|Did you know...
• 40% of all workplace Internet use is non-work related? IDC
• 25% of companies have dismissed employees for persistent, inappropriate Internet use? Personnel Today Magazine
• 14.6% of employees admit to surfing continuously at work? vault.com
• 46% of all online shopping happens at work? Business Software Alliance
• 10% of internet users are web addicts? New York Times
• You have a legal liability?
IInternet usage is necessary in modern-day commerce. It is even a tool that can increase productivity if users are allowed to spend their lunchbreaks browsing the web. However, recent research suggests that employees are spending more and more of their official work time browsing the internet for subjects unrelated to their work.
Businesses can be at risk of damaged company brand or reputation from digital security breaches caused by employee internet misuse. With a new infected page being discovered four times a minute, it is no longer safe for businesses to provide their employees with unmonitored and unfiltered access to the internet. Your business can be exposed to huge reputation risks through accessing sites such as online chat, gaming and pornography. Racism, cyber slacking and cyber bullying vria email is also a risk your business and your employees are exposed to.
e-safe business, a service that does not simply block sites; but educates the users on your Acceptibe Use Policy and what is and isn't allowed in the workplace, using workplace property. e-safe business is a flexible tool that allows for plenty of customisation so that you can decide what to allow. You may decide to allow for a number of social networking sites to be open for use. e-safe business allows you to monitor the time spent on these sites and provides you with the opportunity to quietly discuss extreme or improper use with your employee, to create a better understanding of what is and isn't appropriate internet behaviour for your business.
e-safe business monitoring provides contextual text-string analysis of all information displayed within a Windows environment . This includes applications, data, email, Instant Messaging, Chat, Browser, P2P etc.
The monitoring is done in real-time against a series of threat libraries which contain words and phrases that relate to those known threats. When a match is detected, an alert is created which allows a number
of events to occur. These alerts can be configured so that they are escalated to various levels of management dependent upon the severity, number of alerts detected and the thresholds set.
• Display Acceptable Use Policy (AUP) summary upon login
• Monitoring can be imposed on a permanent or temporary basis
• Provides off-network monitoring
• Define different monitoring criteria for different users or groups
• Stealth or Active modes
• Remote administration capability
• Screen Capture of AUP violation by user, with time & date stamp
• Full reporting features
• Variable sensitivity levels for libraries:
Libraries include racism, drugs, gambling, hacking, proxy avoidance, paedophile grooming, bullying, pornography, gaming, criminal activity.
USB Device Management
Multiple surveys have recently shown that internal users are the biggest threat to enterprise networks. USB endpoints represent a major risk when it comes to internal network security. The e-safe business solution provides USB Device Access Management, which allows organisations to create a security policy which takes control of USB pen drives, and all other USB devices that could potentially be connected to the network.
• Manages all removable media (pen drives, mobile phones, PDA’s, etc)
• Encrypt data, for added protection
• Unauthorised software protection
• Centralised management
• Integrated AV scanner
• Multiple Group profiles
Loss of productivity
Some cyber slacking occurs in every business. Everyone experiences a lack of motivation at some stage and may decide to 'cyber-slack' for a little while to gain motivation. While this may be acceptable behaviour at some workplaces, this behaviour can extend to employees being off-task for hours on end. This can result in a great loss for your business:
If 10% of staff waste half an hour per day 'cyber-slacking' at an hourly rate of $35 per employee, based on 230 working days, the direct annual productivity loss would be:
$20K for a business employing 50 staff
$40K for a business employing 100 staff
$80K for a business employing 200 staff
$200K for a business employing 500 staff
Corporate organisations have always faced potential civil and criminal liability for employee misuse of IT resources, but did you know that criminal liability can be attached directly to the Directors and Senior Managers
within your business.
Take a preventive approach with e-safe business and reduce the risk of IT related dismissals, tribunals and criminal proceedings associated with the following legislation:
Obscene Publications Act 1964
Disability Discrimination Act 1995
Sex Discrimination Act 1975
Defamation Act 1996
Race Relations Act 2002
Data Protection Act 1998
Copyright, Design and Patents Act 1998
Human Rights Act
Computer Misuse Act 1990
|How does e-safe business work? Image Interdiction
Unlike conventional gateway web filters which only attempt
to block access to known pornographic websites, our Image Interdiction software is able to detect pornography, regardless of its source. Using world leading content-based image processing algorithms, e-safe business captures images that are displayed on a PC screen and determines the probability of the image being ornographic. If a positive identification is made the image is either replaced with a non-offensive image (company logo etc), or the user is warned that the image to be displayed may be off ensive. All pornographic images captured will be logged and stored, along with the PC name, user name, time, date and the action taken. Authorised personnel can then review suspected pornographic images and provide appropriate reports on improper usage.