#1: Use auditing to monitor access to files This list covers 10 ways you can keep tabs on what your users are doing with the company's computers. That's because employee actions can subject the company to monetary loss, civil lawsuits, and even criminal charges if they involve deliberate or accidental disclosure of confidential company information, transmission of pornography, or exposure to malicious code. ![]() Even if the company's management philosophy allows for some private use of company equipment, you often need to know what Web sites employees are visiting, what files they're sending and receiving, and even what they're saying in their e-mail. Like it or not, network administrators these days must take on the added task of playing Big Brother - monitoring employees' use of the computers and network. ![]() This information is also available as a PDF download.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |