Managers: How to monitor your employees' Internet usage

August 2011
Firstline;Aug2011, Vol. 7 Issue 8, p9
The article offers simple tools to check employees' improper computer usage. It cites the case of Donna Recupido-Bauman, hospital administrator at Veterinary Specialty Care, whose system was damaged by a computer-crashing virus when an employee visited an adult Website. Suggestions include creating a computer usage policy, installing content-control software, and appraising the benefit of an internet-monitoring software.


Related Articles

  • Conquer the world (wide Web).  // Firstline;Aug2011, Vol. 7 Issue 8, p6 

    The article reports that 81% of veterinary practices allow team members to access the Web at work and offers advice for those who are behind in their use of technology. Donna Recupid-Bauman, certified veterinary practice manager (CVPM), says doing things the same old way keeps them from...

  • Fake Infection Warnings Can Be Real Trouble. Larkin, Erik // PCWorld;Apr2009, Vol. 27 Issue 4, p41 

    The article offers tips to computer users on dealing with pop-ups that warn of system infection. Such warnings, designed to get users to install and buy fake antivirus products, could be an alert about an underlying malware infection. The pop-ups or fake scanner windows do not cause lasting...

  • On Watch. Kooser, Amanda C. // Entrepreneur;Sep2008, Vol. 36 Issue 9, p31 

    The article focuses on employee computer-use monitoring in the U.S. It states that a study conducted by Robert Half Technology Inc. found that 37% of polled companies had both a corporate policy and software in place to prevent employees from accessing certain web sites. It adds that the biggest...

  • Websense Evolves Along With Internet. Allen, Mike // San Diego Business Journal;8/9/2004, Vol. 25 Issue 32, p9 

    Reports on the specialization of Websense in making software that prevents personal computer users from visiting certain Web sites in San Diego, California. Ability of its product to prevent employees from downloading viruses and other bugs contained in e-mail attachments; Sales performance of...

  • THREAT OF THE MONTH.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2006, p17 

    This article provides information on the computer virus Sober.Y which belongs to the Sober family. The Sober code is considered more inventive and dangerous than Mytob. Due to the ability of the virus to update itself from Web sites on specific days, it has caused anti-virus firms to...

  • McAfee to provide total protection for corporations. Messmer, Ellen // Network World;12/4/2006, Vol. 23 Issue 47, p76 

    The article reports on the plan of McAfee Security for Consumers to announce the development of the second version of its corporate client security software dubbed Total Protection in the U.S. The newer version has a combination of antivirus, antispyware, host-based intrusion-prevention and...

  • Fusion spotlight.  // Network World;02/15/99, Vol. 16 Issue 7, p38 

    Presents web sites on the Internet covering various topics. Includes the computer virus myths web page; Discussion on the Layer 4 switching technology; Statistics Server 4.2 software from MediaHouse.

  • Prevention, updates crucial in taming the 'Silicon beast'. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);9/24/2007, Vol. 28 Issue 9, p18 

    The article provides tips to prevent computers to stop working. It is helpful to use an anti-virus program, fire-wall program, and anti-spyware program. The author emphasizes the best approach to update Windows or whatever operating system an individual is using regularly. He stresses the need...

  • How Serious a Threat Are Computer Viruses? Goldsborough, Reid // Tech Directions;Aug2007, Vol. 67 Issue 1, p14 

    The article offers information on computer viruses. Viruses are small computer programs that can replicate and spread from one computer to another through e-mail or CD-ROM discs. Tips on protecting computers from viruses is presented. Computer users are advised to use care with electronic-mail...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics