{"id":165,"date":"2020-06-19T13:35:26","date_gmt":"2020-06-19T13:35:26","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=165"},"modified":"2021-09-10T06:40:43","modified_gmt":"2021-09-10T06:40:43","slug":"5-reasons-you-should-monitor-your-employees-computers","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/","title":{"rendered":"5 Reasons You Should Monitor Your Employees\u2019 Computers"},"content":{"rendered":"<p style=\"text-align: left;\">5 Reasons You Should Monitor Your Employees\u2019 Computers &#8211; The Necessity of Remote Desktop &amp; Session Recording<\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-231 size-full\" src=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers.png\" alt=\"\" width=\"800\" height=\"2000\" \/><\/p>\n<p style=\"text-align: left;\"><!--more--><\/p>\n<p><b>1. Audit User Activity <\/b><\/p>\n<p><span style=\"font-weight: 400;\">Employee monitoring software is useful to find out what your employees are doing while logged into their desktops. While it may be important to monitor their productivity, the real concerns are when it comes to insider threat management. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Did Linda from HR open a phishing email? Did the new intern share a secured file they should not have? It is important to understand what your employees are doing and educate them on best practices.<\/span><\/p>\n<p><b>2. Compliance<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Many industries have data and employee monitoring requirements, requiring log collection and monitoring systems which provide an audit trail of all access and activity to sensitive business information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the most well known is HIPPA, <a href=\"http:\/\/searchhealthit.techtarget.com\/definition\/HIPAA\">the US healthcare industry legislation which provides data privacy and security provisions for safeguarding medical information<\/a>. American financial services are regulated by SOX, a series of regulations enacted in response to a chain of high-profile financial scandals that occurred in the early 2000s which rattled investor confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, there are many other industry specific regulations which cover fields from education to the US federal government: NERC, FFIEC, FISMA, and FERPA. If any of these acronyms sound familiar, it\u2019s probably a good idea to ensure you are adhering to your industry\u2019s regulations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Recently China enacted similar requirements to SOX <\/span><a href=\"https:\/\/www.ft.com\/content\/b302269c-44ff-11e7-8519-9f94ee97d996\"><span style=\"font-weight: 400;\">which puts them in line<\/span><\/a><span style=\"font-weight: 400;\"> with worldwide practices as it accords with Europe\u2019s General Data Protection Regulation.<\/span><\/p>\n<p><b>3. Unethical User Activity<\/b><\/p>\n<p><span style=\"font-weight: 400;\">While insider threats can be accidental or negligent, they can sometimes be malicious. Though protecting devices and servers is necessary, organizations should not overlook the importance of protecting against personnel and contractors and consider employee monitoring.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Did a disgruntled employee who was recently fired extract sensitive data on their way out with the intent to sell it or release it publicly? When it comes to cybersecurity, an ounce of protection goes a long ways.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;The threat of insiders is real and what can happen is you have amazing defenses to protect your intellectual property and other secrets from those who are trying to obtain them from outside your company&#8217;s walls, but you forget sometimes to have a program where you are watching those who you trust,&#8221; said Assistant Attorney General for National Security John Carlin after the <\/span><a href=\"http:\/\/www.cnbc.com\/2016\/10\/05\/insider-threats-may-be-the-biggest-cyberthreat-an-organization-faces.html\"><span style=\"font-weight: 400;\">FBI arrested and charged an individual with theft of government secrets<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Computer monitoring software can identify the employee and record their actions.<\/span><\/p>\n<p><b>4. Monitor Third Party Vendor<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Giving external vendors such as outsourced call centres and managed service providers, access to your internal systems greatly increases the risks of theft of intellectual property and\/or damage to company infrastructure (mistakes made while deploying code, configuring systems or assigning user permissions, for example). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even trusted vendors with no malicious intent can potentially damage your systems or leave you open to attack. One of the most infamous instances of this type of breach occurred in 2013 to the American chain store, Target, <\/span><a href=\"http:\/\/blog.providertrust.com\/blog\/why-vendor-monitoring-is-your-responsibility\"><span style=\"font-weight: 400;\">when a supplier caused a network breach<\/span><\/a><span style=\"font-weight: 400;\">. Before Target\u2019s network admins could react, it was too late. Their network security was breached and sensitive financial data was stolen. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This issue is particularly acute in the healthcare field. On average, <\/span><a href=\"http:\/\/blog.providertrust.com\/blog\/why-vendor-monitoring-is-your-responsibility\"><span style=\"font-weight: 400;\">hospitals have about 1.5 times the amount of vendors<\/span><\/a><span style=\"font-weight: 400;\"> than employees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Third party monitoring is a way to ensure external vendors stay within their scope and are only performing their assigned tasks. This allows for more flexible access without sacrificing security. Having monitoring software eliminates \u201cwho did what?\u201d doubts, confirms SLA agreements and eases vendor billing verification.<\/span><\/p>\n<p><b>5. Litigation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">If there has been unethical user activity, it is likely there will be consequences for the employee or contractor. Ultimately, punishment could range from a slap on the wrist to formal legal proceedings and dismissal. User activity recordings are admissible in court and can provide powerful evidence if litigation becomes necessary. Making it well known that employee and contractor activity is being recorded can in itself serve as a strong deterrent and prevent transgressions before they happen.<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\"><span style=\"text-decoration: underline;\"><b>Cybersecurity Software for Monitoring Employees<\/b><\/span><\/a><\/p>\n<p>In the spirit of preserving your\u00a0data, session recording software offers a way to protect\u00a0your organization.<\/p>\n<p>Would you like to know more? Visit <a href=\"http:\/\/www.tsfactory.com\/\">www.tsfactory.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>5 Reasons You Should Monitor Your Employees\u2019 Computers &#8211; The Necessity of Remote Desktop &amp; Session Recording &nbsp;<\/p>\n","protected":false},"author":2,"featured_media":231,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[15],"class_list":["post-165","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest","tag-remote-working"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Reasons You Should Monitor Your Employees\u2019 Computers - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Reasons You Should Monitor Your Employees\u2019 Computers - Blogs\" \/>\n<meta property=\"og:description\" content=\"5 Reasons You Should Monitor Your Employees\u2019 Computers &#8211; The Necessity of Remote Desktop &amp; Session Recording &nbsp;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T13:35:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-10T06:40:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"1500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/\",\"name\":\"5 Reasons You Should Monitor Your Employees\u2019 Computers - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png\",\"datePublished\":\"2020-06-19T13:35:26+00:00\",\"dateModified\":\"2021-09-10T06:40:43+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png\",\"width\":600,\"height\":1500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Reasons You Should Monitor Your Employees\u2019 Computers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Reasons You Should Monitor Your Employees\u2019 Computers - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/","og_locale":"en_US","og_type":"article","og_title":"5 Reasons You Should Monitor Your Employees\u2019 Computers - Blogs","og_description":"5 Reasons You Should Monitor Your Employees\u2019 Computers &#8211; The Necessity of Remote Desktop &amp; Session Recording &nbsp;","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2020-06-19T13:35:26+00:00","article_modified_time":"2021-09-10T06:40:43+00:00","og_image":[{"width":600,"height":1500,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png","type":"image\/png"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/","name":"5 Reasons You Should Monitor Your Employees\u2019 Computers - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png","datePublished":"2020-06-19T13:35:26+00:00","dateModified":"2021-09-10T06:40:43+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2020\/06\/5-Reasons-You-Should-Monitor-Your-Employees\u2019-Computers-e1631256027605.png","width":600,"height":1500},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/5-reasons-you-should-monitor-your-employees-computers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"5 Reasons You Should Monitor Your Employees\u2019 Computers"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=165"}],"version-history":[{"count":5,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/165\/revisions"}],"predecessor-version":[{"id":255,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/165\/revisions\/255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/231"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}