Author: DigitalEndpoint
-
Are Telecommuting Employees a Threat to Your Business?
“In 2013, former U.S. Vice President Dick Cheney had a heart implant put in. It was a miracle of modern technology – except for one…
-
What’s Your Hack Response Plan?
For IT workers, there have been some chilling headlines in the past few years: Major data breaches at Sony, Target and Walmart, the high profile…
-
In Cyberspace, Insider Threats Are your Top Concern
There’s a growing awareness among organizations that significant cyber weaknesses are coming not from hackers on the outside, but from their own employees. Consider this…
-
Feds’ Recent Focus on Hacking Confirms Internal Threats a Rising Concern
U.S. federal IT managers have woken up to how vulnerable their systems are to insider threats: More than three-quarters of those surveyed recently said their…
-
Some of the Worst Ways to Monitor Employees
Monitoring is a key part of management. Employee monitoring can take many forms, from the humble punch clock to sophisticated software. At its best, monitoring…
-
Employee Monitoring in Singapore | What’s Allowed?
If you’re in Singapore and you want to monitor your employees, you’re in luck. The law apparently allows you to keep an eye on workers…
-
How to Monitor Employees’ PCs …Without Going Too Far
We know by now how much sense it makes to monitor employees: for productivity, to protect your networks and to safeguard your intellectual property. But…
-
Canada’s BYOD Guidelines: How They Can Help You
Many governments and organizations are just now realizing the importance of setting up BYOD guidelines to protect themselves against possible data breaches through workers’ devices.…
-
When Can You Read Employees’ Emails?
Most managers would rather not spend their time reading employee emails. Aside from the practice bordering on the creepy, it’s fair to assume employers have…
-
How To Introduce Employee Monitoring To Your Employees
Employee monitoring makes sense. It keeps track of workers’ productivity, prevents hacks and malware from being introduced into systems, and protects sensitive company data. Employer…
-
The New EU Data Protection Regulations: What They Mean for You
The EU is preparing to upgrade its data protection regulations this year, and there are changes in store for employers regarding the protection of employee…
-
The Best Employee Monitoring Software: What’s Right For You?
Trust – difficult to earn and easy to lose, and yet it’s a business imperative – As a manager and business owner, you must earn…
-
What Happens When an Employee Loses a Company Device?
It seems there’s a new headline almost every day: Computers stolen. Data lost. Customers’ security at risk. There’s a surprising amount of data out there…
-
Why startups should monitor employees’ PC / Mobile access
So you’ve launched your Big Idea and your startup is finally off the ground. You have staff and funding, and your office space is up…
-
Employee Monitoring in Hong Kong – What’s Allowed?
It’s easy to see why employers in Hong Kong may want to monitor workers in the wake of a December 2014 survey by the recruiting…
-
Why HR wants to monitor your PC / Mobile access, and why you should let them
Most of us are hard workers. We arrive on time, do our work, go home and go to bed, only to get up the next…
-
Employees: The weak link in your company’s security?
You need employees to run your business. Without them, you’d have to do everything yourself – and let’s face it, you can’t do EVERYTHING. But…
-
What We Can Learn from the Ashley Madison Breach
Legions of wannabe spouse cheaters were exposed to the world in August after a massive data breach of the Ashley Madison website. The website claims…
-
Bring On BYOD! Best Practices for Bringing Your Own Device
Do you know what BYOD is? It stands for “bring your own device,” and it’s the practice of employees using their own phones, tablets and…
-
Digitalendpoint at RackSpace Solve, Hong Kong
[et_pb_section admin_label=”Section” fullwidth=”on” specialty=”off”][et_pb_fullwidth_header admin_label=”Fullwidth Header” title=”Digitalendpoint at RackSpace::Solve Hong Kong” subhead=”Building KnowIT Services Around The Cloud at RackSpace::Solve, Hong Kong 2015″ background_layout=”dark” text_orientation=”center” header_fullscreen=”on”…
-
Employee Monitoring and Productivity: The Positive Correlation
Employee monitoring is not about keeping checks and balances for the sake of company protocol. It is about data protection, compliance and guarding against very…
-
How To Avoid Employee Monitoring Gone Wrong
Cyber-attacks are part of the digital landscape businesses have to navigate today. Running alongside this is the growing need to monitor employees to ensure they…
-
3 More Employee Google Searches To Look Out For
Whilst searching for a sofa for sale during your lunch-break is innocuous enough, employers need to be aware when employee Googling could signal trouble and…
-
Monitoring Mobile Employees for Safety and Efficiency
Most companies that employ a fleet of vehicles use fleet monitoring software to track the location and movement of their cars / trucks / motorbikes…
-
The Story Of KnowIT
KnowIT was born from the pain and frustration of our own search for an employee monitoring solution when we discovered the theft of our intellectual…
-
When Your Employees Leave What Leaves With Them?
Lock the doors against malware attacks; batten down the hatches against cyber warfare; pull up the drawbridge to prevent online criminals battering down the door…
-
Monitoring Vs. Blocking: How to Ensure Productive Employee Internet Browsing
There was some sobering news in a 2014 survey about wasting time at work: Employees spend a lot of time in non-work-related web browsing, with…
-
Want to Avoid Data Breach Liability? Monitor Your Employees
With data breaches on the rise financial liabilities and burdens are also increasing, not just for headline-grabbing incidents, but everyday attacks on SMBs. Alongside this,…
-
Data Breaches – The Rising Threat
Data is one of the most valued assets of any business and yet breaches are increasing at an alarming rate, with threats often closer to…
-
How To Stop Porn From Killing Your Business
It seems like a no-brainer, but porn at work is still an issue employers need to address. Apparently, the temptation is too strong for some…
-
Data Theft By Employees: The Enemy Within
Viruses, spyware, adware, phishing and hacking, not to mention spam delivering fraudulent activities through malware and organized criminal activities. The threats from cyber criminals is ever…
-
Ethical Employee Monitoring – A How To Guide
We live in a world where everyone is watching and everyone is being watched. Technological advancements have changed the way we communicate, how we store…
-
3 Employee Google Searches You Can’t Ignore
The promise of endless knowledge at one’s fingertips is probably the most influential achievement of the past 20 years. It’s very hard to imagine now…
-
Sexting on the Company Phone: An Employer’s Perspective
Here’s something workers should already know: Don’t use a work phone to send dirty pictures or texts. …But we humans sometimes fall prey to temptation,…
-
How Much is Facebook Costing You?
Social media might keep us more connected, but when it comes to workplace productivity, sites like Facebook and Twitter could prove to be a real…
-
Are Your Employees Looking for Another Job?
Business is about people, and getting the right employees in place is vital for any company’s success. Losing a member of staff to a competitor…
-
Monitoring Employees? Only Cloud Storage Cuts It
Many employers have realized the benefits in monitoring employees’ computer use, benefits which include; keeping workers focused, preventing intellectual property theft, helping to avoid lawsuits or…
-
Trends in PC Tracking at Work
Employee Tracking Is on the Rise. Infact, a recent Bloomberg News story said as many as 20 companies are selling tools to keep an eye on…
-
Key Elements of Employee Monitoring Software
For many employers, it’s not enough just to monitor employee productivity. They must also make sure their workers don’t use company-issued devices inappropriately or illegally.…
-
Protect Yourself from Employees’ Illegal Communications
A frequently overlooked but potentially devastating aspect of Thai law makes employers liable for illegal communications sent by their workers. Thailand’s Civil and Commercial Code…
-
Do Freebies Cut It For Employee Monitoring?
For many employers, it’s not enough just to monitor employee productivity. They must also make sure their workers don’t steal their intellectual property or use…
-
Can You Read Your Employee Monitoring Reports?
Many companies have decided that employee monitoring software is the best way for them to keep track of their employees. But if you can’t understand…
-
The Best Skype Manager | Monitoring Employee Skype Usage With KnowIT
Any workplace wanting to mitigate the risk of insider theft needs a good Skype Manager application. Afterall, employee Skype usage and privacy hit the headlines in…
-
Is Employee Monitoring a Productivity Hack?
As cybercrime and hacking gradually rise to the forefront of corporate concerns, companies both large and small are increasingly turning to technology in order to…
-
3 Employee Monitoring Verdicts and What We Can Learn From Them
Employee monitoring is widely recognized as an important protection against hacking, cybercrime, and illegal or inappropriate use of corporate hardware and software by employees. For…
-
Five Productivity-Killing Websites Your Team Should Stay Off
The internet has revolutionized work in ways we couldn’t have dreamed of just a few years ago, yet all that connectedness brings a lot of…
-
Bring your own device: what does it really mean for your business?
When it comes to your workplace, chances are you have come across the term ‘bring your own device.’ If you haven’t, this is still a…
-
KnowIT Upcoming Features
[et_pb_section admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”1_4″][et_pb_image admin_label=”Image” src=”https://blog.digitalendpoint.com/wp-content/uploads/2015/12/delogo.png” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” animation=”left” sticky=”off” align=”left” force_fullwidth=”off” always_center_on_mobile=”on” use_border_color=”off” border_color=”#ffffff” border_style=”solid”] [/et_pb_image][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid” module_class=”smallsidebar”]…
-
KnowIT Server Changelog
[et_pb_section admin_label=”section”][et_pb_row admin_label=”row” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” use_custom_gutter=”off” custom_padding=”6em|||” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off” parallax_1=”off” parallax_method_1=”off” parallax_2=”off” parallax_method_2=”off” column_padding_mobile=”on”][et_pb_column type=”1_4″][et_pb_image admin_label=”Image” src=”https://blog.digitalendpoint.com/wp-content/uploads/2015/12/delogo-1.png” show_in_lightbox=”off” url=”http://digitalendpoint.com/” url_new_window=”on” use_overlay=”off”…