Category Archives: Industry News

Take the mystery out of employee Web use and gain pertinent insight into your business.

Employee Web usage management and reporting

We are all seeing how business operations are continuously becoming more digitally driven. Many operations that were done on a desktop are now cloud- or app-driven. The connection to the Internet is a constant, and since your employees need that access to be productive, managing that connection should be a priority. Small businesses are finding that this access not only centralizes their operations and data but also can save them money. But they are finding that the amount of data being produced makes it impossible to find the relevant information needed. Looking at the employee-Internet relationship should be on the top of your checklist.

There are things that a Web-use management solution should provide, such as allowing a business to easily filter and control access, use white and black lists, and set time limits. But one of the biggest benefits that many times can be overlooked is the ability to access easy-to-use smart analytics and reporting tools. A filtering solution is great, but if it lacks a way to collect and correlate useful, pertinent data, then all that it is doing is restricting employees, causing frustration and potentially reducing productivity. With detailed reporting and analytics, managers can open up the usefulness of the Internet while knowing they still have the control to keep the business running smoothly and safely.

Look for the Web-use management solution that provides:

  • Drill-Down, Interactive, Forensic-Level Detail – A complete view of every link a user clicks, the exact search terms entered by a user, their search time, and more.
  • Ad Hoc and Scheduled Reporting – The information you need . . .  right when you need it.
  • Smart Reporting – Intelligent, timely, and cogent reporting on all aspects of employee Web usage.
  • Hits Versus Visits – Clear, uncluttered detail based on user clicks versus unsolicited traffic.
  • Manager Access – IT-controlled access for managers and HR allowing them reporting access without the need for IT assistance.

Analytics and reporting tools allow you to take the large amount of Web-use data your employees are producing and make sense of it. This data should tell you who, where, and when about the Web usage. Allowing you to see anomalies, activity peaks, bandwidth usage, and more, this visibility helps you plan and secure your network, data, and employees.

Don’t feel like you’re in need of tarot cards or tea leaves to know what is happening within your business.

CyBlock Web-Use Management Suite makes more sense of all your Web-use data with CyBlock’s comprehensive monitoring and reporting features. CyBlock is available in Cloud and VM deployments to fit any business size or industry.

Cyfin® provides advanced employee Web-use analysis and reporting for a wide variety of gateway devices and log file formats. Comprehensive yet easy to use, its customizable reporting and machine-learning analytics supply audience-specific Web-use information with reliable metrics, easy-to-read reporting dashboards, manager-ready detailed audit reports, and Smart Engine analytics. Cyfin is available in various deployment options: Cyfin VM, Cyfin Cloum and Cyfin Forensic.

About Wavecrest

Wavecrest has over 25 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Really? Is it really time to think about holiday shopping? Already?!

Manage Holiday Web Usage with CyBlock

Yes–now is the time. The holidays are right around the corner and definitely require attention now so your business can prepare for the increase in Web usage and the associated risks. There are many reasons for your business to pay close attention to Internet activity at this time of year (and all year). But there is one primary focus that could easily help with all the cyber risks to your business–managing the natural human vulnerability that cyber thieves take advantage of.

Did you know that most breaches are initially caused by employee error? “Ninety-two percent of all incidents are, and 84 percent of all data breaches were, unintentional or inadvertent in nature,” states an article from iapp.org. No matter what kind of data loss or breach it is, human error likely played a very important role.

Shopping season can bring out even more human vulnerabilities than usual. Malicious Web sites can look real and carry what looks like legitimate product offerings, advertising can be more enticing with hard-to-resist discounts, and e-mails can come from legitimate e-mail addresses hacked by these talented criminals. Humans’ emotional nature can make it hard to resist when we are all looking for that special or hard-to-get gift. It is important to make sure your business–and your employees–are protected by an easy-to-setup solution that is comprehensive and proactive.

This is easier than you think. Access to a comprehensive Web management solution will allow you to manage usage in a way that suits your unique business philosophy. This includes whether you want to allow or restrict access to certain Web sites at a particular time of day, monitor usage with reporting features by analyzing trends and tracking usage, or just meet compliance and regulation requirements.

This time of year, it is important to spend some extra time paying attention to your organization’s Web use. But Web-use management should be part of your business process and security all year round. Find a solution that is flexible enough to grow or change with you throughout the year, and for this time of year … let them shop … and know you are still being proactive and secure.

Cyfin® provides advanced User Behavior Analytics and Reporting for a wide variety of gateway devices and log file formats. Comprehensive yet easy to use, its customized reporting capabilities supply audience-specific information with reliable metrics, easy-to-read reporting dashboards, manager-ready detailed audit reports, and Smart Engine analytics. Cyfin is available in various deployment options: Cyfin Virtual Appliance and Cyfin Forensic.

CyBlock® Employee Web Filtering and Monitoring Solutions provide advanced Web filtering, threat protection, comprehensive employee reporting, Smart Engine analytics, easy-to-use admin and manager portals, and more. Customers can easily configure CyBlock to monitor and manage compliance with their usage policies. CyBlock is available in various deployment options: CyBlock Virtual Appliance, CyBlock Cloud, and CyBlock Hybrid.

Wavecrest has over 25 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. IT specialists, business managers, HR professionals, Managed Service Providers, and Forensics Investigators trust Wavecrest’s Cyfin and CyBlock products to easily decipher and manage, and report on, real employee Web activity, manage cloud services, reduce liability risks, improve productivity, save bandwidth, and control costs. Trusted by small, medium, and large government and commercial organizations worldwide. For more information on the company, products, and partners, visit Wavecrest.

Remote Working & Managing Internet Use

Specifically built to serve remote and roaming users, CyBlock Cloud will follow your users to wherever they are working.
Specifically built to serve remote and roaming users, CyBlock Cloud will follow your users to wherever they are working.

We all hope this coronavirus doesn’t last long. That’s clear. But because of this, companies seem to be realizing that social distancing is a good idea, and they can have people working remotely in a positive way. Amazon, Google, Facebook, Microsoft – the list keeps growing. They are taking this head-on and moving their employees off-site, potentially protecting their entire workforce from an onsite health crisis.

How does remote working fit into work overall? The numbers that come out of all this should be interesting, especially the numbers for the companies that finally realize they can operate this way and not lose any control over Internet security, productivity, liability, and more. Buzzfeed reports in its March 4th article*, “some in the industry are looking at the outbreak as a test case for the long-gestating but never-arriving moment when working remotely will broadly replace working in person.”

Many businesses have traveling workers. Salespeople, Technical Support staff, and others, but now we are looking at the driving force being something out of our control. The businesses that have made this decision are supporting a healthy workforce as a whole. Businesses that do choose to do this also know that they are still responsible for employees’ online activity. So how does a company support its business when its workforce is scattered everywhere?

The answer is a comprehensive Internet use management solution with an easy, flexible cloud deployment that travels with your employees. So, for example, the employee goes home with a company laptop, the company Internet use would be managed by the cloud solution.

What should you look for when looking at Internet-use cloud solutions?

  • Should deploy in minutes with simple, intuitive steps.
  • Follows users with perimeter-less coverage.
  • Is an easily scalable, highly elastic, and adaptable solution.
  • Always-on filtering with User/Group filter policies. 
  • Provides fast, efficient, manager-ready reporting.
  • Has no hardware installation and no maintenance.

CyBlock Cloud can provide all this and more. Specifically built to serve remote and roaming users, CyBlock Cloud will follow your users to wherever they are working.

Now is the best time to be prepared. Our Sales Team and Technical Staff are ready to help you get setup and going. We are all in this together! Contact us today at info@wavecrest.net.

About Us

CyBlock® Employee Web Filtering and Monitoring Solutions provide advanced Web filtering, threat protection, comprehensive employee reporting, Smart Engine with machine-learning analytics, easy-to-use admin and manager portals, and more. Customers can easily configure CyBlock to monitor and manage compliance with their usage policies. CyBlock is available in various deployment options: CyBlock Virtual Appliance, CyBlock Appliance, CyBlock Mini Appliance, CyBlock Cloud, and CyBlock Hybrid.

Cyfin® provides advanced employee Web-use analysis and reporting for a wide variety of gateway devices and log file formats. Comprehensive yet easy to use, its customizable reporting and machine-learning analytics supply audience-specific Web-use information with reliable metrics, easy-to-read reporting dashboards, manager-ready detailed audit reports, and Smart Engine analytics. Cyfin is available in various deployment options: Cyfin Virtual Appliance and Cyfin Forensic.

Wavecrest® has over 20 years of proven history of providing reliable, accurate Web-use management, filtering, reporting, and analytics products across various industries. IT specialists, business managers, HR professionals, Managed Service Providers, and Forensics Investigators trust Wavecrest’s Cyfin and CyBlock products to easily decipher and manage real employee Web activity, manage cloud services, reduce liability risks, improve productivity, save bandwidth, and control costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit Wavecrest.

*The Coronavirus Is Forcing Techies To Work From Home. Some May Never Go Back The Office, buzzfeed.com, March 2020.

This year, allow your employees some freedom to watch March Madness!

Time to celebrate basketball!

One of basketball’s biggest events is here again. The past few months have been pretty emotional for fans. This may very well make this year’s March Madness even more focused and passionate for everyone. You can choose to let your employees catch up on results with maintaining the visibility, control, and security you need to keep your business running smoothly.

This year, Wavecrest Computing offers tips that you should know from past years but also some important new ones. Having customizable reports and the ability to see rollups of time spent online, we know these new tips will help you keep up with the changes in technology and streaming!

Let’s start with these new tips! We know seeing the real Web browsing activity should not be time-consuming and cumbersome: especially for busy managers, HR, legal, and yes, even IT. So, making sure the information is easy to understand is critical for your business all year but especially during a heavy Internet-use time.

  • Make sure your managers have access to see the info they need, when they need it, with their own restricted access. Manager Portal is a key component for business. 
  • Be sure you can customize reports for each manager so they can quickly and easily see their own employees’ Web usage without a lot of extra technical data. Customizable Report Templates and their drag-and-drop features makes life so much easier!
  • Roll it all up please! It’s important to know how much time is really spent on a web site. But with all the noise caused by ads, like buttons, share buttons, images, videos, and more…how do you know the real intentional activity you are looking for? Roll it all up under an understandable heading! Managers want to see activity for Facebook, ESPN, or NCAA! Tagging and rollup is the only thing that makes that available!

And of course, the tips you should already know to keep your business in good shape during this exciting time of year:

  • Not all ads or search results are real. March Madness search results or ads have been known for malware. Filtering, black/white listing, whatever way you choose. This is crucial!
  • Restrict sites that are inappropriate or illegal. Be aware of what your employees are doing online. Gambling sites are not just a legal issue but also tend to carry many security risks. Category filtering allows you to pick the whole category to block, the rest is taken care of.
  • Don’t let your bandwidth slow the rest of the business down. Make sure you are able to easily view and throttle current data usage for the entire enterprise, detect unexpected spikes that could indicate excessive data use, or just observe real-time updates. Throttling helps keep mission-critical business a priority, proactively.

The biggest tip for March Madness? Get your business set up with a Web-use management solution that will offer these tools all year long. Take it off your plate and breeze through the constant ups and downs of Internet usage. Shopping seasons, streaming seasons, current events…let them stay up to date without worrying about what it will do to your bottom line. Employees happy can easily outweigh the concerns during these times of more than usual Internet use. Be proactive… and let them celebrate.

Let us help.

This year, choose to allow your employees some freedom to watch and enjoy! Find out more about all the Web management product lines at Wavecrest Computing.

About Us

CyBlock® Employee Web Filtering and Monitoring Solutions provide advanced Web filtering, threat protection, comprehensive employee reporting, Smart Engine with machine-learning analytics, easy-to-use admin and manager portals, and more. Customers can easily configure CyBlock to monitor and manage compliance with their usage policies. CyBlock is available in various deployment options: CyBlock Virtual Appliance, CyBlock Appliance, CyBlock Mini Appliance, CyBlock Cloud, and CyBlock Hybrid.

Cyfin® provides advanced employee Web-use analysis and reporting for a wide variety of gateway devices and log file formats. Comprehensive yet easy to use, its customizable reporting and machine-learning analytics supply audience-specific Web-use information with reliable metrics, easy-to-read reporting dashboards, manager-ready detailed audit reports, and Smart Engine analytics. Cyfin is available in various deployment options: Cyfin Virtual Appliance and Cyfin Forensic.

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management, filtering, reporting, and analytics products across various industries. IT specialists, business managers, HR professionals, Managed Service Providers, and Forensics Investigators trust Wavecrest’s Cyfin and CyBlock products to easily decipher and manage real employee Web activity, manage cloud services, reduce liability risks, improve productivity, save bandwidth, and control costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit Wavecrest.

March 2019 . . . The month of pure Madness

March Madness and CyBlock

Once again we are approaching the month of over-the-top basketball excitement–March Madness. So much excitement that viewership went through the roof again last year! According to the NCAA, the 2018 series had 97 million U.S. viewers from series beginning to the Final Four!

Though some actual regular TV viewers may have decreased in 2018, the overall numbers businesses need to worry about increased–the streamers! Sportstechie.com reports that Turner Sports saw an increase of livestreams by “28% and hours consumed climbed 14% compared with two years ago.”

This popular time of year impacts the workplace now more than ever. But you can choose to let them watch! Having good management of employee Web usage is the key to the days of Madness!

The things to watch for are the same every year–but they do get better at tricking everyone. So our recommendation may sound familiar but we can’t emphasize enough that at this time of year being proactive and vigilant is so important.

Some key points to remember:

  • Make sure you can see just real Web browsing activity.
    • Some say they show you the Web-use activity but the information ends up cluttered with all the computer communications. Seeing Web browsing activity should not be time consuming and cumbersome. Get a solution that clearly shows you employee Web-use activity without all the computer transactions!
  • Not all ads or search results are real.
    • Security risks are numerous this time of year. March Madness search results have been known for malware. As your employees search for brackets or results, you need to block traffic to the constantly growing number of sites that generate and/or promote malware. Keep out viruses, Trojan horses, phishing attacks, and more. And remember, these searches will trigger remarketing ads that may also contain malware.
  • Restrict sites that are inappropriate or illegal.
    • Be aware of what your employees are doing online. Gambling sites are not just a legal issue but also tend to carry many security risks.
  • Don’t let your bandwidth slow the rest of the business down.
    • Make sure you are able to easily view current data usage for the entire enterprise, detect unexpected spikes that could indicate excessive data use, or just observe the last 5, 10, or 15 minutes of real-time updates.
    • You should also make sure you will be able to keep the critical business operations running efficiently, even during the games, by using bandwidth throttling.

March Madness has become a way of life. Decide how your company will handle the traffic and proactively manage it by letting us help protect and secure your business and your employees.

Wavecrest’s CyBlock Filtering and Monitoring Suite will help manage your employees’ Web use and protect your business. CyBlock will block sites known for malware, proactively control bandwidth consumption, and keep productivity flowing, while allowing responsible viewing. This year, have the choice to allow your employees some freedom to watch and enjoy! Find out more about all the Web management product lines at Wavecrest Computing.

No more consolidation confusion . . . just leading employee Web-use management solutions that fit.

Companies change, grow, restructure, merge, acquire, and get acquired. It’s business and we know how that can be. Those of us that have seen this happen from within know that true impacts to the general business structure and overall goals don’t really show up for a year or two. Rarely does an acquired or merged business stay the same. The impact though can be internal, within the employee structure or daily business operations, or there can be  more obvious external impact to the financial status of the business, such as going private, or to the customer base focus. The last being the most likely to cause a domino-style effect of disruption.

Now is the time to really consider how to handle the consolidation changes that have been announced by Forcepoint. With the Raytheon acquisition of Websense a few years ago, everyone knew changes would come eventually. Unfortunately, the recently announced business consolidation will tend to leave some traditional Web-use management customers out in the cold. Whether you were a Websense customer before Raytheon or have gone to Forcepoint looking for the Websense-style solution in the last few years, you know what you are looking for from a Web-use management solution. Give CyBlock and Cyfin a try. Depending on what you need for your unique business, the first and only decision you need to make is Wavecrest. With deployments to fit every business size, type, and need, Wavecrest will allow you the comfort of moving away from the large corporate hassles to a successful, mature, privately held vendor that proudly focuses on customer needs and technological advancements.

Leave the government contractor-level pricing, contractual terms, and confusion behind. Don’t become another ticket number. Let Wavecrest focus on your business and your specific requirements. Contact us and speak to a U.S.-based customer service or technical support person today. We consider it part of the job to keep our customers happy.

CyBlock® Employee Web Filtering and Monitoring Solutions provide advanced Web filtering, threat protection, comprehensive employee reporting, Smart Engine analytics, easy-to-use admin and manager portals, and more. Customers can easily configure CyBlock to monitor and manage compliance with their usage policies. CyBlock is available in various deployment options: CyBlock Software, CyBlock Appliance, CyBlock Mini Appliance, CyBlock Cloud, and CyBlock Hybrid as well as a Virtual Appliance version.

Cyfin® provides advanced employee Web-use analysis and reporting for a wide variety of gateway devices and log file formats. Comprehensive yet easy to use, its customized reporting capabilities supply audience-specific Web-use information with reliable metrics, easy-to-read reporting dashboards, manager-ready detailed audit reports, and Smart Engine analytics. Cyfin is available in various deployment options: Cyfin Software, Cyfin Forensic, and Cyfin VM.

About Wavecrest
Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit Wavecrest.

Show cyber threats who is boss in 2018.

Last year went by so fast. In between everyone’s normal busy schedule, most of us had to deal with natural disasters of some kind. For us at Wavecrest, it was Hurricane Irma as well as an above average rainy season. For others, it was Harvey and Maria, as well as fires, flooding,  earthquakes, remnants of storms causing wind damage–the list last year seems to be endless.

2017 also brought on some notable cyber events with the Equifax breach as one of the top incidents. 2017 was definitely a year for the books. You may have also noticed a shift in the business digital threat protection messaging. We at Wavecrest noticed . . . because it shifted to what we have always focused on. People.

People are a big part of the cyber threats that take place in businesses. No matter how automated things are, there is always the aspect of human interaction–human vulnerability. Humans inherently have vulnerabilities. It’s not a fault of one individual over another; it’s not about how good your employees are. There is a point where a business owner, manager, or decision-maker has to come to terms with managing Web use for the sake of the business over “my employees wouldn’t do that” or “I trust everyone working for me.” It may be true that you have the most trustworthy employees, but mistakes happen . . . even to the best of us. Cyber criminals focus on the easiest route first to gain access to your systems. Many times this is the employee, or human, vulnerability.

So . . . the new year is here. What can be done to improve managing employee Web use? The key is to make sure you pay attention to the human endpoint because it is not always about a failure in the actual technology. The firewall is great but if you have a weakness with an authorized user, the hacker will get past the firewall. Defend the human endpoint.

Consider these as a starting point and build on each or all!

  • MONITOR YOUR EMPLOYEES’ WEB USE! Sorry. It had to be said. If you do not know what is happening, you will not be able to know why, when, or where it happened. And you will not be able to make an informed decision on how to stop it from happening again. Remember that many times the human error that allowed for a breach may have been habitual or reactive so the employee’s memory of how it happened may not be very clear. Make sure to have visibility into the actual Web activity.
  • Analytics. Really another part of monitoring but noted separately due its importance and the flexibility of what you should be able to view and analyze. Find a Web activity solution that allows you to see relevant, drill-down data when you need it. Trends, customizable charts, by user or group, and real-time information on activity and bandwidth use are all things you should be able to analyze easily. All will allow you to expose abnormalities in user activity, identify potential insider threat behavior, flag possible legal liability issues, assess trends for data breach exposure, and observe patterns for lost productivity.
    • Hits versus Visits. This one deserves a sub-bullet. Make sure the Web-use management solution you choose has clearly defined Hits vs. Visits. Hits consist of unsolicited traffic, such as ads, and are not a reliable tracking metric on its own. Visits give you uncluttered, relevant Web activity detail based on user clicks and are a critical component to understanding human behavior. The last thing you want to do is try and sift through a bunch of data that is not even really relevant to the employee’s actual Web activity.

  • Filter. Yup . . . another suggestion that has the “but my employees are awesome” stigma to it. BUT let me just remind you that this is something that will provide another layer of security from phishing, malicious Web links, and data loss. I got your synapses firing now, don’t I! Filtering allows you to block or restrict URL link clicks that an employee may not be aware are malicious. Hackers have become increasingly precise in how things look. Very convincing e-mails and Web links are not rare anymore; they are commonplace. It is not really all about making sure your employee isn’t streaming YouTube all day. Although that should be managed as well, it should all be under your control. Allow it, don’t allow it, throttle it, or open it all up. The solution you choose should allow you to do it all, in your own customizable way.

The point is that the human endpoint is still a leading way threats get into your network. It may be through phishing, a malicious ad, or use of a unsanctioned cloud application, or it may even be a human error such as the delay of updating software. Whatever the issue, you have to be as proactive as possible to protect your network. Educate your employees continuously, have a comprehensive Web activity solution in place, make sure your Acceptable Use Policy is current, make sure patch management is an active process, and hug your IT people regularly because they are usually some of the busiest and stressed people in your organization.

Here is to showing the cyber criminals who is boss in 2018! Happy New Year!

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

It is holiday shopping time again! Cyber Monday is now more like Cyber Month!

With Thanksgiving right around the corner, we all know what is coming–Cyber Monday–the big day (now it is more like a month!) for personal employee Web use! More than ever before, businesses are open to employee use of the company Internet for personal use such as snagging some holiday deals. But what does this really mean for daily business operations? That depends.

There are definitely cyber risks associated with the season of shopping–malicious ads, phishing e-mails with malicious Web links, and slow bandwidth, to name a few. Paying attention to your employees’ Web usage is crucial. It is up to you whether you allow shopping on your network. If you do, there are steps you should take to manage this naturally vulnerable human endpoint.

  • Filter
    • Filtering allows you to reduce risks from malicious URLs in ads, phishing, etc. . . . employees are your weakest link. Train them continuously but also make sure there is a Web filtering solution in place to allow you to manage the Web use the way you see fit.
  • Manage Bandwidth Usage
    • This time of year employees may be doing things such as watching a video review of the latest in tech toys for their kids. Make sure your mission-critical operations are not affected. Configuring bandwidth limits by user-defined thresholds and setting trigger alerts will help you make sure you don’t have unnecessary bandwidth hogs slowing your business down.
  • Monitor Web use
    • Visibility means everything. With the right monitoring solution, you can easily analyze employee Web-usage trends, make sure your Acceptable Use Policy (AUP) is being followed, and get actionable, relevant detail when you need it.

These are only a few of the things that you can do to help reduce the risks associated with employee Web use all year long. Remember that human vulnerabilities are a leading cause of most network breaches. Focus on the human endpoint. Take the time to keep training employees, enforcing your AUP, monitoring, analyzing, and filtering.

At this time of year, you can feel good about allowing your employees some freedom to research or snag some holiday gift deals. Have a comprehensive employee Web filtering and monitoring solution in place, and enjoy your holidays even more knowing you are proactively managing employee Web activity!

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Is your business’ human operating system secure?

Everyone is worried about operating systems, whether it is network operations, business operations, or a desktop operating system. The functionality of these intricate parts of your business are critical. But have you thought about your employees and how they operate? Today, your human operating system needs to be more than just making sure your employees are doing their job. Human vulnerabilities are a primary target for cyber criminals. Your human operating system, or the human factor, needs to be manageable and efficient, with tools in place that proactively support an open, yet secure, digital work environment.

Insider threats can be found at the top of headlines almost every day. Listen carefully to what each event tells you. It can happen to you, no matter how big or how small your business is. You don’t have to be a government organization to be susceptible to an insider threat. Insider threats can be a malicious employee who may be upset at the company, a good employee who just makes a mistake, or a targeted employee who unknowingly allows a malicious user into the network or access to proprietary data. Whatever the cause, there has to be tools in place to combat these human factor Web-use risks.

The human factor in business Web use is complicated in many ways. Hackers target natural human vulnerabilities and mistakes happen, employees can be sensitive to being singled out or afraid to admit the mistake, and fully blocking all access in today’s digital work world will likely just limit productivity and upset employees. The key? Visibility into the human factor. See how and when your employees use their Internet access. With that visibility into Web-use detail, you can then manage the usage to fit your unique business needs and gain a comprehensive, proactive way to secure and protect your business.

Securing and managing your enterprise’s human operating system in a proactive and efficient manner will help reduce cyber risks, such as phishing, malware intrusions, ransomware, data loss, employee misuse, legal liabilities, bandwidth hogs, shadow IT, and more. Find a solution that fits your business and your budget. Make sure it is flexible, easy to use, and easy to manage, allowing you to secure and shape employee Web-use–on your terms.

About Wavecrest

Wavecrest has over 20 years of proven history of providing reliable, accurate Web-use management and Advanced Log File Analyzer products across various industries. Managed Service Providers, IT specialists, HR professionals, Forensics Investigators, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage the human factor in business Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Trusted by large government and commercial organizations such as US-CERT Homeland Security, U.S. Department of Justice, USPS Office of Inspector General, National Grid, Johns Hopkins, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.

Employees are like Hacker Candy

Employees are still the central part of all our businesses. Even with all the technology, we still have people to run the operations. The human component of our business is the goal for most hackers. It is easier to find the human weakness than it is to find a network flaw. This human point of infiltration still needs attention, even when you feel your business is secure.

Hackers are smart and agile. It’s a full-time job for them. They don’t get called into meetings, get distracted by co-workers, or have to worry about receiving their W-2 in time for their tax advisors. Their focus is to get into your network using those distractions against your employees. Your employees are busy and focused on what they have to get done, many juggling multiple responsibilities. Hackers like these employees; it’s like candy to them.

Is there any one solution that will remove all risks? No. But there are ways you can help your employees protect themselves and your network. Ransomware, insider threats, phishing–there are so many threats that can halt operations that are critical to your business success. Be aware, prepare.

A combination of defenses helps you reduce the risks we all face in business today. Don’t assume one will solve everything. Develop multiple layers of proactive security. This can include anything from making sure your Acceptable Use Policy (AUP) is current or having consistent employee training, to firewall and virus protection, to Web-use comprehensive monitoring and filtering solutions.

It is also important to have a recorded and tested recovery plan in place. Make the assumption that a breach will happen. This way you are prepared. Most importantly, maintain current backups. Make sure that the backups are not accessible through your network!

The “one” solution to protect your business just doesn’t exist. Maintain a combination of defenses and solutions to cover as many risks as possible. Being proactive will pay off in the long run.

Trusted for over 20 years, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and Cloud Access Security Broker products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest’s Cyfin and CyBlock products to manage employee Internet usage — managing cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has clients worldwide, including General Electric, Lockheed Martin, Florida Department of Health, Siemens, Department of Homeland Security, and a growing list of global enterprises and government agencies. We are a proud long-term GSA contract holder. For more information on the company, products, and partners, visit https://www.wavecrest.net.