October 14th, 2015
Photo Credit: Working World
We’ve all heard the old proverb for dealing with school bullying, about sticks and stones. Not really that effective, back then. Less so, today. The image of the school bully beating up kids for their lunch money has been replaced by a more sinister digital monster. Children can now spread rumors and lies about other children through the powerful anonymity of the Internet, facilitated by the rise in young people owning cell phones.
According to the National Education Association in the U.S., an estimated 160,000 children miss school every day due to concerns over bullying. And given that most children are socialized by their peers not to “tattletale”, sometimes the hardest part is telling adults there’s a problem at all. Until it’s too late, that is.
Canada has one of the most infamous examples of cyber bullying. In 2012, Port Coquitlam teen Amanda Todd committed suicide due to constant harassment and even blackmail.Read More
October 7th, 2015
SoftActivity announces the release of SoftActivity Keylogger version 8.1
Improvements in version 8.1 include:
- recording of Internet history in new Edge browser in Windows 10;
- recording of store-apps in Windows 10;
- improved support of high-DPI monitors and systems with different per-monitor DPI settings;
- minor fixes and improvements
Download new version 8.1 now
October 7th, 2015
We are glad to announce the release of Activity Monitor version 10.2 with full support of Microsoft’s new Window 10. Activity Monitor now records Internet history in new Edge browser, user’s activity in store-style apps and more.
New features in Activity Monitor version 10.2:
- official support of Windows 10, including:
- recording of new Windows Store apps;
- recording of Internet history in new Edge browser;
- improved support of high-DPI monitors and systems with different per-monitor DPI settings
- support of new Outlook 2016 for email recording
- other improvements and fixes
October 5th, 2015
Photo Credit: Kris Krug
One of the biggest concerns of any employer in the digital age is the ease with which employees can become distracted, wasting their time browsing Facebook, which in turn is wasting your time – and your money. But a new studies shows employers may be (a little bit) more lenient when it comes to giving employees a break.
September 29th, 2015
Photo Credit: Perspecsys Photos
The world’s 10 largest economies lost $445 billion USD annually through cyber-crime last year. Concerned about cyber security? You’re not alone.
Fewer than 10 per cent of companies currently purchase cyber-specific insurance policies, suggesting businesses are ill-prepared to face the growing threat to intellectual and data property rights.
A new report from Allianz Global Corporate & Specialty (AGCS) indicates the global cyber insurance market is forecast to grow to more than $20 billion USD by 2025, a compound annual growth rate of over 20 per cent. The bulk of that increase will be felt in North American markets, according to the report.
The risks to businesses from the worldwide web has increased exponentially year to year, with companies reporting it as the fifth largest risk in this year’s “Allianz Risk Barometer”, compared to its 15th place ranking just two years ago.Read More
September 21st, 2015
Photo Credit: Don Hankins
This is Part 2. Part 1 “Offboarding Right” of these series is posted here
Think all this worrying about disgruntled employees might be a bit overblown? Perhaps you recall the Sony security breach from a few months back wherein a ton of company data got turned over to North Korean hackers. The company is still picking up the pieces from that one – and analysts believe it all started with a combination of outside threats and an internal employee breach.
September 14th, 2015
Photo Credit: Mr. Seb
You’ve done all the right things to protect your network from both insider threats and outside hackers. Employee computer monitoring is just one of the tools you’ve used to keep your intellectual property (IP) safe, along with antivirus software, a properly set-up firewall and other bits and pieces put together by your IT team. But one area where companies seem to still be vulnerable is with leaving openings to former (and potentially disgruntled) employees.