- Customizing which sites and online services your employees can access is a difficult process, fraught with potential problems. But in some cases, it’s a business necessity. Careful upfront configuration of a next-gen firewall coupled with continual and quick modification of the configuration is key to a successful implementation of this requirement.
- It’s pretty easy for someone to download VPN software and then circumvent your network protection by using it to access sites. Often used by employees who want to access adult sites or do online gaming.
- When people are sharing a movie (probably illegally) across the Internet, it’s often done with peer-to-peer sharing using protocols like Bit Torrent. Such networks may account for more than 50% of all Internet traffic, and if someone’s doing this on your network, it can seriously slow Internet access for others.
- If you access one of these sites, they may install software on your computer that can erase data, steal information, or seriously erode computer performance. People are often fooled by email or ads to click through to a malicious site.
- Phishing is an attempt to obtain sensitive information such as passwords, account numbers and credit card details by disguising an email as coming from a trustworthy entity.
- PCI requirements are related to processing payment card information. HIPPA is health-care related. SOC is related to security standards for organizations that handle the data of other companies (e.g. Software as a Service providers)
- If someone engages in copyright infringement from your office, you might be liable. (The Internet cops will identify the offender by the IP address, which is yours!) And there are other forms of employee Internet usage that can generate liability for employers.
If you’d like speak to one of our security experts call 816.994.7070, or submit your contact information (below) and we’ll get in touch with you.
Network security is complex. The solution is simple.