Social Networking or Social Not-working?

Social networking in the workplace is a major dilemma for today’s businesses. Does it help or hurt the organization? While some companies block social networking, some say it helps by enhancing collaboration among employees, partners and customers. Others say it hurts by draining productivity and bandwidth and creating legal liability and network security risks.

A survey conducted by Nucleus Research showed that 77 percent of workers who have a Facebook account use it during work hours. Of those who do use Facebook at work, 87% said they could not define a clear business reason for accessing the site and some reported using it as much as two hours per day.

So, in the face of all the countervailing views, just what is the best approach to the issue? Options include banning it altogether, using it with no restrictions, and employing it for business purposes only.

The short answer is, “It depends.”

That is, for any one organization, the answer really depends on management’s views on a number of issues. Among these are the nature and objectives of the business, organizational culture and managerial style, workforce morale factors, workforce demographics and skills, availability of technological solutions, and the need for external communications.

We are often asked about this issue.  So we developed this paper to share our knowledge and views. It explores various aspects of the issue, cites some relevant facts, and provides several recommendations. Our hope is that this information will help organizations that are struggling today with this contemporary and very important issue.

Read the full white paper: Social Networking or Social Not-working?

Don’t Forget to Update Your Web-Use Policy

There has been a lot of buzz surrounding the use of social networks, i.e., Facebook, Twitter, LinkedIn, etc.,  in the workplace recently.  This is a great reminder to all organizations to take a look at their current Web-use policies and update them.

Reuters covered a recent seminar put on by LeClairRyanon covering “Key Issues in Labor & Employment Law,” where the importance of a policy for social networks was discussed.  The speaker, Joseph P. Paranac, a shareholder in LeClairRyan’s Labor and Employment Group, stated, “Inappropriate and unwise use of online social networking sites like Facebook and Twitter is a growing source of liability risk for employers, including discrimination, defamation and retaliation claims.”

He went on to offer some Web-use policy suggestions for employers.

“In order to have a successful policy on the use of social networking sites, Paranac told the audience, employers should stipulate that:

  • Employees may not comment or use any confidential information about the employer or discuss internal matters.
  • Use of online social networks should be limited to non-working hours, unless the use is for legitimate business purposes.
  • Employees’ comments should not be discriminatory or harassing.
  • Similarly, they should not be disparaging or defamatory to the employer’s business.

The veteran attorney also offered the following elements of a successful Internet and e-mail policy:

  • Employees should be trained on electronic communications equipment parameters and prohibitions.
  • All business systems and company-issued electronic communication equipment and data belong to the employer.
  • Systems and equipment must be used for appropriate and lawful business purposes only.
  • Employee use is subject to review/monitoring by the employer and employees who use employer equipment have no expectation of privacy.
  • Use of systems and equipment for harassment, discrimination, or defamation is strictly prohibited.
  • Disclosure of employer confidential information is strictly prohibited.
  • Warn employees of the penalties or policy violations.
  • Obtain a signed acknowledgment of employee receipt of policy.
  • Include a procedure for reporting violations.
  • Enforce the policy!”

Read the full article: TWEET: ‘I’m About to Testify in My Defamation Case!’

Online Holiday Shopping: Here We Go Again

It’s that time of year again! The big Christmas shopping spree. As in previous years, the online version ‘officially’ starts on Cyber Monday – the day after the big T-Day weekend. And now this year we’ve got Green Monday (December 7) and Brown Monday (December 14). These are days on which, like Cyber Monday, online retailers put on a full court press to draw in ‘surfer-shoppers.’

And the whole circus runs through New Year’s Day.

The volume can be huge and problematical for employers. A survey conducted for ISACA, an association of 86,000 information technology professionals, states in part:

“Employees plan to spend nearly two full working days (14.4 hours) on average shopping online from a work computer this holiday season. One in 10 plans to spend more than 30 hours shopping online at work. Convenience (34%) and boredom (23%) are the biggest motivators.”

“… the second annual “Shopping on the Job: Online Holiday Shopping and Workplace Internet Safety” survey found that half of those surveyed plan to holiday shop online using a work computer.

“Dangers of shopping online include viruses, spam and phishing attacks that invade the workplace, resulting in financial losses due to reduced productivity and destruction or compromise of corporate data.”

In addition to generating network security and performance issues, online holiday shopping is a huge productivity waster for businesses. When workers are shopping, they’re not ‘minding the store.’ Accordingly, this is a good time for all types of organizations to take stock of their Web-use management practices and seek help if needed.

Wavecrest Computing is ready to provide that help.

Wavecrest’s Cyfin and CyBlock products and services help all types of organizations manage and control inappropriate and risky personal surfing of all kinds, including shopping. Cyfin and CyBlock products do this by monitoring and/or filtering employees’ Web use and reporting on the activity by content categories, e.g., shopping, sports, games, and others. Of particular note, with regard to holiday shopping, CyBlock products can be set up to block Web access by categories and by hour so employees can access shopping sites on their lunch break or after hours. This approach can help sustain morale while minimizing the risks associated with online shopping.

For 13 years, Wavecrest Computing has been providing Internet filtering and monitoring solutions to business, government, and educational organizations worldwide.  Wavecrest’s customer base includes well-known names such as the HP, Procter and Gamble, Burlington Northern Santa Fe Railway, Bridgestone, Mazda and many others.

Wavecrest’s 13th Birthday

We’re Wavecrest Computing, a leading developer of Internet usage management products. Today is our thirteenth birthday. So we’re taking a moment to celebrate, look back, and reflect on some of our accomplishments over the years.

Since 1996, from our base in Melbourne, Florida, we have developed, marketed and supported a spectrum of innovative Internet monitoring and reporting solutions. Our products help all types of organizations manage their employees’ online activities and ensure compliance with acceptable use policies. Starting thirteen years ago with a single customer, our client base has grown to more than 3,000 organizations, many of them Fortune 500 companies and high profile government agencies.

We’re extremely proud of this. But it didn’t just ‘happen.’

The credit goes to an unusually talented and well-led team of development, sales and support people. They all work directly for Wavecrest; none are outsource or temporary employees. For years these dedicated men and women have made sure that we consistently deliver the products and services that our customers need to meet the many dynamic challenges associated with use of the Internet in the workplace.

And those challenges have certainly evolved over the years. Examples include the very real and seriously increasing risks of productivity losses, bandwidth drains, legal liability, and network security threats. And as the Internet grew and the challenges escalated, we have kept pace every step of the way.

Our first product— a basic software application called ProxyReporter—read and analyzed employers’ outbound Web logs. From that data, it then produced reports that helped management and IT monitor employees’ use of Web access.

Then, as the Internet became more sophisticated, we went on to develop a series of increasingly robust Web-use monitoring and filtering products designed to suit a variety of customers and network infrastructures. Our monitoring products now include Cyfin Reporter—a highly sophisticated and scalable logfile analyzer/reporter—and Cyfin Proxy, a standalone Web proxy/monitor/reporter. Our combination filtering/reporting products include CyBlock for ISA—a combination filter/reporter system for use with Microsoft ISA products—and CyBlock Proxy, a standalone proxy/filter/reporting solution.

Our latest innovation is CyBlock Appliance, a hardware based Internet-usage management device. Designed to monitor and help control use of all Internet protocols, CyBlock Appliance is a standalone proxy, monitor, filter and reporter.

Of particular interest, in recent years, we have upgraded all of these products to deal with emerging issues associated with a variety of Web 2.0 advances such as social networking. At the same time we have been busy incorporating new features such as protocol filtering and trend reporting.

Through the years our products have been well received and proven to be highly reliable and cost-effective, and we back them all with a 90-day money-back guarantee.

As proud as we are of our products, we take equal pride in our support services. When customers call, they talk to a real person—here in America—and they get personalized attention. Our support personnel, all of whom have been with us for years, know that customer satisfaction is key to the company’s (and their own) success. And as a result of their responsiveness and professionalism, they have received literally hundreds of kudos and compliments over the years.

So, in sum, we have much to celebrate and be proud of.

Happy Birthday, Wavecrest!

Managing Groups and IDs in CyBlock and Cyfin

There are two options for managing your Groups and IDs in Cyfin or CyBlock.  You can manage them either “Inside the Product” or “Outside the Product.”

By choosing to manage your Groups and IDs “Inside the Product,”  it means exactly that.  You can manually add, delete and move Groups and IDs in the product.  If you import your Groups and IDs from Active Directory or a text file, each time your Groups and IDs are imported either manually or scheduled, only NEW Groups and IDs will import.  The new Groups and IDs that are imported will be based on your configuration setup in the Active Directory Setup wizard.  Your existing Groups and IDs will not be modified, which means if a user left or moved departments, he/she will have to be deleted or moved in the product.  If you want to have users in the VIP group, you must use the “Inside the Product” option.

If you select to manage your Groups and IDs “Outside the Product,” then you will be only managing and making changes to your Groups and IDs at the directory source.  Each time Groups and IDs are imported, whether manually or scheduled from Active Directory or a text file, all Groups and IDs will be updated to identically match that configuration. Typically this option is not used because the directory source is grouped according to your network setup and not according to how you will want to apply Web-use policies.

Summer 2009 Newsletter

Check out the Wavecrest Computing Summer 2009 Newsletter.  Topics include:

  • End of Year Sales Specials – Discounts for New and Existing Customers
  • New Rack Mount CyBlock Appliance
  • Managing and Customizing Categorization in Cyfin and CyBlock
  • Displaying Login Names and IP Addresses in Reports

New Advanced Reporting Options

New advanced reporting options were recently added to Cyfin and CyBlock. You can configure these options by going to Advanced Settings – Report Settings in your Cyfin or CyBlock product and clicking on the Advanced Options link. The new options include the following:

  • Check For New Logfiles. Before running a report, the product will check for any new logfiles. This option is selected by default.
  • Compress Reports For Email. This compresses the report attachment for read-only reports in an email as a .zip file.
  • Display Login Name and IP Address. Select this option if you want to see both the login name and IP address for each record in the report.
  • Include All Group´s Users. This will display a user ID even if there is no data for that ID in a User Audit Detail or Category Audit Detail report.

If you have any questions about these settings, contact technical support by phone at 321-953-5351, ext. 4 or by email at support@wavecrest.net.

More Businesses Monitoring Employees’ Internet Use

More businesses are monitoring their employees’ use of the Internet due to a constantly evolving Internet and increased security and productivity concerns.  A recent article, “Big Employer May Be Watching,” from the Tampa Bay Business Journal discusses these concerns in more detail and provides advice from various IT professionals in the field of Employee Internet Management.  Below is a snippet of the article with advice from Wavecrest Computing’s VP of Business Development, Dennis McCabe.

The reasons why companies monitor employees has changed over time, said Dennis McCabe, VP of business development at Wavecrest Computing Inc., a developer of management software based in Melbourne.

After the burst of the dot-com bubble companies grew increasingly concerned with productivity. The concern later shifted to security issues posed by unwanted e-mail or “spam.” Productivity is once again a concern with the economic downturn, as well as security within a company, he said.

“This is not a firewall where you might have unknown hackers that might attack you. These are people working in your building, colleagues,” McCabe said.

Communication between management and staff is essential.

“You need informed management about how employees are using it and based on companies’ philosophy,” McCabe said. “They need to formulate a policy based on that.”

Online Video Viewing is Up

According to Nielsen’s “VideoCensus,” online video viewing is up this year compared to last.  Total video streaming was up 31.4%, and viewers spent an average of about 3.5 hours watching online video in July.  This is an increase of 42.2% from 2008.  The most popular video Web site was YouTube with over 7 billion streams in July 2009. A simple 5 minute video on YouTube uses 12,500 kilobytes in bandwidth.

Online video viewing often happens in the workplace where users have access to a faster Internet connection.  This can cause network slowdowns or latency in the workplace if abused.

The below Cyfin and CyBlock reports can be used to track bandwidth usage by users and identify potentially troublesome sites.  These reports can help you anticipate overload possibilities and the need (or lack of need) to purchase additional capacity.  If abuse can be detected and brought under control, the cost of additional capacity may be avoided.

  • Site Analysis Bandwidth Report – Focusing on kilobytes by classification, category, and users, this report gives a good overview of whether the majority of bandwidth consumption was acceptable and which categories and users used the most bandwidth.
  • Top Bandwidth Sites Report – This report shows the top bandwidth consuming sites and their categories for the specified time period.
  • Network Information Report – Find out your busiest time of day for Internet use with this report.  It shows visits and kilobytes read by hour.

Source: https://www.emarketer.com/Article.aspx?R=1007247

Categorization Update for YouTube

YouTube(www.youtube.com) has been moved to the Streaming Media category. It was previously categorized as Social Networking. This change will take effect in today’s URL list download in your Cyfin or CyBlock product.

You can change how sites are categorized by going to the Advanced Settings – Category Setup – Edit URLs screen.  Simply use the pulldown to select a category that you wish to assign a site (or sites) to.  Then enter it in the text box, and click Submit.  From then on, the site will be categorized as being in the category you just assigned it to.  You can confirm this by going to the Advanced Settings – Category Setup – Check URL screen and typing in the same site you just re-categorized.

In addition to this ability, you have Custom Categories, which are empty and available for you to use.  These categories can be populated with sites of your choosing, and you can even rename the custom categories on the Advanced Settings – Category Setup – Name Custom screen.  With these tools at your disposal, you can customize the product to truly suit your unique environment.