spectorsoft

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
Published By: SpectorSoft     Published Date: Dec 12, 2013
Spector 360 Recon – Balance Employee Privacy and Corporate Security
Tags : 
spectorsoft., free trial, spector 360 recon
    
SpectorSoft
Published By: SpectorSoft     Published Date: Dec 12, 2013
Detect Critical Network Events with Proactive Server Monitoring
Tags : 
spectorsoft, free trial, event logs, critical network events
    
SpectorSoft
Published By: SpectorSoft     Published Date: Aug 28, 2012
This whitepaper will describe the best methodologies used to perform investigations, and why investigating proactively can help.
Tags : 
human resources, spectorsoft, employee investigations, file auditing, user activity monitoring, human resource technology
    
SpectorSoft
Published By: SpectorSoft     Published Date: Jan 14, 2013
There are mediums you allow everyday access to that can be used to raise productivity and meet business objectives, but can just as easily be used to take data out of the business.
Tags : 
spectorsoft data security, threats, stealing data, fraud, business technology
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the SpectorSoft Implementing Monitoring white paper and you will learn how to assist company executives with determining whether or not to implement employee activity monitoring.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download The SpectorSoft Insider Threat Survey Report and read about 10 alarming Insier Threat trends.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 18, 2014
Download the Simplifying Employee Investigations white paper and learn about some of the real-world issues businesses face that result in employee investigations, the methodologies used to perform investigations, and then we’ll look at why investigating proactively can help.
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 22, 2014
Remote employees have more opportunity for distraction, lack of training, and inability to be refocused on task than their in-office counterparts, so companies need to get serious about ways to gain visibility into the activities of their remote employees to gauge productivity
Tags : 
employee monitoring, user activity monitoring, security, insider threats, data breach, employee privacy, employee investigation, incident response
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 01, 2015
Corporate computers and information and communications systems (collectively, “electronic resources”) remain the workhorse for most businesses, even as alternatives, such as third-party text messaging services, external social media, and cloud computing, flourish. Employees rely on corporate electronic resources for e-mail, calendaring, business contacts, Internet access, document creation and storage, and a multitude of other business applications. Consequently, for employers, it is critical to establish and maintain their right to inspect all information stored on, and to monitor all communications transmitted by, corporate electronic resources. The corporate acceptable use policy is the linchpin of that effort. The ten tips below are intended to aid employers who either want to implement an acceptable use policy for the first time, or who need to update their policy.
Tags : 
acceptable use, communications systems, text messaging, acceptable use policy, confidentiality, security, it management, knowledge management, data management
    
SpectorSoft
Published By: SpectorSoft     Published Date: Apr 03, 2015
You just got news of yet another issue that just happened in your business that now you need to deal with – it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. Especially in cases of data theft, fraud, embezzlement, etc., having detail on everything the employee did leading up to the purported “bad deed” will be critical in determining whether something improper occurred or not.
Tags : 
sexual harrassment, embezzlement, employee investigations, human resource technology
    
SpectorSoft
Published By: SpectorSoft     Published Date: Jan 23, 2015
This White Paper will present some common sense suggestions for improving the “beginning of the lifecycle” risk mitigation process. In other words, ways to add a bit more intelligence beginning with the screening and hiring process. Then, we’ll look at how to tie the efforts made at the beginning of the lifecycle to the rest of the employee lifecycle, using a combination of process and tools to significantly improve security, and reduce the chances of an insider incident.
Tags : 
spectorsoft, risk mitigation, insider threat, background checks, screening process, hiring process, networking, security, it management
    
SpectorSoft
Search      

Add Research

Get your company's research in the hands of targeted business professionals.