March Madness, Again

It’s baaaacccccckkkkkk! Happens every year. March Madness, that is. Everybody loves it. (Well, almost everybody.)

The excitement! The fun! The astounding fast breaks, slam dunks and three-pointers! And oh yes, watching it all unfold on your office computer.

Who could not like it? Well, for openers, the overworked folks who have to worry about workforce productivity, bandwidth costs, security issues and legal risks.

Here’s just one of many worrisome predictions, “FIRST WEEK OF TOURNEY COULD COST $1.8 BILLION.” It comes from the Challenger March Madness Report. The report also states, “The men’s college basketball tournament, better known as March Madness, marks the arrival of several other annual rituals: employee-organized office pools, a potential dip in productivity and a marked decline in Internet speed, as workers soak up bandwidth watching live streaming broadcasts of the tournament games during office hours.”

Not exactly good news for businesses and government agencies during this time of troublesome economic conditions and serious budget worries.

Maybe it’s time to revisit your AUP and rebrief your workers on the negative impact their fun could have on the organization and ultimately on their own job security. And if your organization doesn’t already have a robust Internet usage management solution in place, it may just be time to look into it seriously.

Wavecrest’s Control List includes CBSSports.com and NCAA.com under the Sports category, and for those using Cyfin, access to these sites will be monitored under Sports. If you want to only block and/or monitor the live video, you can create a custom category to block and/or monitor www.ncaasports.com/mmod/player.

How Much Personal Internet Surfing in the Workplace is Too Much?

It depends on what your organization considers “acceptable.” Research shows that the average person spends around one hour per day on non-work related internet surfing.   It also shows that the majority of viruses enter via Internet surfing.

Wavecrest’s Cyfin and CyBlock products are configurable to fit your organization’s acceptable use policy. You can set acceptability ratings and visit thresholds to each category.  To set acceptability ratings, go to the Advanced Settings – Category Settings – Classification screen in your product.

With CyBlock you can select to “block” or “allow” each category and configure blocking by hour on the Advanced Settings – Filter Settings – Block Web Categories screen.  You can also configure real-time filtering with our deep packet analysis for content types and file extensions on the Advanced Settings – Filter Settings – Block Web Content screen in your CyBlock product.

Read more about personal surfing in the workplace on Business Blogs.

New CyBlock and Cyfin Upgrades

Check out the latest releases for CyBlock Proxy, CyBlock Appliance, Cyfin Reporter, and Cyfin Proxy!  These are packed with tons of great new features that we’re sure you will love.  The new features include:

  • A New Browser Interface with new colors and wider screens.
  • A Dashboard that includes:
    • A Home screen that provides an overview of the organization’s Web use for the last 7 days by displaying charts of Web-use visits, top users, top categories and bandwidth usage.
    • Top charts and trend charts with customizable parameters to view Web usage data by hits, visits or bytes, select the timeframe and compare users Web usage to the group average or enterprise average.
  • More Custom Categories.
  • Enhanced Data Warehousing that includes support for MySQL and SQL server.
  • Full 64-bit support on Windows and Linux systems.
  • Safe Search option to enforce safe search on Google, Yahoo and Bing.

Use the following links to access the full release notes for your Wavecrest product.

If you have any questions about any of the new features or upgrading, please contact Support.

Email: support@wavecrest.net
Phone (Toll-free): 877-442-9346, ext. 4 (U.S. and Canada)
Phone (Direct): 321-953-535, ext. 4

New Categories Coming Soon!

New categories are coming soon to all Wavecrest Products.  Some of the new categories include:

  • TV/Video Streaming
  • Shareware/Freeware
  • Online Meetings
  • P2P/File Sharing
  • Weapons
  • Online Storage

Keep an eye out on your product’s news, the Web site, Blog and Twitter for updates with more details on the new categories and when you can expect to see them in your CyBlock or Cyfin product.

Blocking IM/Chat with Wavecrest’s CyBlock Products

Our CyBlock Appliance offers the best coverage for blocking IM and Chat sites. The CyBlock Appliance can block the IM traffic as well as the sites to prevent the user from making a connection to the IM server.  To block IM with the CyBlock Appliance, first go to the Advanced Settings – Filter Settings – Block Web Protocols screen and check all the IM clients that you want to block.  Next, go to the Advanced Settings – Filter Settings – Block Web Categories screen and block the Chat category.  For even more coverage, you can also block the following URLs by placing them in a Custom Category or by adding them to the Chat category.

Yahoo IM: login.yahoo.com (Hardware and Software)

AOL IM: login.oscar.aol.com (Other Category)

MSN Messenger: login.live.com (Note: This site also is used for Hotmail login as well. So if you block the Hardware and Software category or this URL, you will block both MSN Messenger and Hotmail email).

To get the best filtering Chat/IM coverage with CyBlock Proxy or CyBlock ISA, block the Chat category and the sites listed above.

Few Employers Have a Social Networking Policy in Place

A recent report by Manpower found that very few companies have policies regarding social networking use.  In fact, only 29% of US companies have a formal social networking policy in place.  Social networks are not only time wasters, but they can pose serious security risks or damage a company’s reputation if employees post confidential or harmful material about the company.  No matter what an employer’s stance is on social networking use in the workplace, it is highly recommended to have a policy in place and educate employees on that policy. Joseph P. Paranac, a shareholder in LeClairRyan’s Labor and Employment Group has offered Web-use policy suggestions on what companies should include.

If you’re unsure whether or not you want to block social networking, we have also written a paper that addresses the issues surrounding social networking use in the workplace, the importance of creating a policy, and monitoring or filtering employee’s Web use according to that policy.

White Paper: Social Networking or Social Not-working?

Source: https://www.emarketer.com/Article.aspx?R=1007493

Wavecrest’s RealTimePlus Filtering

RealTimePlus is our customer-configurable three-layer filtering process. It uses three layers of screening based on: (1) custom categories, (2) the Wavecrest categorization (control) list and (3) a real-time deep packet analysis process.

1. Custom Categories (the “First Layer”). ‘Custom categories’ supplement the standard categories. This enables you to better identify and control your users’ Web activity.   For example, you can create a custom category to:

  • Serve as a “white list” that contains all sites to which visits are allowed (while blocking all others).
  • Track and possibly block access to ‘standard’ sites that are not in the Wavecrest URL List but are of special local interest or concern.
  • Serve as a “black list” that contains all sites to be blocked (while allowing access to all others).
  • Track (but not block) visits to internal servers (intranet sites) and/or partner sites.

You can add custom categories at the Advanced Settings – Category Setup – Custom Categories screen. Then use the Advanced Settings – Category Setup – Edit URLs screen to add sites into your custom categories.

2. The Wavecrest URL List (the “Second Layer”). To accurately identify and categorize the vast majority of visits, Wavecrest products use a large, mature categorization control list.  This ‘control’ list consists of 69 ‘standard’ content-identification categories that is updated daily with URLs from around the world.  We recommend that you download the list daily to get the best filtering and monitoring coverage.   You can setup an automatic daily download of the list at the Administration – URL List – Schedule screen.

Another great customization feature with the control list is that you can add and move URLs in the standard categories.  For example, if you use Twitter as a Marketing tool but want to continue to block all other social networking sites, you can simply add www.twitter.com to the Marketing category.  You can make this change at the Advanced Settings – Category Setup – Edit URLs screen.

Finally, set your block/allow policies for your custom categories and standard categories at the Advanced Settings – Filtering Settings – Block Web Categories screen.

3. Deep Packet Analysis (the “Third Layer”). Using real-time ‘deep packet analysis,’ CyBlock can determine if the content of a URL is Flash, video streaming, audio streaming, images, Active X and more.  Any or all of these could be considered “inappropriate” and can be blocked.  You can also add your own extensions to be blocked.  You can block these types of content or add your own at the Advanced Settings – Filter Settings – Block Web Content screen.

Other Features

1. Hourly Blocking. You can block or allow categories at specific hours during the day.  For example, you may want to allow access to some categories during the lunch hour. You can set these hourly policies by clicking on the clock icon at the Block Web Categories screen.

2. Customizable Blocking Message. CyBlock comes with a standard blocking message, but you can configure the product to point to your own Web policy or personalized blocking message.  You can set this custom message at the Advanced Settings – Filter Settings – Web Blocking Message screen.

Blocking Unusual Facebook Site Variations

Facebook has set up their site so that if a user types “www.www.facebook.com”, they will be able to access it through any Web filtering proxy blocking www.facebook.com.  Users can even type in variations, such as “www.www.www.facebook.com” or “hello.www.www.facebook.com” to get access to Facebook.

If users are accessing Facebook by using one of these many variations, it will not show up in reports under the category of Social Networking.  Instead, the URL is categorized as “Other” and is displayed this way in reports.

For now, to prevent users from accessing the site using these variations and to categorize these variations as Social Networking, you need to add the URL as a wildcard to the Social Networking category. To do this, follow the below instructions.

  1. Go to Advanced Settings – Category Setup and click on the Edit URLs link.
  2. Use the Select Category pulldown and select Social Networking.
  3. In the text entry area for Custom URLs, type in the wild card URL *.facebook.com.  If you want to block any time the term facebook shows up in a URL, type in the wild card *.facebook.*

The Wavecrest Development Team is currently looking into alternatives to better handle these types of site variations within the Wavecrest Control List while maintaining speed and scalability in our products.

Wavecrest Computing’s End of Year Sales Specials

Now is your last chance to take advantage of one of our sales specials on our CyBlock Internet filtering or Cyfin Internet monitoring software. These specials will end on December 31, 2009, so act fast!

Purchase a one-year license and get one extra month free! That’s a 13-month license for the price of 12!

Interested in a multi-year license?
No problem. For purchasing a 2-year license, you’ll get 2 extra months, or get 3 extra months with the purchase of a 3-year license.

New to Wavecrest?
Enjoy the following discounts when you purchase a NEW 2 or 3-year license:

  • 20% off a new 2-year license
  • 30% off a new 3-year license

Coming Up For Renewal?
In addition to getting the extra months, if you purchase a multi-year renewal license, you’ll also get to enjoy the following discounts:

  • 15% off a 2-year license
  • 20% off a 3-year license

To take advantage of these specials, simply state that you would like the “End of Year Sales Special” when you order!

For a quote or to place your order, contact sales.

Phone (Toll-free): 877-442-9346, ext. 3 (U.S. and Canada)
Phone: 321-953-5351, ext. 3
Email: sales@wavecrest.net

What Is the Purpose of the ‘IP Address’ Category?

From time to time we are asked, “What is the purpose of the ‘IP Address’ category used by Wavecrest products?” The short answer is — it’s used to capture and segregate the IP addresses of Web sites that the product was unable to associate with ‘regular’ categories. Customers can then analyze them to identify network security threats, traffic to intranet sites, or other patterns of interest.

Here’s a bit more detail.

First note that our products identify many IP addresses and place them in content categories. The Wavecrest URL (control) list contains many such addresses.

Unfortunately though, initially unidentifiable IP addresses still appear from time to time. Generally speaking, we see three types, i.e., addresses associated with:

  1. Internal (and partner) Web pages
  2. Innocent links on Web sites
  3. Possible malware or virus servers

When the product encounters any of these three types, it places them in a special ‘IP Address’ category. Customers can then run reports on that category the same way they do on any other category. In addition, if the customer runs a Top Non-Categorized report, the uncategorized IP addresses will be listed along with uncategorized domain names.

Because the traffic associated with unidentified IP addresses can be important or even dangerous, it’s obviously desirable to pursue the matter further. So what can be done? Well, with a bit of work—and in some cases with some help from Wavecrest—it is possible to:

  • determine the source and purpose of most of the addresses
  • categorize the legitimate ones
  • isolate/neutralize the malicious ones

Let’s see how this is done. We’ll take it one ‘type’ at a time.

  1. Internal and Partner Web Pages. Some unidentified IP addresses may have resulted from users going to internal (intranet) or partner sites. (These normally would not be in the Wavecrest URL list.) To address this issue, start by running a Top Non-Categorized Sites Report or IP Address Category Report. Using your local knowledge, try to determine the IP addresses of those sites and then enter the information in one or more custom categories. (Instructions on how to create custom categories can be found in our manual.)
  2. Innocent links on Web Sites. These addresses could be associated with image or ad servers. If you want to address this issue, send a copy of a Top Non-Categorized Sites (“OtherWise”) Report to Wavecrest (sites@wavecrest.net). Our categorization team will then research and categorize the unidentified IPs for you the same way they categorize domains. If you would like to identify the IPs yourself, you can use IP address lookup tools such as the one available from https://www.networksolutions.com. This tool will provide you with information about the owner of the IP address(es) of interest. For example, the owner of the IP address could be a marketing company that serves ads, or it could be an image server. Once identified, if you desire, you can add the addresses to one or more custom categories.
  3. Possible Malware or Virus Servers. Some of the unidentified IP addresses could be associated with malware, spyware or virus servers. The clue here is very high around-the-clock traffic. This is an indication that the user’s computer has been infected or attacked. The solution in these cases is to isolate the internal computer(s) and remove the malware/spyware or virus. Here’s an approach you can use to help solve this problem.
  • Using the Dashboard, run a Trend report on the IP Address category and look for any unusual spikes. If you see anything suspicious then …
  • Run a category audit on the IP Address category and look for large amounts of activity coming from a particular PC(s). Make a note of the IP address(es) and then scan for infected files.

Summary. The IP address category was created to be a ‘red flag.’ Its purpose is to alert you that further action may be needed to resolve problems or to simply give you a more complete and comprehensive picture of all Web activity.