Tag Archives: Web Monitoring

A tale of two security approaches – and why you need both

Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent, to create software that can cause harm by shutting down a system or an entire network, destroying data and/or programs, or collect information and send it back to the attackers.
Continue reading

Internet Access – Serious Business in Dangerous Times [Free eBook]

Written by: Christina Goggi

Do you know just how dangerous the Internet is? Have you been scared WebMonitor_EBook_340x340-2-300x300(or even scarred) by enormous charges from your Internet Service Provider for bandwidth usage? Are you trying to figure out why so many of your users seem to be busy all the time, but never get anything done? Have you dealt with complaints from the business or customers about how slow the website is, or why does it take so long to send or receive an email? If you can answer yes to even one of those questions, we may have the answer for you in their latest eBook, The Most Dangerous Sites on the Internet!
Continue reading

Porn in Parliament – Also in Your Office?

It is not the first time that online pornography has stirred controversy in the UK. The recent government’s decision to automatically opt-in home users to onlineporn adult websites was quite controversial with many people saying that it is not up to the government to decide what websites people can visit at home. It’s funny how, within only a matter of few weeks, official figures released under the Freedom of Information Act show that there have been thousands of blocked attempts to access pornographic websites. The official version is that users typically end up on these websites accidentally, they come up as pop-ups from other websites and that automatically refreshing websites will generate more hits per user – a feeble attempt to wipe egg off their face.

Why does this happen

It’s difficult to pass judgement on this issue. My view is that when someone is in their office, bored or tired after a long day, and having ‘exhausted’ their energy on Facebook, they might think that a quick peek at a ‘naughty’ website will not harm anyone? It’s also fair to say that most users probably already know that a web filtering solution is in place, and that their internet activity is monitored, so most of these are more likely than not deliberate attempts to access blocked online material. A user might come across an adult website while researching other topics, but the sheer number of attempts detailed in the statistics simply does not add up to this conclusion. When a specific website is visited, then it indicates intent to do so; however that’s up to the reader to judge
Continue reading

Strategies for boosting your practice’s information immunity

Introduction

Every day, viruses – along with worms, spyware, Trojans, bots, rootkits and other malicious intruders – infect millions of computers and shut down businesses large and small all over the world. Medical practices are not immune to these threats and their ensuing data breaches.

Rich repositories of personal, clinical and financial data, combined with relatively modest information management capabilities, make medical practices prime candidates for numerous cyber threats, from hacking to computer viruses. These threats will likely be more widespread as practice management systems increase in sophistication, patient information becomes more connected through electronic health records and health information exchanges and health data became more accessible as practices increase their use of tablets, smartphones and other mobile devices.
Continue reading

Why You Need to Consider Having Layered Security within the Organization

Not everyone understands that managed_security_layered_approach_clip_image002network security isn’t just about one specific issue. As a result, many end up not taking the required action to secure their networks. Some businesses believe that investing in an antivirus solution will cover every base.  Some wouldn’t even go that far as they’d think that a good firewall can prevent anything bad from entering the business network. If only they knew how wrong they are.
Continue reading

Web Filtering to Off-Network Laptop and Notebook Devices with GFI WebMonitor® 2013

GFI WebMonitor 2013;GFI-WebMonitor-logo2-300x108 this new version enables IT managers to deploy a roaming Web filtering agent on laptop and notebook devices. With this new agent, businesses can extend corporate browsing policies to company assets running outside of the corporate network and provide continuous filtering protection whether employees are in-house or on-the-go.
Continue reading