How would you summarize the phenomenon of company data leaking?
When we talk about data leakage we must distinguish between two types: the first is caused by negligence on the part of employees (loss of devices) and the second is caused by data theft.
What are the causes that lead to companies losing information?
There is no doubt that the major cause of data loss today is negligence related to BYOD. Overall it can be said that the increasing trend toward BYOD (bring your own device) at work is endangering the company data. There are many reports that say, for example, the company Mozy and Compass Partners 2012 that I just read. The majority (87 percent), small and medium enterprises do not have a formal policy regarding the use of employees and their personal devices for work -., And 80 percent were not worried, even many companies (about 33 percent in the report cited above) let employees make their own decisions about how to back up the data of the company and customers on their devices, and most companies lack backup or plan of recovery for those devices. Besides not back up, employees are involved in other risky behaviors with their personal devices, such as having no antivirus protection, leaving only laptops in coffee shops and other public places, using public computers to access corporate networks and the transfer of unencrypted data. Trend of BYOD is not going away and so it is important that companies take steps to prevent data leakage. Do you recommend ? implement a security policy that protects enterprise data. We recommend copying the data in the cloud, and here there are many business solutions. Installing an antivirus and anti-theft application on mobile employees. install a backup application to mobile employees, you allows data backup and restore all the photos, emails, files, applications, call log and text messages. You can also lock and wipe the phone remotely if it is stolen, locate GPS and more via. Implement security measures on the part of employees, for example, require that everyone has an extra security key on your device to open the Phone or laptop. They are small things that can have great long-term significance. Awareness of computer security seems to have grown in recent years. Still, the malware has been increased. Are they propelling companies from good practice? still leaves much to be desired in the way that many companies, especially SMEs, manage the security of your data. You need information and awareness because many business executives think their company is too small to take action or that costs an arm and a leg, which is not true. companies are the targets for cybercriminals ? Companies are always going to be a target for cyberdelincuentes first because it can be a good deal and second because it can generate prestige and respect within the scope of the hackers. Depending on the degree of knowledge and organization of the hacker may be good business. For example, if it is an online store and the hacker knows through the infrastructure of the web page to access data from credit cards, it can be lucrative but most such attacks are carried out by organized gangs. However, many hackers working alone and only seek fame and recognition by showing that other hackers can hack a website of a company, organization or government.
Archive for September, 2014
How would you summarize the phenomenon of company data leaking?
Posted on September 25th, 2014 in Uncategorized | Comments Off on Protecting children from online predators
The Internet has become a great source of information, research, education and entertainment in our life. Children age preschool are already learning to use the computer and surf the net. As parents we should be protecting our children in all environments.
Although you do not want to scare children when we talk about the dangers of Internet predators, you need to teach them to protect themselves in any environment in real life or on the network. The reality is that the Internet is completely Anonymous. Children are naive by nature and they can easily fall prey to a predator in online posing as a child.
Protect your child from online predators is an issue that should not be taken lightly. About one in three children said that has received a message online or photo that makes you uncomfortable. Very few tell their parents.
Technology is constantly changing and any part of the Internet that allows people to exchange messages can be used by someone who is trying to exploit your child. Talk openly with your child about dangers of the Internet and spend time together with them in line. Remind them never give information or post pictures of themselves online. What’s more can you do to protect your child online predators?
• Be educated computer and be aware of Internet. Find out which places you like to look at your child and review them often for inappropriate content. Make sure you have your child’s password E-mail and any communities line. Discourage or limit the use of webcams or mobile video devices.
• Ask your Internet service provider for the authority that allow parents to block access to adult sites, chat rooms and bulletin boards. A variety of programs allow you to restrict who send an email to your child and what types of visited sites.
• Establish guidelines and discuss with your child to Internet security search. Give participation in the discussion. Have your child sign a agreement “safe navigation” that you have reminds them of the rules of being on the Internet. Encourage them to use sites to find more children or configure your browser to remove inappropriate Content.
• Keep the computer in an area of high use of your home and outside your child’s room. Control other Internet access points, mobile phone including the iPhone, portable devices and PDAs. This will help you be aware of the Internet habits of your child.
• Teach your child safe behavior in Internet (what types of information are safe for share, recognize inappropriate behavior, etc.) Remind them to think before put or share information online. Nothing really private on the internet for private information can be easily disseminated.
• Let your children know they can come to you if they receive messages that make them feel uncomfortable. Help them understand that not everything they read online is true and that people in the Internet could be different from what they seem to be.
• Contact the police if someone online ask your child in any way. Remember that the Internet is like being in a public place. You should be aware of the safety of your children and protect them from dangerous situations.
Posted on September 19th, 2014 in Uncategorized | Comments Off on ” Monitoring the use of computers is cool, “says expert …
Coelho Júnior points out that the personal email (webmail) can not be “invaded” by the company, and he has every right not to allow their use during work hours. Besides monitoring of actions taken on the computer, blocking certain websites and programs that have no direct relation to the work is common practice in companies. The expert himself uses all these resource within his office, both to prevent the leak of confidential information as to increase productivity. “So also take this opportunity to retract the rule that ‘in house blacksmith, the spit is pau'” he jokes. Director of Technology Marcadé clothes Via Veneto, Ricardo Popescu also think it is important to control the access of the approximately 300 employees of the company who work with computers.
The expert in information security and cybercrime expert Wanderson Castilho installs system that monitors computers investigates possible suspicions crime committed by employees of the companies who hire their services.
“Right now I’m handling the case of an employee with 11 years of service, 8 months pregnant, and that every month diverts small amounts of money from the company. The sum total is already quite significant, “he reveals.
“Everything is registered and it is possible to recover any data, even deleted and formatted” he says. Castillo explains that there are several ways to monitor a computer network, such as software that take “photos” of the screen (print screen) every five seconds, for example, and store them in a database.
“On average, for a network with 20 machines are now spends about $ 7mil deR to install the entire system on the server,” he says. For the employee, it’s common sense. “It is essential to use the internet with the utmost caution in the workplace, seeking to preserve is embarrassing,” advises attorney Luiz Gustavo da Silveira, who coordinates the Computer Law in an office in Belo Horizonte. For businesses, Silveira echoes with Jr. Rabbit “Employers should let everyone informed in a clear, preferably in writing, about the policies of internet usage”
The company, he says, “buy” employee time and provides the equipment and tools so it can work in his favor. “So even if you have free access, do not commit abuses,” he advises.
Posted on September 10th, 2014 in Uncategorized | 1 Comment »
In today’s world, you can easily find that the computer has been widely used in people’s lives, whether for study, work or play. At some point, you may urgently want to know what your children, employees actually do on the computer all days because they spend so much time with him. Especially children deeply already had computers, which greatly affects the time they spend with each other. Hence, if parents, teachers or managers are responsible for the intensification of monitoring on -line with the installation of computer monitoring program.
Besides finding out what computer users do on the Internet, the computer monitoring software does more to strengthen the on-line monitoring, in order to keep users from online dangers computer. People today can hardly live without computers and also make a lot of problems because of the computer, you can pick up a paper and find a story almost daily about people who communicate via the Internet, became embroiled in a situation that compromised their safety. But computer monitoring program can help you monitor and record all the things that happen on the target computer and monitor your web use.
IMonitor EAM is a comprehensive PC monitoring program, which is well characterized to help all PC users to maintain control over what is happening to your computer in real time and keep track of online activities. As a powerful computer monitoring program, it not only can record all keystrokes, including passwords typed, visited websites, downloaded files, frequently used applications and more, but also keep track of online behavior by blocking websites and applications .
With this PC monitoring software, parents can monitor typed instant messages, websites visited, search content, the activity of social networking and more, which can help parents clearly know about what children do on the Internet. Moreover these logs can also alert parents timely if they find that something is wrong with their children. Additionally, managers can also make full use of this powerful computer monitoring program to constrain online behavior of employees. As is known to all, managers’ online monitoring is very important to work today, since almost all employees have to use the Internet to work every day and is difficult to control all their online activities. IMonitor EAM runs and monitor and control what employees do on the Internet and plays an important role in network management.
Posted on September 10th, 2014 in Uncategorized | Comments Off on Dealing with customer complaints
1. Show the customer you are listening by checking that you understand. Keep an open mind at all times.
2. Allow the customer to show their emotions if they are upset or angry.
3. Say you are sorry that the customer is upset. Concentrate on the situation not the personalities.
4. Don not force your solution on the customer.
5. Make sure you get full details of the problem. Try to find out what result the customer wants.
6. Summarize and make sure that the customer understands what you have said.
7. Ask the customer to put the complain in writing.
8. Be firm if you are sure of your facts.
Posted on September 1st, 2014 in Uncategorized | Comments Off on Labor Law: use of blogs and social networks is cause of dismissal
Employees are dismissed and prosecuted for improper use of blogs and social networks
An employee of a financial company created a blog. And, unsuspectingly, put information on the balance sheet of the company that had recently opened its capital. The problem is that the data were different from those submitted to the Securities Commission(CVM). The company has received a formal warning from watchdog and fired for cause. Increasingly, companies have faced problems due to misuse of the Internet by their employees. Many cases involve the MSN and social networks -Facebook, Twitter, Orkut and You Tube – and end up generating actions in court.
In another case, the 10th Criminal Law Chamber of the Court of Justice of São Paulo (Id) sentenced former employees who have used Google to steal customers from the company where they worked. They have registered the company name in Google. So whenever a Google user searched by company name, appeared to link the competitor where they were working.”Still appeal. But with that, they were convicted, on appeal, to pay a fine to old company, “says the lawyer.
The loss of business with the misuse of the internet can even be scaled. A company with 50 employees who use the Internet to solve personal problems like paying bills and chat with friends for hour per day, may suffer a loss of nearly £ 35 000 per month in terms of employee productivity. “
His calculation, taking into account an average monthly salary of $ 1,250 was realized from a program available on site www.brc.com.br . Through the tool, companies can calculate what is the harm caused by the misuse of the Internet by their employees. Castilho use the program in the processes related to social networks. “With it, the employer can make clear the direct relationship between productivity and the misuse of the Internet because the employee is not the owner of his time when he is in the company,” he says.