Awareness Technologies Corporate Security Advisory: Seven Employee Monitoring Tips For Small Businesses
Many small businesses do not have the time or resources to develop and enforce effective policies
April 26, 2011
PRESS RELEASE
LOS ANGELES, April 25, 2011 /PRNewswire/ -- With the escalating use of mobile devices and tablets, along with the growing number of telecommuters, it's critical for small businesses to stay on top of employee activity. According to the Ponemon Institute, the costs associated with data breaches caused by careless or malicious employees can be detrimental to an SMB – insider breach incidents cost businesses an average of $3.4 million per business per year. Furthermore, Ponemon's survey found that 60 percent of exiting employees walked out with company information. That added to the productivity loss caused by un-monitored employees – the average un-monitored employee wastes approximately 30 percent of their workday on non-work related web-browsing – is costing small businesses more than they realize.
While most large corporations have standard employee monitoring rules in place to prevent wasted time and the potential for data leakage, many small businesses do not have the time or resources to develop and enforce effective policies.
Ron Penna, Chief Strategy Officer at Awareness Technologies outlines seven critical and effective employee monitoring approaches for small businesses to protect their intellectual property, prevent vital information from being leaked and to maximize employee productivity.
1. Evaluate employee security and monitoring procedures to address the increasing threat posed by untrained, careless or malicious employees. 2. Limit employee access to certain websites by blocking inappropriate websites on both on- and off-network connected computers, especially off-network laptops. 3. Restrict user privileges based on the role of the user in the company. For example, allow junior executives access to webmail, but not be able to use it to send confidential data or be allowed to use potentially problematic programs such as peer-to-peer or encryption software. Restrictions can also be applied to entire departments or contracted workers. 4. Implement policies that forbid employees from copying files on to removable media like USB drives or transmitting via webmail systems and social networks. 5. Keep copies of which files contained on company laptops and periodically refresh the list, so that you have a record of information in the event of laptop theft or loss. 6. Consider installing laptop and mobile protection software that allows the ability to remotely access and delete data from devices in the instance that they are lost or stolen. Don't make the mistake of relying solely on encryption to ensure that information remains confidential. 7. Set behavioral triggers to notify appropriate department heads when risky behaviors are conducted by employees in their department such as transmitting confidential information to unauthorized parties or participation in unproductive or inappropriate activities.
While each of these tips can be very helpful in their own right, the most comprehensive, proven way to ensure employee productivity and prevent data leakage from your organization is the use of monitoring software for PCs and smartphones that can be reviewed remotely. For more information visit: www.awarenesstechnologies.com.
About Awareness Technologies
As the pioneer in Unified Insider Threat Prevention, Awareness Technologies' SaaS-based service is easily available and affordable for businesses of any size. Architected at the endpoint, clients can access 4 technologies including DLP, web filtering, employee monitoring, and laptop recovery, through one agent download and one control console. Awareness Technologies has over 10,000 businesses world-wide currently depending on its solutions to protect their data from insider threats, and has been named on Deloitte's 2010 Technology Fast 500. For more information, please visit www.awarenesstechnologies.com.
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024