (23%) are the biggest motivators.”

“… the second annual “Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety” survey found that half of those surveyed plan to holiday shop online using a work computer.

“Dangers of shopping online include viruses, spam and phishing attacks that invade the workplace, resulting in financial losses due to reduced productivity and destruction or compromise of corporate data.”

In addition to generating network security and performance issues, online holiday shopping is a huge productivity waster for businesses. When workers are shopping, they’re not ‘minding the store.’ Accordingly, this is a good time for all types of organizations to take stock of their Web-use management practices and seek help if needed.

Wavecrest Computing is ready to provide that help.

Wavecrest’s Cyfin and CyBlock products and services help all types of organizations manage and control inappropriate and risky personal surfing of all kinds, including shopping. Cyfin and CyBlock products do this by monitoring and/or filtering employees’ Web use and reporting on the activity by content categories, e.g., shopping, sports, games, and others. Of particular note, with regard to holiday shopping, CyBlock products can be set up to block Web access by categories and by hour so employees can access shopping sites on their lunch break or after hours. This approach can help sustain morale while minimizing the risks associated with online shopping.

For 13 years, Wavecrest Computing has been providing Internet filtering and monitoring solutions to business, government, and educational organizations worldwide.  Wavecrest’s customer base includes well-known names such as the HP, Procter and Gamble, Burlington Northern Santa Fe Railway, Bridgestone, Mazda and many others.

Wavecrest’s 13th Birthday

We’re Wavecrest Computing, a leading developer of Internet usage management products. Today is our thirteenth birthday. So we’re taking a moment to celebrate, look back, and reflect on some of our accomplishments over the years.

Since 1996, from our base in Melbourne, Florida, we have developed, marketed and supported a spectrum of innovative Internet monitoring and reporting solutions. Our products help all types of organizations manage their employees’ online activities and ensure compliance with acceptable use policies. Starting thirteen years ago with a single customer, our client base has grown to more than 3,000 organizations, many of them Fortune 500 companies and high profile government agencies.

We’re extremely proud of this. But it didn’t just ‘happen.’

The credit goes to an unusually talented and well-led team of development, sales and support people. They all work directly for Wavecrest; none are outsource or temporary employees. For years these dedicated men and women have made sure that we consistently deliver the products and services that our customers need to meet the many dynamic challenges associated with use of the Internet in the workplace.

And those challenges have certainly evolved over the years. Examples include the very real and seriously increasing risks of productivity losses, bandwidth drains, legal liability, and network security threats. And as the Internet grew and the challenges escalated, we have kept pace every step of the way.

Our first product— a basic software application called ProxyReporter—read and analyzed employers’ outbound Web logs. From that data, it then produced reports that helped management and IT monitor employees’ use of Web access.

Then, as the Internet became more sophisticated, we went on to develop a series of increasingly robust Web-use monitoring and filtering products designed to suit a variety of customers and network infrastructures. Our monitoring products now include Cyfin Reporter—a highly sophisticated and scalable logfile analyzer/reporter—and Cyfin Proxy, a standalone Web proxy/monitor/reporter. Our combination filtering/reporting products include CyBlock for ISA—a combination filter/reporter system for use with Microsoft ISA products—and CyBlock Proxy, a standalone proxy/filter/reporting solution.

Our latest innovation is CyBlock Appliance, a hardware based Internet-usage management device. Designed to monitor and help control use of all Internet protocols, CyBlock Appliance is a standalone proxy, monitor, filter and reporter.

Of particular interest, in recent years, we have upgraded all of these products to deal with emerging issues associated with a variety of Web 2.0 advances such as social networking. At the same time we have been busy incorporating new features such as protocol filtering and trend reporting.

Through the years our products have been well received and proven to be highly reliable and cost-effective, and we back them all with a 90-day money-back guarantee.

As proud as we are of our products, we take equal pride in our support services. When customers call, they talk to a real person—here in America—and they get personalized attention. Our support personnel, all of whom have been with us for years, know that customer satisfaction is key to the company’s (and their own) success. And as a result of their responsiveness and professionalism, they have received literally hundreds of kudos and compliments over the years.

So, in sum, we have much to celebrate and be proud of.

Happy Birthday, Wavecrest!

Managing Groups and IDs in CyBlock and Cyfin

There are two options for managing your Groups and IDs in Cyfin or CyBlock.  You can manage them either “Inside the Product” or “Outside the Product.”

By choosing to manage your Groups and IDs “Inside the Product,”  it means exactly that.  You can manually add, delete and move Groups and IDs in the product.  If you import your Groups and IDs from Active Directory or a text file, each time your Groups and IDs are imported either manually or scheduled, only NEW Groups and IDs will import.  The new Groups and IDs that are imported will be based on your configuration setup in the Active Directory Setup wizard.  Your existing Groups and IDs will not be modified, which means if a user left or moved departments, he/she will have to be deleted or moved in the product.  If you want to have users in the VIP group, you must use the “Inside the Product” option.

If you select to manage your Groups and IDs “Outside the Product,” then you will be only managing and making changes to your Groups and IDs at the directory source.  Each time Groups and IDs are imported, whether manually or scheduled from Active Directory or a text file, all Groups and IDs will be updated to identically match that configuration. Typically this option is not used because the directory source is grouped according to your network setup and not according to how you will want to apply Web-use policies.

Are Some Web Domains More Dangerous Than Others?

The simple answer is “yes.”

A recent report published by McAfee showed that specific country domains and some generic domains are more dangerous than others. The most dangerous country domain is Hong Kong (.hk) with 19.2% of sites posing a security threat to visitors. Second to Hong Kong was China (.cn) with just over 11% of sites found to pose a security threat. The most dangerous generic domain is .info with 11.8% of sites posing a security threat, while government sites (.gov) still remain the safest domains.

The report also revealed that security threats from surfing the Web have increased 41.5% over 2007. So then the question becomes, “how can I protect my Internet users from accessing these sites that are prone to harboring spyware, adware, viruses, etc.?”

There are several steps you can take to help protect your network from a Web-use management perspective.

  1. If you have CyBlock, you can block access to those domains that are the most dangerous by using the wild card option in a custom category. Assuming that access to these domains in your workplace is not needed for the majority of Internet users, then simply blocking the domains is a good way to keep users from accessing them on purpose or on accident. Should a user ever have a need to access a legitimate site with that domain, then it can simply be added to an allow list in either a custom category or one of the other 69 predefined Wavecrest categories that you allow.
  2. If you are using Cyfin, while you can’t block sites with a particular domain, you can still track access to them by using a custom category and running a report against that category to see if there is any activity in those domains.
  3. Also be sure to monitor and/or block the existing Spyware/Malicious, Phishing/Fraud, Public Proxy, and Hacking categories to help protect your network.
  4. Finally, the most important step you can take to ensure that your Internet users are surfing safely is to make them aware of Web security threats and the type of sites that are more likely to harbor them.

Welcome to the Wavecrest Computing Blog

Welcome to the official Wavecrest Computing blog. Now you can stay up-to-date on the latest news and updates to Wavecrest’s CyBlock and Cyfin Internet filtering and monitoring software products. This means that you’ll learn about new product features that you’ve been wanting, and any enhancements or updates to the products. It will also be a resource where you can get tips and best practices for using your CyBlock or Cyfin product as a Web-use management tool.

With that said, we’ll get this first post started with our latest update to Cyfin Reporter. This latest version includes an:

  • Event Log. This log is automatically created in the product and logs when the product is started or stopped, when someone logs into or out of the product, product errors and more.
  • Import Data Job Queue. All import data jobs sent to the job queue are now sorted by their start time, processing the oldest first and the newest last.
  • MSDE Log Data Correction. Problems with configuration and receiving data in reports in previous versions of the product are now corrected.

You are welcome to view the release notes on our technical support forum at https://forum.wavecrest.net. You can download the latest version of Cyfin Reporter directly through your product by going to Administration – Product Update.

Finally, we hope that you will find this blog beneficial by either subscribing to the feed or visiting it every once in a while to see what’s new!