Category: Other

  • KnowIT  įš„æ•…äš‹

    KnowIT įš„æ•…äš‹

    å―“å‘įŽ°å…Žåļįš„įŸĨčŊ†äš§æƒåœĻįœžįšŪåš•äļ‹čĒŦ员å·Ĩį›—įŠƒïžŒåœĻį—›č‹Ķ和æŒŦ折äļ­ïžŒæˆ‘äŧŽåž€å§‹äš†åŊŧæ‰ūį›‘æŽ§é›‡å‘˜čŒčīĢã€čĄŒäļšįš„č§Ģå†ģæ–đæĄˆã€‚äšŽæ˜ŊKnowITčŊžį”Ÿäš†ã€‚ KnowITįš„æ•…äš‹å‘į”ŸåœĻäļ‰åđīäđ‹å‰ïžŒæˆ‘äŧŽįš„创始䚚įЁį„ķå‘įŽ°äļ€ä―å·ēįŧå…Žåļ效力äļ‰åđīįš„éĄđį›Ūįŧį†čŋ˜åœĻä―ŋį”ĻSkype和äļ€åæœ€čŋ‘čūžčŒįš„员å·Ĩ聊åĪĐ。䚋情有䚛åŊį–‘ïžŒčŋ™åå·ēįŧčūžčŒįš„员å·Ĩ因äļšåŪķäļ­æœ‰äļ§äš‹č€ŒčŊ·å‡äļĪäļŠæœˆïžŒå›žæĨäđ‹åŽč§‰åū—åŋƒé‡Œæ„§į–šč€ŒįŦ‹åģ提凚čūžčŒã€‚ å‘įŽ°č››äļéĐŽčŋđ兎åļå†ģåۚį™ŧå―•å―“å‰æ‰€æœ‰å‘˜å·Ĩä―ŋį”Ļįš„į”ĩč„‘ã€æĢ€æŸĨäŧ–äŧŽįš„Skype通čŪŊčŪ°å―•ã€‚ å―“å‘įŽ°įœŸį›ļæ—ķ我äŧŽå—到䚆å·ĻåĪ§įš„æ‰“å‡ŧ原æĨčŋ™äļĪäļŠäššæ­ĢåœĻčŪĄåˆ’į›—å–åیå…Ļį”ąæˆ‘å…Žåļåž€å‘įš„įŸĨčŊ†äš§æƒã€‚į”ģčŊ·äļ§å‡åیå…Ļæ˜Ŋäļ€äļŠčŊĄčŪĄïžŒäŧŽč€ŒåŊäŧĨ有充čķģįš„æ—ķé—īåœĻåĪ–čŋ›čĄŒäŧ–äŧŽįš„čŪĄåˆ’ã€‚æ›īčŪĐæžæ€’įš„æ˜ŊïžŒå―“æ—ķäŧ–äŧŽäŧį„ķæ˜Ŋå…Žåļįš„æ­Ģ垏员å·Ĩ、ä―ŋį”Ļå…Žåļįš„čĩ„暐、éĒ†å–å…Žåļ薩æ°ī。 įĄŪå‡ŋįš„čŊæŪå°ąåœĻįœžå‰ — äļäŧ…äŧ…æ˜ŊäŧŽäŧ–äŧŽįš„äŋĄæŊäšĪæĩ — čŋ˜æœ‰åŒ…åŦ有įŸĨčŊ†äš§æƒįš„æ–‡äŧķäž čū“æŊ”åĶ‚ïž› 暐äŧĢ᠁ į”Ļäū‹ 所有发įĨĻ及åŪĒæˆ·é‚Ūäŧķ列čĄĻ 商äļščŪĄåˆ’ 销å”ŪæĻĄåž į”ĩ子é‚ŪäŧķæĻĄæŋ äļ€äļŠį―‘įŦ™įš„PSD花čīđ10äļ‡įūŽå…ƒ 雩äļŠåŠ éœœįš„æ˜ŊäŧŽäŧ–äŧŽįš„通čŪŊčĩ„æ–™äļ­æ˜ūįĪšïžšäŧ–äŧŽčŋ˜åœĻ尝čŊ•拉æ‹Ēæ›īåĪšįš„é‡čĶå‘˜å·Ĩ加å…Ĩäŧ–äŧŽįš„æ–°å…Žåļ。 äļåŠæ˜ŊäŧĪ䚚震惊čŋ˜čŪĐæˆ‘äŧŽéĒåŊđį€įŽ°åŪžįš„åĻčƒã€‚æˆ‘äŧŽéœ€č́įŦ‹åģé‡‡å–čĄŒåŠĻåœĻ垀é™Īäŧ–äŧŽäđ‹å‰ïžŒį›‘控äŧ–äŧŽįš„čĄŒäļšã€å°―åŊčƒ―čŽ·åū—æ›īåĪšįš„čŊæŪ。äŧ–äŧŽå‘†įš„æ—ķé—īčķŠé•ŋïžŒį›—å–įš„äļœčĨŋ侚čķŠåĪšã€‚ æ˜ūį„ķæ—ķé—ī非åļļįī§čŋŦæēĄæœ‰äššæ›ū有čŋ‡į›‘æŽ§é›‡å‘˜įš„įŧéŠŒã€‚å…Žåļįš„CEOäšē臩åœĻäļŠį―‘åŊŧæ‰ūåŊčĄŒįš„æ–đ垏æ–đæģ•ïžŒä―†įŧ“æžœåīäŧĪäššåĪąæœ›ã€å›°æƒ‘ã€‚å‡ åäļŠį―‘įŦ™įš„æŸĨčŊĒįŧ“果æēĄæœ‰äŧŧä―•æœ‰äŧ·å€žįš„äŋĄæŊ。 æ·˜æą°äš†é‚Ģ䚛几äđŽæ— æģ•获åū—įœŸåŪžäŋĄæŊįš„äš§å“ïžŒæ·˜æą°äš†é‚Ģ乛äļ“é—Ļ刚æŽĒåˆŦäššéšį§įš„äš§å“ïžŒčŋ˜æœ‰æ·˜æą°äš†é‚Ģäš›åŠŸčƒ―äļå…Ļįš„äš§å“ïžŒæœ€åŽåŠæœ‰äļĪæŽū䚧品å…Ĩå›ī。 无åĨˆįš„æ˜Ŋčŋ™äļĪæŽūäš§å“éƒ―éœ€č́采čī­åĪ§é‡įš„čŪūåĪ‡ïžŒåŧšįŦ‹æœåŠĄå™Ļ和čŋ›čĄŒåŪ‰čĢ…ïžŒåđķäļ”čĶæą‚éĒ„å…ˆæ”Ŋäŧ˜äļ€åŪšįš„åđīčīđïž›įŽŽäšŒį§é€‰æ‹Đæ›ī加įģŸįģ•åœĻæŠĨäŧ·äđ‹å‰ïžŒæˆ‘äŧŽåŋ…éĄŧ和äŧ–äŧŽįš„销å”Ūäššå‘˜å…ˆč”įŧœïžŒäŧ–äŧŽäžžäđŽį”ŸæīŧåœĻå‰äš’č”į―‘æ—ķäŧĢ。 æ—ķé—īå°ąčŋ™æ ·æ‚„悄地æĩčĩ°äš†â€Ķâ€Ķ 最įŧˆįš„č§Ģå†ģæ–đæĄˆïžŒį”ąäļ‰äļŠäššįŧ„成䚆äļ€äļŠå›Ē队äŧŽåž€å§‹įŧ„åŧšåˆ°åŪŒæˆčŠąčīđ䚆几åĪĐįš„æ—ķé—ī。最įŧˆïžŒäš§å“åˆ°æ˜ŊåŊäŧĨå·Ĩä―œïžŒä―†įŧ“æžœäļæ˜Ŋé‚Ģæ ·äŧĪäššæŧĄæ„ã€‚ 到į›Ū前äļšæ­ĒïžŒæœ€åįš„äš‹æƒ…æ˜Ŋäļ€åđīäđ‹åŽïžŒįģŧįŧŸäđŸčĒŦæ·˜æą°äš†ã€į„ķåŽå°ąé‚Ģæ ·čĒŦ尘封čĩ·æĨã€‚č€ŒäŧŠïžŒæēĄæœ‰äššäš†č§ĢåĶ‚ä―•ä―ŋį”Ļčŋ™äļŠįģŧįŧŸïžŒæ‰€æœ‰įš„įĄŽį›˜å­˜æŧĄäš†æˆŠå›ū、åŊ†į åŋ˜čŪ°äš†â€Ķâ€Ķ å”Ŋäļ€čƒ―čŪĐæˆ‘äŧŽæƒģčĩ·æĨįš„æ˜Ŋ暐暐äļæ–­įš„åđŋ告é‚ŪäŧķæĨ臩é‚Ģ垀发č―Ŋäŧķįš„å…ŽåļčŊīïžšåĶ‚æžœæˆ‘äŧŽæƒģč́įŧ§įŧ­ä―ŋį”Ļč―Ŋäŧķäŧ–äŧŽäžšįŧ™æˆ‘äŧŽæ›īéŦ˜įš„æŠ˜æ‰Ģâ€Ķâ€Ķ…

  • Ð˜ŅŅ‚ÐūŅ€ÐļŅ ҁÐūзÐīÐ°Ð―ÐļŅ KnowIT

    KnowIT ÐŋÐūŅÐēÐļÐŧŅŅ ҁҀÐĩÐīÐļ ÐąÐūÐŧÐļ Ðļ Ņ€Ð°Ð·ÐūŅ‡Ð°Ņ€ÐūÐēÐ°Ð―ÐļŅ Ðē ÐŋÐūÐļŅÐšÐ°Ņ… Ņ€Ðĩ҈ÐĩÐ―ÐļŅ ÐīÐŧŅ ОÐūÐ―ÐļŅ‚ÐūŅ€ÐļÐ―Ðģа Ð―Ð°ŅˆÐļŅ… ҁÐūŅ‚Ņ€ŅƒÐīÐ―ÐļКÐūÐē, КÐūÐģÐīа ÐžŅ‹ ÐūÐąÐ―Ð°Ņ€ŅƒÐķÐļÐŧÐļ ÐšŅ€Ð°Ðķ҃ Ð―Ð°ŅˆÐĩÐđ ÐļÐ―Ņ‚ÐĩÐŧÐŧÐĩÐšŅ‚ŅƒÐ°ÐŧŅŒÐ―ÐūÐđ ҁÐūÐąŅŅ‚ÐēÐĩÐ―Ð―Ðūҁ҂Ðļ ÐąŅƒÐšÐēаÐŧŅŒÐ―Ðū Ðļз-ÐŋÐūÐī Ð―ÐūŅÐ°. Ð­Ņ‚Ð° Ðļҁ҂ÐūŅ€ÐļŅ…

  • La Historia De KnowIT

    La Historia De KnowIT

    KnowIT naciÃģ desde el dolor y la frustraciÃģn de nuestra propia bÚsqueda de una soluciÃģn de monitoreo para empleados cuando descubrimos el robo de nuestra…

  • āļˆāļļāļ”āđ€āļĢāļīāđˆāļĄāļ•āđ‰āļ™āļ‚āļ­āļ‡ KnowIT

    āļˆāļļāļ”āđ€āļĢāļīāđˆāļĄāļ•āđ‰āļ™āļ‚āļ­āļ‡ KnowIT

    KnowIT āđ€āļāļīāļ”āļˆāļēāļāļāļēāļĢāđ€āļāđ‰āļēāđ€āļžāļĩāļĒāļĢāļžāļĒāļēāļĒāļēāļĄāļŦāļēāđ‚āļ›āļĢāđāļāļĢāļĄāļ•āļīāļ”āļ•āļēāļĄāļžāļ™āļąāļāļ‡āļēāļ™āļ—āļĩāđˆāļĄāļĩāļ›āļĢāļ°āļŠāļīāļ—āļ˜āļīāļ āļēāļž āđ€āļžāļ·āđˆāļ­āļĢāļąāļšāļĄāļ·āļ­āļāļąāļšāļ§āļēāļĒāļĢāđ‰āļēāļĒāļ—āļĩāđˆāļ­āļĒāļđāđˆāđƒāļ•āđ‰āļˆāļĄāļđāļāļ‚āļ­āļ‡āđ€āļĢāļēāļ™āļĩāđˆāđ€āļ­āļ‡ āđ€āļĢāļ·āđˆāļ­āļ‡āļĢāļēāļ§āļ‚āļ­āļ‡ KnowIT āđ€āļĢāļīāđˆāļĄāļˆāļēāļ 3 āļ›āļĩāļāđˆāļ­āļ™ āđ€āļĄāļ·āđˆāļ­āļœāļđāđ‰āļāđˆāļ­āļ•āļąāđ‰āļ‡āļšāļĢāļīāļĐāļąāļ—āļ‚āļ­āļ‡āđ€āļĢāļēāđ„āļ”āđ‰āļĢāļąāļšāļĢāļēāļĒāļ‡āļēāļ™āļˆāļēāļāļœāļđāđ‰āļšāļĢāļīāļŦāļēāļĢāļĢāļ°āļ”āļąāļšāļŠāļđāļ‡āļ§āđˆāļēāļžāļ™āļąāļāļ‡āļēāļ™āļ—āļĩāđˆāļ—āļģāļ‡āļēāļ™āļāļąāļšāđ€āļĢāļēāļĄāļēāļ™āļēāļ™āļ–āļķāļ‡ 3 āļ›āļĩāđ„āļ”āđ‰āđƒāļŠāđ‰āđ‚āļ›āļĢāđāļāļĢāļĄ Skype āđƒāļ™āļāļēāļĢāļžāļđāļ”āļ„āļļāļĒāļāļąāļšāļžāļ™āļąāļāļ‡āļēāļ™āļ—āļĩāđˆāđ€āļžāļīāđˆāļ‡āļ­āļ­āļāļˆāļēāļāļ‡āļēāļ™āđ„āļ›āđ„āļĄāđˆāļ™āļēāļ™ āļ™āđˆāļēāđāļ›āļĨāļāļ—āļĩāđˆāļ§āđˆāļēāļžāļ™āļąāļāļ‡āļēāļ™āļ„āļ™āļ™āļĩāđ‰āđ„āļ”āđ‰āļ‚āļ­āļĨāļēāļ­āļ­āļāļ—āļąāļ™āļ—āļĩāļ—āļĩāđˆāļāļĨāļąāļšāļĄāļēāļˆāļēāļāļāļēāļĢāļĨāļēāļžāļąāļāļĢāđ‰āļ­āļ™ 2 āđ€āļ”āļ·āļ­āļ™āļ”āđ‰āļ§āļĒāđ€āļŦāļ•āļļāļœāļĨāļŠāđˆāļ§āļ™āļ•āļąāļ§āļ—āļĩāđˆāđ„āļĄāđˆāļĄāļĩāđƒāļ„āļĢāļ—āļĢāļēāļšāđ„āļ”āđ‰ āļ”āđ‰āļ§āļĒāļ„āļ§āļēāļĄāļŠāļ‡āļŠāļąāļĒ āđ€āļĢāļēāļˆāļķāļ‡āļĨāđ‡āļ­āļ„āļ­āļīāļ™āđ€āļ‚āđ‰āļēāđ„āļ›āļ—āļĩāđˆāđ€āļ„āļĢāļ·āđˆāļ­āļ‡āļ‚āļ­āļ‡āļžāļ™āļąāļāļ‡āļēāļ™āļ—āļĩāđˆāļĒāļąāļ‡āļ›āļāļīāļšāļąāļ•āļīāļ‡āļēāļ™āļ­āļĒāļđāđˆāļāļąāļšāđ€āļĢāļēāđāļĨāļ°āļ•āļĢāļ§āļˆāļŠāļ­āļšāļ‚āđ‰āļ­āļĄāļđāļĨāļšāļ™āđ‚āļ›āļĢāđāļāļĢāļĄ Skype āļāļĨāļēāļĒāđ€āļ›āđ‡āļ™āļ§āđˆāļē āļ—āļąāđ‰āļ‡āļŠāļ­āļ‡āļ„āļ™āļāļģāļĨāļąāļ‡āļ§āļēāļ‡āđāļœāļ™āļ—āļĩāđˆāļˆāļ°āļŠāļĢāđ‰āļēāļ‡āļšāļĢāļīāļĐāļąāļ—āļ‚āļ­āļ‡āļ•āļąāļ§āđ€āļ­āļ‡āļ‚āļķāđ‰āļ™āļĄāļē āđ‚āļ”āļĒāļĨāļ­āļāđ€āļĨāļĩāļĒāļ™āđāļšāļšāđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāđ€āļāļ·āļ­āļšāļ—āļąāđ‰āļ‡āļŦāļĄāļ”āļ—āļĩāđˆāļšāļĢāļīāļĐāļąāļ—āđ€āļĢāļēāđƒāļŠāđ‰āđ€āļ§āļĨāļēāļžāļąāļ’āļ™āļēāļĄāļēāļ­āļĒāđˆāļēāļ‡āļĒāļēāļ§āļ™āļēāļ™ āļāļēāļĢāļĨāļēāļžāļąāļāļĢāđ‰āļ­āļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļēāļāđ‡āđ€āļŦāļĄāļ·āļ­āļ™āļˆāļ°āđ€āļ›āđ‡āļ™āļāļēāļĢāļ–āđˆāļ§āļ‡āđ€āļ§āļĨāļēāđ€āļžāļ·āđˆāļ­āļ—āļĩāđˆāļˆāļ°āđ€āļ•āļĢāļĩāļĒāļĄāļāļēāļĢāļˆāļąāļ”āļ•āļąāđ‰āļ‡āļ—āļĩāļĄāļ‡āļēāļ™āļ‚āļ­āļ‡āļ•āļąāļ§āđ€āļ­āļ‡ āđƒāļ™āļ‚āļ“āļ°āļ—āļĩāđˆāļĒāļąāļ‡āļĢāļąāļšāđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™āļˆāļēāļāļ—āļēāļ‡āļšāļĢāļīāļĐāļąāļ—āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļ–āđ€āļ‚āđ‰āļēāļ–āļķāļ‡āļ‚āđ‰āļ­āļĄāļđāļĨāđ„āļ”āđ‰āļ­āļĒāđˆāļēāļ‡āļžāļ™āļąāļāļ‡āļēāļ™āļ—āļąāđˆāļ§āđ„āļ› āļŦāļĨāļąāļāļāļēāļ™āļ—āļĩāđˆāđ„āļ”āđ‰āļŠāļąāļ”āđ€āļˆāļ™āđāļĨāļ°āđ‚āļŦāļ”āļĢāđ‰āļēāļĒāļĄāļēā

  • Some of the Worst Ways to Monitor Employees

    Some of the Worst Ways to Monitor Employees

    Monitoring is a key part of management. Employee monitoring can take many forms, from the humble punch clock to sophisticated software. At its best, monitoring…

  • Employee Monitoring in Singapore | What’s Allowed?

    Employee Monitoring in Singapore | What’s Allowed?

    If you’re in Singapore and you want to monitor your employees, you’re in luck. The law apparently allows you to keep an eye on workers…

  • How to Monitor Employees’ PCs â€ĶWithout Going Too Far

    How to Monitor Employees’ PCs â€ĶWithout Going Too Far

    We know by now how much sense it makes to monitor employees: for productivity, to protect your networks and to safeguard your intellectual property. But…

  • Canada’s BYOD Guidelines: How They Can Help You

    Canada’s BYOD Guidelines: How They Can Help You

    Many governments and organizations are just now realizing the importance of setting up BYOD guidelines to protect themselves against possible data breaches through workers’ devices.…

  • When Can You Read Employees’ Emails?

    When Can You Read Employees’ Emails?

    Most managers would rather not spend their time reading employee emails. Aside from the practice bordering on the creepy, it’s fair to assume employers have…

  • How To Introduce Employee Monitoring To Your Employees

    How To Introduce Employee Monitoring To Your Employees

    Employee monitoring makes sense. It keeps track of workers’ productivity, prevents hacks and malware from being introduced into systems, and protects sensitive company data. Employer…

  • The New EU Data Protection Regulations: What They Mean for You

    The New EU Data Protection Regulations: What They Mean for You

    The EU is preparing to upgrade its data protection regulations this year, and there are changes in store for employers regarding the protection of employee…

  • The Best Employee Monitoring Software: What’s Right For You?

    Trust  – difficult to earn and easy to lose, and yet it’s a business imperative – As a manager and business owner, you must earn…

  • What Happens When an Employee Loses a Company Device?

    What Happens When an Employee Loses a Company Device?

    It seems there’s a new headline almost every day: Computers stolen. Data lost. Customers’ security at risk. There’s a surprising amount of data out there…

  • Why startups should monitor employees’ PC / Mobile access

    Why startups should monitor employees’ PC / Mobile access

    So you’ve launched your Big Idea and your startup is finally off the ground. You have staff and funding, and your office space is up…

  • Employee Monitoring in Hong Kong – What’s Allowed?

    Employee Monitoring in Hong Kong – What’s Allowed?

    It’s easy to see why employers in Hong Kong may want to monitor workers in the wake of a December 2014 survey by the recruiting…

  • Employees: The weak link in your company’s security?

    Employees: The weak link in your company’s security?

    You need employees to run your business. Without them, you’d have to do everything yourself – and let’s face it, you can’t do EVERYTHING. But…

  • What We Can Learn from the Ashley Madison Breach

    What We Can Learn from the Ashley Madison Breach

    Legions of wannabe spouse cheaters were exposed to the world in August after a massive data breach of the Ashley Madison website. The website claims…

  • Bring On BYOD!  Best Practices for Bringing Your Own Device

    Bring On BYOD! Best Practices for Bringing Your Own Device

    Do you know what BYOD is? It stands for “bring your own device,” and it’s the practice of employees using their own phones, tablets and…

  • Why You Need To “Know” If Employees Are Using Cloud Apps

    Why You Need To “Know” If Employees Are Using Cloud Apps

    [et_pb_section admin_label=”Section” fullwidth=”on” specialty=”off” transparent_background=”off” allow_player_pause=”off” inner_shadow=”off” parallax=”off” parallax_method=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” make_equal=”off” use_custom_gutter=”off”][et_pb_fullwidth_post_title admin_label=”Fullwidth Post Title” title=”on” meta=”on” author=”on” date=”on” categories=”on” comments=”on” featured_image=”on”…

  • Employee Monitoring and Productivity:  The Positive Correlation

    Employee Monitoring and Productivity: The Positive Correlation

    Employee monitoring is not about keeping checks and balances for the sake of company protocol. It is about data protection, compliance and guarding against very…

  • How To Avoid Employee Monitoring Gone Wrong

    How To Avoid Employee Monitoring Gone Wrong

    Cyber-attacks are part of the digital landscape businesses have to navigate today. Running alongside this is the growing need to monitor employees to ensure they…

  • 3 More Employee Google Searches To Look Out For

    3 More Employee Google Searches To Look Out For

    Whilst searching for a sofa for sale during your lunch-break is innocuous enough, employers need to be aware when employee Googling could signal trouble and…

  • Monitoring Mobile Employees for Safety and Efficiency

    Monitoring Mobile Employees for Safety and Efficiency

    Most companies that employ a fleet of vehicles use fleet monitoring software to track the location and movement of their cars / trucks / motorbikes…

  • The Story Of KnowIT

    KnowIT was born from the pain and frustration of our own search for an employee monitoring solution when we discovered the theft of our intellectual…

  • When Your Employees Leave What Leaves With Them?

    When Your Employees Leave What Leaves With Them?

    Lock the doors against malware attacks; batten down the hatches against cyber warfare; pull up the drawbridge to prevent online criminals battering down the door…

  • Monitoring Vs. Blocking: How to Ensure Productive Employee Internet Browsing

    Monitoring Vs. Blocking: How to Ensure Productive Employee Internet Browsing

    There was some sobering news in a 2014 survey about wasting time at work: Employees spend a lot of time in non-work-related web browsing, with…

  • Want to Avoid Data Breach Liability? Monitor Your Employees

    Want to Avoid Data Breach Liability? Monitor Your Employees

    With data breaches on the rise financial liabilities and burdens are also increasing, not just for headline-grabbing incidents, but everyday attacks on SMBs. Alongside this,…

  • Data Breaches – The Rising Threat

    Data Breaches – The Rising Threat

    Data is one of the most valued assets of any business and yet breaches are increasing at an alarming rate, with threats often closer to…

  • How To Stop Porn From Killing Your Business

    It seems like a no-brainer, but porn at work is still an issue employers need to address. Apparently, the temptation is too strong for some…

  • The Legality Of Employee Monitoring | Position Paper

    The Legality Of Employee Monitoring | Position Paper

    [et_pb_section fullwidth=”on” specialty=”off” transparent_background=”off” allow_player_pause=”off” inner_shadow=”off” parallax=”off” parallax_method=”off” padding_mobile=”off” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” make_equal=”off” use_custom_gutter=”off”][et_pb_fullwidth_post_title admin_label=”Fullwidth Post Title” title=”on” meta=”on” author=”on” date=”on” categories=”on” comments=”on” featured_image=”on” featured_placement=”above”…

  • Data Theft By Employees: The Enemy Within

    Data Theft By Employees: The Enemy Within

    Viruses, spyware, adware, phishing and hacking,  not to mention spam delivering fraudulent activities through malware and organized criminal activities. The threats from cyber criminals is ever…

  • Ethical Employee Monitoring –  A How To Guide

    Ethical Employee Monitoring – A How To Guide

    We live in a world where everyone is watching and everyone is being watched. Technological advancements have changed the way we communicate, how we store…

  • 3 Employee Google Searches You Can’t Ignore

    3 Employee Google Searches You Can’t Ignore

    The promise of endless knowledge at one’s fingertips is probably the most influential achievement of the past 20 years. It’s very hard to imagine now…

  • Sexting on the Company Phone:  An Employer’s Perspective

    Sexting on the Company Phone: An Employer’s Perspective

    Here’s something workers should already know: Don’t use a work phone to send dirty pictures or texts. …But we humans sometimes fall prey to temptation,…

  • How Much is Facebook Costing You?

    How Much is Facebook Costing You?

    Social media might keep us more connected, but when it comes to workplace productivity, sites like Facebook and Twitter could prove to be a real…

  • Are Your Employees Looking for Another Job?

    Are Your Employees Looking for Another Job?

    Business is about people, and getting the right employees in place is vital for any company’s success. Losing a member of staff to a competitor…

  • Monitoring Employees? Only Cloud Storage Cuts It

    Monitoring Employees? Only Cloud Storage Cuts It

    Many employers have realized the benefits in monitoring employees’ computer use, benefits which include; keeping workers focused, preventing intellectual property theft, helping to avoid lawsuits or…

  • Trends in PC Tracking at Work

    Trends in PC Tracking at Work

    Employee Tracking Is on the Rise. Infact, a recent Bloomberg News story said as many as 20 companies are selling tools to keep an eye on…

  • Key Elements of Employee Monitoring Software

    Key Elements of Employee Monitoring Software

    For many employers, it’s not enough just to monitor employee productivity. They must also make sure their workers don’t use company-issued devices inappropriately or illegally.…

  • Protect Yourself from Employees’ Illegal Communications

    Protect Yourself from Employees’ Illegal Communications

    A frequently overlooked but potentially devastating aspect of Thai law makes employers liable for illegal communications sent by their workers. Thailand’s Civil and Commercial Code…

  • Do Freebies Cut It For Employee Monitoring?

    Do Freebies Cut It For Employee Monitoring?

    For many employers, it’s not enough just to monitor employee productivity. They must also make sure their workers don’t steal their intellectual property or use…

  • Is Employee Monitoring a Productivity Hack?

    Is Employee Monitoring a Productivity Hack?

    As cybercrime and hacking gradually rise to the forefront of corporate concerns, companies both large and small are increasingly turning to technology in order to…

  • HIPAA Compliance Challenges That SMS Presents To Healthcare Facilities

    HIPAA Compliance Challenges That SMS Presents To Healthcare Facilities

    Are you aware of the HIPAA Compliance challenges that SMS messages present to Healthcare Facilities? We have partnered with RackspaceÂŪ to bring KnowIT to the…

  • Five Productivity-Killing Websites Your Team Should Stay Off

    Five Productivity-Killing Websites Your Team Should Stay Off

    The internet has revolutionized work in ways we couldn’t have dreamed of just a few years ago, yet all that connectedness brings a lot of…

  • Insider theft in the news again

    Insider theft in the news again

    Yes, sadly it’s yet another â€œinsider theft lawsuit” to add to the listâ€Ķ This one has an interesting spin on it, in that, the “five” are…

  • Bring your own device: what does it really mean for your business?

    Bring your own device: what does it really mean for your business?

    When it comes to your workplace, chances are you have come across the term ‘bring your own device.’ If you haven’t, this is still a…

  • Could you have seen IT coming with KnowIT?

    Could you have seen IT coming with KnowIT?

    Congratulations! You’ve been promoted to Supervisor! Of all the candidates, both internal and external, you stood out as most qualified and most ready for the…

  • KnowIT Upcoming Features

    [et_pb_section admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”1_4″][et_pb_image admin_label=”Image” src=”https://blog.digitalendpoint.com/wp-content/uploads/2015/12/delogo.png” show_in_lightbox=”off” url_new_window=”off” use_overlay=”off” animation=”left” sticky=”off” align=”left” force_fullwidth=”off” always_center_on_mobile=”on” use_border_color=”off” border_color=”#ffffff” border_style=”solid”] [/et_pb_image][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid” module_class=”smallsidebar”]…

  • KnowIT Server Changelog

    [et_pb_section admin_label=”section”][et_pb_row admin_label=”row” make_fullwidth=”off” use_custom_width=”off” width_unit=”on” use_custom_gutter=”off” custom_padding=”6em|||” padding_mobile=”off” allow_player_pause=”off” parallax=”off” parallax_method=”off” make_equal=”off” parallax_1=”off” parallax_method_1=”off” parallax_2=”off” parallax_method_2=”off” column_padding_mobile=”on”][et_pb_column type=”1_4″][et_pb_image admin_label=”Image” src=”https://blog.digitalendpoint.com/wp-content/uploads/2015/12/delogo-1.png” show_in_lightbox=”off” url=”http://digitalendpoint.com/” url_new_window=”on” use_overlay=”off”…