Employee Surveillance on Steroids

So the other day I went to a conference on security and listened to a couple of rehashed arguments on why business owners should secure their networks, data and mobile devices. Pretty standard stuff.

Then we got into the latest development in employee monitoring and surveillance technology and I found myself going “whoa”, can they really do that? Sad fact is, yes, employers can really strip you down to your bones in terms of keeping tabs on what you do at work.

How would you like to see a video of the web sites you visited, emails you sent and received, chats and instant messages, keystrokes typed, documents printed etc?

There are tools available now that promise to “detail what an employee is doing every step of the way”. These tools are so advanced and detailed that they can answer questions like:

  • Which employees are spending the most time surfing web sites?
  • Who is spending time on shopping sites, sports sites or adult sites?
  • Which employees chat or use anonymous email services like Hotmail and Gmail?
  • Who is sending the most emails with attachments?
  • Which employees may be leaking company confidential information via removable media like flash drives, CDs and DVDs?
  • Which employees are printing sensitive documents?
  • Who is arriving to work late and leaving early? Who takes long lunch breaks?
  • What are my employees searching for on Google, Yahoo and MSN?

Now the question is, how does this affect employee morale and sense of privacy? I am not sure I would be comfortable working in an environment that actively monitors my every single move throughout a work day.

For those working in a high security position, or in environments that mandate strong security compliance (like the federal government’s requirement for keeping records of transactions and communications), there may some justification for this kind of paranoid Big Brother activity.

If the end result, however, is to minimize internet abuse, there are moderate software and hardware solutions that do a decent job of keeping time-wasting web sites of your network. I mean, when is it really necessary to know:

  • What web sites are being visited most frequently and who is spending the most time browsing the web? Are these web sites work-related?
  • Which employees are engaging in chat or instant messaging? Is it work-related?
  • Who is using Hotmail, AOL mail, Gmail or Yahoo mail to communicate sensitive documents?
  • What are employees searching for on Google, Yahoo, MSN and AOL?
  • Who is sending the most email with attachments and where is it going? What is contained in those attachments? Is the employee authorized to send out this information?
  • What are the top programs being run and are any of them non-work-related?
  • Which employees are playing games like Solitaire at work? How much time are they spending playing games?
  • Who is transferring the most files and what exactly are they sending out and to whom are they sending these files?
  • Who is saving confidential information to removable media like flash drives or CDs or DVDs?
  • Who is printing company sensitive files?
  • Who are the top violators of those keywords that indicate abuse (e.g.: sex, guns, gambling)
  • Which employees type the most?  Which type the least?
  • Which employees use the most network bandwidth and why?
  • Who is arriving at work late and leaving to go home early?
  • Who takes the most breaks throughout the day?

Internal espionage in corporate environments is nothing new. Many companies put systems in place to help prevent or uncover data loss by tracking users sending sensitive files as attachments or copying them to removable storage devices such as USB keys, iPods, or CDs.

So if you work in a major corporation that can afford killer internal employee monitoring software, you may want to be careful about those “business” emails to your massage therapist.

Click here to learn how Tech Prognosis can help you save on web protection for your employees and business network in Round Rock, TX and surrounding cities.

Share
Similar posts
  • Why Google’s Malware Bouncer Is Not Enough Google recently revealed that it had a malware scanner for the Android OS that automatically scans the code of apps uploaded to the Android Market. The service, which Google gave the codename of ‘Bouncer’, is said to look for behavior that are deemed unacceptable by the company. But the problem with Android Apps go beyond [...]
  • Read Your Yahoo! Emails Without Going Blind! If you are like most people, you probably have one or two email accounts with Yahoo!, Windows Live and Google. I applaud these Internet powerhouses for giving us free email accounts, but does Yahoo! Mail need to make us go blind when reading our emails? I mean, talk about Flash and JavaScript overkill!  The first [...]
  • Online Tracking & Spying is No Joke! You’ve heard about it and read tons of articles about it, but until you actually experience it, you do not realize how unnerving online spying can be. As a Computer Security Consultant, I spend a lot of time on the internet reading, researching and writing. Naturally, I subscribe to a lot of content providers for [...]
  • Take Stock: Conducting a Data Security Audit in Your Office It may mean one thing on TV, but to savvy business executives, “CSI” should stand for Carefully Secure Information. Every company has an obligation to its customers, affiliates, and employees to safeguard sensitive data. One step of the process is to “Take Stock” — conduct a CSI-style “forensic audit” of your information [...]
  • Securing Windows 7 Windows 7 has been released to the consumer market and small business integrators, administrators and owners should start thinking about their strategy for deployment and how they will go about securing their environment. From our experiences with the beta, release candidate and official release (RTM) versions of Windows 7, I must say we’ve come a [...]

1 Comment

  1. June 28, 2009    

    Employee monitoring software use may be controversial, however it is necessary in several organizations. How many employees waste time during their work hours reading their personal emails, sneaking in their personal Facebook or Twitter account, instant messaging with friends or playing games? It’s sad for the disciplined who check their own emails once in a while, but there are situations where such monitoring systems must be deployed to avoid laziness and unproductivity.

Try Any of Our Services for 30 Days!

Share
Share