SoftActivity is announcing the release of SoftActivity Monitor version 11.7. Upgrade is recommended to all usersRead More
Cold boot attacks have been a tool that hackers have used to gain access to data for many years now, with the first vulnerability being discovered in 2008. Most of these old vulnerabilities have since been patched, but there is a new one that has recently been discovered and could already be used to steal corporate data.Read More
We have released new version 11.6 of SoftActivity Monitor, a leading user monitoring solution that helps to protect organizations from insider threats.
Product name has now been changed to SoftActivity Monitor from Activity Monitor, in order to be more recognizable and include our brand. It’s a maintenance release that includes a number of important optimizations and fixes. Upgrade is recommended to all users.Read More
According to the Glassdoor, the average company in the United States spends almost $4,000 to hire a new employee and about 24 days to fill the position.
The costs are many including sourcing candidates (job boards, career fairs, website postings, referral rewards, external recruiters, etc.), screening candidates by telephone and in person, testing (hard and soft skills) plus negotiating an acceptable offer. Add to that the cost of training which is estimated at $1,075 per learner according to the 2017 Training Industry Report and you are looking at a tidy sum to attract, train and retain top talent. If they leave for any reason, you are tasked with repeating this process (and cost) all over again.
Employee monitoring is an incredibly useful tool for any company. Not only is it handy to make sure that your employees are doing the work that they’re supposed to be doing, but it can provide useful stats regarding their work habits and how they spend their time.
Yet, with all this data, it can be difficult to figure out how to best utilize this information to help boost your employees’ productivity. While there is limitless potential with the data you collect, there are a few key things you can start with that should give you good results right off the bat.Read More
In the old days, protecting trade secrets was relatively straightforward. You kept many of these items on paper, locked up in special spots. Today’s environment is so different, it’s hard to know where to begin.
Companies worry a great deal about insider threats – the idea that any disgruntled employee or someone infiltrating the company’s physical or digital space is going to get their hands on trade secrets, customer information, financial details or anything else that can have a negative impact on the company’s operations and reputation.
Are you concerned about government employee fraud (cheating for profit) and embezzlement (misappropriation of funds)? After all… it’s your tax dollars!
Insider threats are a part of any organization in government and industry. According to Transparency International in their latest Corruption Perceptions Index report on public sector corruption – over 68% of 180 countries failed a passing grade. The USA performed reasonably well (75/100 score), but is not without its own challenges.Read More
According to CIO DIVE “Insider Threats” are the #1 cybersecurity concern in 2018.
By definition, insider threats include any malicious attack on an organization from current or past employees, business associates or anyone with access to the company’s proprietary data that could be used against them in a detrimental way. Read More