Another Reason Organizations Should Avoid Excessive Internet Blocking

Google Alerts have become an invaluable tool to keep track of WebSpy’s online presence and mentions. I’m also alerted on keywords related to other players in the Internet Security Industry. The last couple of weeks I have noticed quite a steep increase in alerts on a well-known internet blocking and filtering vendor. Majority of these …

Santa Claus is Coming to Town – Ho, Ho, How will it Affect your Workplace?

Tis should be the season to be jolly but it looks like employers have reasons to watch out, and maybe even cry, all because Santa Claus is coming to town. Gallup has reported that Christmas spending intentions are currently down, compared to last year. Americans are planning to spend an average of $740 on gifts …

Lessons learned from a hacked Twitter account

If you follow @WebSpy on Twitter, you would have received a very strange Direct Message (DM) from us yesterday. Something along the lines of “rofl this you?” or “you’re on this vid!” or “I found you on here!”

Unfortunately, the WebSpy Twitter account fell victim to a phishing scam, and as a result sent phishing spam to all our Twitter followers. We are embarrassed by the incident and we apologize to all of our followers, especially the ones that clicked the link in the DM and were caught by the phishing scam themselves.

Here’s a rundown of the event in the hope that it will help others know what to look out for.

How should Employees use Social Media?

WebProNews is an online news site covering the latest developments in search engines, SEO, social media marketing and online advertising and I have been subscribing to them for many odd years. Recently they have been posting interviews, surveys and comments in relation to the use of social media. New research from Robert Half Technology indicates …

How to Improve Public Proxy Management and Control

Using public proxies generally involves browsing to a public proxy website to request access to another site, usually blocked or prohibited by organizational policy. When accessing sites in this fashion, firewalls, filtering devices and monitoring solutions are only aware that an employee, or student, has accessed the public proxy site, and not the actual end …

Notes on E-Security Development

Today, I had the pleasure of attending Western Australian Internet Association’s first (out of four) breakfast events. The main topic on the agenda was E-Security and a panel of expert, representing commercial, government and educational bodies, were there to shed a light on the latest developments.

How to Educate your Workforce and Strengthen Security with Internet Monitoring

Today I received a phone call from one of our clients who had read my previous blog: “How to Benefit from Monitoring Good Web Activity”. This blog is focused on how you can benefit from monitoring internet activity that is not generally perceived as bad, or unproductive. The client, a network administrator at a large …

Internet Monitoring Best Practices – 10 Valuable Tips

The benefits of allowing employees monitored Internet access, instead of extensive blocking and filtering, have been explored in previous blogs. In essence, an effective monitoring solution will assist in maximizing employee productivity, identifying download issues, improving network management and minimizing litigation risks. Something of great importance is taking the users of the network you intend …