Every IT manager and IT Security Officer is aware nowadays, that the biggest threat to sensitive data stored in the information system, are the employees themselves. One type of protction against the leakage of business-critical data is monitoring of the users. The essence of user monitoring is that every action of the employees are kept under continuous surveillance and control. In case of various events - eg. opening sensitive files - automated responses can be provided so that the unwanted data leakage can be prevented.
-
Which chat application is used the most?
-
Which employees spend the most time with instant messaging?
-
Which web pages are visited most often?
-
Who recives and sends the most e-mails?
-
Which applications the employees run the most?
-
Who loads up / down the most files?
-
Who printes the most documents?
-
Who copies data to portable data storages?
-
When does the employee sign in (when does he/she starts to work)?
-
How long does the employee takes a lunch break (inactivity)?
-
Which applications / employees are using the most bandwidth?
-
Which employees search the most on the internet?