June 13, 2016 By Kevin Beaver 2 min read

Long ago, I spoke about employee monitoring, exploring the topic of monitoring employee and computer usage violations. What was a popular and challenging topic over a decade ago has seemingly become a nonissue in the corporate world today.

We’ve likely all violated acceptable usage policies, and people working in IT and security witness these issues on a daily basis. Management hears about it — sometimes. Other times they’re out of the loop. Regardless, computer misuse is often swept under the rug in businesses both small and large. I’m not convinced that’s the best approach.

Don’t Ask, Don’t Tell?

Do you simply use technical controls to keep your users in check? Blocking certain websites is certainly a great step toward setting people up for success. The problem that I often see is that most employees can’t tell you whether there’s a policy against them doing what they’re doing. They’re often out of the loop with no expectations set by management.

Do you get HR and higher levels of management involved? Of course. Computer usage violations are a management problem, not an IT or security problem. IT and security team members are there only to serve as experts in implementing what management wants and what they need to know about. They aren’t there to write and enforce the rules.

Do you ignore and move on? Perhaps a “don’t ask, don’t tell” policy is best for your business culture and politics. But even if that is the best fit, it still doesn’t justify computer abuses that may be creating untold business risks that have yet to be realized.

Monitoring Computer Usage Violations

If you rely on technical security controls such as web content filtering systems, you not only need to ensure their ongoing oversight, but you need to test them regularly as well. I find it interesting that so many content filtering implementations are half-baked. Some don’t block certain categories (i.e., adult content) while restricting access to legitimate social media sites and other online resources. Although a few of these sites may fall into the category of hacking, many of us in IT and security depend on them for knowledge.

Some content filtering systems are enabled on the corporate Wi-Fi network but are more lenient or disabled altogether on guest Wi-Fi. Perhaps the guest environment is deemed less important? Or could it be general ignorance over how guests (and occasionally employees) are abusing it? Either way, the bad traffic that’s getting through is still originating from your corporate network and could be creating unnecessary risks.

Only you know what’s best for your organization. The important thing is to think about this issue at the highest level possible, such as your corporate information security, audit committee or other executive level. Simply assuming everyone is doing the right thing all the time, or ignoring the fact that people are choosing to bypass your policies and abuse your systems, won’t cut it.

Assess. Acknowledge. Respond. That’s the recipe for an effective information security program — computer usage and all.

More from Risk Management

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

How cyberattacks on grocery stores could threaten food security

4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.Because the attack affected many digital systems, some stores were not able to accept credit/debit cards, while others had to shut…

Taking the fight to the enemy: Cyber persistence strategy gains momentum

4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.The momentum behind this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today