SoftActivity

The futility of manual monitoring

November 29th, 2015

3297533849_a32573b118_zWhat you might have assumed already is now official: human beings have worse attention spans than your common goldfish. Hundreds of thousands of years of evolution, turning us into hyper-alert hunters and gatherers at the top of the food chain, has been undone by less than a decade of Twitter live-streams and Facebook viral stories. Goldfish (who apparently don’t use the Internet – who knew?) can pay attention to what’s in front of them for nine seconds, while your average joe on the street now struggles to stay focused for eight.

It’s just one more piece of evidence showing that people are more distracted than ever; and what technology has broken, technology can hopefully help fix. In business, computer monitoring software isn’t just helpful – it’s essential for overworked IT folks who can’t possibly have eyes everywhere at once.

Indeed, we saw just a few weeks back that in one of the most highly regulated, technical industries around, manual monitoring can be disastrous. In this case, it was airline cockpit pilots who chillingly can’t seem to stay focused on all those buttons and dials on their dashboard while their planes are in flight:Read More

Cybersecurity begins with educating your employees

November 16th, 2015

In the workplace, digital security doesn’t begin and ends with the IT guy who set up the password and computer monitoring software on your computer. Every employee in an organization, from the top down, is responsible for keeping a company safe from cyber-attacks. Security should be something every employee takes seriously, and undertakes on a regular basis as part of being a responsible member of the team.

How can employees on the front line do that? We took note of a recent interview with Robert Cioffi, CEO of Yonkers-based Progressive Computing, about ways companies can make their system less vulnerable to attack. First, he talked about the threat:

“[C]yber-criminals are relentlessly targeting the end-user or non-tech savvy person, not the IT experts at companies,” says Cioffi. “Therefore, the end users (employees) are under constant attack and must be ever vigilant.”Read More