Seven Employee Monitoring Tips for Small Businesses - Slide 8

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven Employee Monitoring Tips for Small Businesses-8 Next

Set behavioral triggers to notify appropriate department heads when risky behaviors are conducted by employees in their department such as transmitting confidential information to unauthorized parties or participation in unproductive or inappropriate activities.

With the escalating use of mobile devices and tablets, along with the growing number of telecommuters, it’s critical for small businesses to stay on top of employee activity. According to the Ponemon Institute, the costs associated with data breaches caused by careless or malicious employees can be detrimental to an SMB — insider breach incidents cost businesses an average of $3.4 million per business per year. Furthermore, Ponemon’s survey found that 60 percent of exiting employees walked out with company information. That added to the productivity loss caused by unmonitored employees — the average unmonitored employee wastes approximately 30 percent of their workday on non-work-related Web browsing — is costing small businesses more than they realize.

While most large corporations have standard employee monitoring rules in place to prevent wasted time and the potential for data leakage, many small businesses do not have the time or resources to develop and enforce effective policies.

Ron Penna, Chief Strategy Officer at Awareness Technologies, outlines seven critical and effective employee monitoring approaches for small businesses to protect their intellectual property, prevent vital information from being leaked and to maximize employee productivity.

More Slideshows:


Tech CEO Report Card Find out how the CEOs of 12 top tech companies are rated by their employees.

Seven Dos and Don'ts for Digital Communication Our evolving online behavior reveals a lot about our habits and values.


Seven Sexy Smartphones This latest batch of smartphones calls attention to glasses-free 3D technology, front- and rear-facing cameras and Snapdragon processors.

 

Related Topics : Data Loss Prevention, Decision Support Systems, e-Commerce, Power Supplies, Privacy

 
More Slideshows

Security103-290x195.jpg How Self-Encrypting SSDs Enhance Data Security

Hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. ...  More >>

infra68-190x128 How to Mitigate the Risk of Data Loss and Disruption in 2016

What can SMB IT pros do to prevent data and financial loss heading into 2016? They must prepare their IT plans ahead of time. ...  More >>

WatchfulSoftwareDLPChallenges0x Data Loss Prevention: 5 Reasons You Need to Step Up Your Game

Sensitive content can be tricky for DLP solutions to identify after it's been saved or sent, as it may contain encryption, common words, vague patterns, or inexact input or context. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.