Pearl Software Blog

Internet Monitoring and Web Filtering Topics

Top 5 Cybersecurity Blogs You Should Add to Your Feed

In the following article, we will discuss a few different blogs that everyone should know about. The world of cybersecurity is constantly evolving and changing, and with that being said, blogs offer a great way for outsiders to stay connected with everything happening on the inside.

1. Digital Guardian

With its beginning found in 2013, Digital Guardian Blog has been a prominent source of news and articles that focus on data protection and threat research. The blog focuses on keeping corporate networks safe and preventing data theft on mobile devices, cloud applications, and other traditional endpoints. Digital Guardian most recently added cybersecurity editor Chris Brook to their team of writers. This is a great blog to start off with if you're looking to follow more cybersecurity blogs.

2. Graham Cluley

Graham Cluley had primarily worked as a programmer in the computer security industry beginning in the early 90s. He then began his personal blog in 2009. He has been able to rack up awards on an annual basis. This blog even earned him a spot in the Infosecurity Europe Hall of Fame, and it has been featured and quoted in numerous computer security publications.More...

A Few Ways You Can Keep Your Computer Safe From Hackers and Cyber Attacks

With a growing number of attacks being seen by our computers, the risk of cyber attack is bigger and more common than it ever has been in history's past. You may be asking yourself what we can do to protect our own computer and data from ransomware and viruses. In the following article, we compiled a few ways that you can use to keep your computer safe from hackers and cyber attacks. Let's take a look.
How Ransomware Can Destroy Your Computer
To begin, we should discuss what ransomware is exactly. Ransomware is able to gain access to a computer the same way any virus or computer worm could, either through an infected email or a compromised website. Once inside the computer, a user is then bombarded with pop-ups and warnings that lock them out of their own computer or remove important files from the host computer. This is then where the word Ransom comes into play as users are ordered to pay a ransom to the cybercriminal in order to gain access to their files once again.

Most security experts agree that you should not pay the ransom as it won't guarantee you'll regain control of the files or device in question. More...

Should Your Business Start Monitoring Skype Conversations?

We’re all aware of being monitored in our everyday lives, whether for security reasons or for consumer purposes. Another area where it may happen is in the workplace. As an employer, you may be wondering if you should do it and how. The easiest area in which to monitor the goings-on of the office is in workplace communication tools. One of the most popular VoIP and communication technologies is Skype. Here, we’ll discuss some of the capabilities of the app and how it can be utilized by employers.

First off, there are several versions of Skype available for use by businesses:

  • Skype is a free communication and VoIP tool for consumers; it can be used by businesses of up to 25 people.
  • Skype for Business is available in two versions: Skype for Business Online, which is a cloud-based version and is part of the Microsoft Office 365 Suite, and Skype for Business Server, which is the on-premise version and is meant for large enterprise organizations, utilizing a company’s servers.

Is Skype secure?

Of course, as an employer, you’ll want to ensure that all of your data – whether between employees and customers/clients or within the workplace – is secure. Both Skype and Skype for Business offer security, but of varying standards and features.

Skype is encrypted for any conversations that take place between Skype users, including instant messages, calls, and file transfers. Calls that occur between a Skype user and landline or mobile phone network is only encrypted on the Skype portion of the conversation.

Skype for Business offers more robust security standards. These standards include encryption at-rest and in-transit, threat management, and security monitoring – among others – from Skype for Business Online. Skype for Business Server offers possibly the highest level of security, including server-related security options, server-to-server authentication, and role-based access control.

Can Skype usage be monitored?

Both Skype and Skype for Business offer monitoring in varying degrees. Skype utilizes Skype Manager, which allows a company to monitor usage for things like time, date, duration, and destination of calls and conversations. However, permission is required from members first to access this data.

Skype for Business and Skype for Business Online provide more information on users’ activity, including peer-to-peer activity, conference participant activity, and reports for ‘clients used’ and ‘blocked users.’ Skype for Business Server offers the highest level of detail in monitoring.

Where are Skype conversations stored?

In Skype, conversations are stored on the user’s hard drive for a set time period. Skype also saves the last 30 days of a conversation history in the cloud, so it can be accessed from any device.

Skype for Business Online stores conversations in a Microsoft Exchange folder. The drawback to this is that employees can disable the conversation history from being saved to Outlook, which means that nothing is saved at all. To store conversation history outside of the Exchange folder, Skype for Business Server must be used. The conversations are then stored on the business server, making it easier to manage.

The verdict on monitoring Skype conversations

It’s clear that Skype conversations can be monitored, but it’s largely dependent on both your company’s policies and the privacy laws in your state whether or not you do so. Skype for Business clearly offers the most in monitoring capabilities, but ultimately, as the employer, it will be up to you which app you choose to utilize in the workplace and how much – if any – monitoring you will be doing.


The Cost of Social Media in the Workplace

Do you know what kind of impact social media is having on your workplace and employee productivity? With the rise in popularity of social media sites such as Facebook, Twitter or even Pinterest, it is becoming more and more common for workers to spend time during the workday on these platforms. Did you know that some employees spend up-to 32% of their time on social media daily, while at work!? Although it can be essential for your business to partake in the conversation online, there is no reason all of your employees should be accessing their social media accounts while on the clock.

The Most Popular Social Media Sites

When it comes to social media sites, they seem to be constantly multiplying. It can be hard to determine which platforms your employees are wasting your time and money on. The most commonly used social media websites include: More...

Pearl Software Releases Echo 12 R3 Cybersecurity Suite

Security Extended to Skype for Business Chat and IM

Philadelphia, PA  June 18, 2018

Pearl Software has released Version 12 R3 of its enterprise-class Internet monitoring and web filtering product line.  This latest release extends Pearl Software’s Echo cybersecurity technology to Skype for Business.  Focusing on enterprise customers, Echo’s data leak prevention (DLP) for Skype can accommodate Microsoft Lync installations as well as Skype used as part of the Microsoft Office 365 offering.  Echo provides administrators with full insight into encrypted Skype Chat and IM communications without jeopardizing the integrity of the communication’s security or the quality of voice and video services. More...

March Madness - Balancing Improved Morale with Lost Productivity

March Madness activities in the workplace can affect employee morale in a positive way.  The multi-weeklong event has a way of getting employees involved with one-another in a non-work-related activity.  On the other side of the equation, the cost of lost productivity will balloon as workers spend more than an hour streaming, filling out brackets or just discussing the games with co-workers.

Pearl Echo allows you to align your organization’s Internet access rights with your company’s culture.  With Pearl Echo you can easily allow full and monitored access to March Madness content or completely lock down all gaming and sports content sites.  You can also strike a balance and allow access to content during lunch and off hours on a user, group or company-wide basis.  

Pearl Echo allows you to set software rules that mesh with your company culture; not force your company culture to fit how a web-filtering program is designed.

Check out a full version with our latest features here:

Pearl Software Enforces Google, Bing and Yahoo Safe Search

Pearl Echo expands web filter technology to lock-in adult content filters provided by popular web search sites.

Pearl Software, the inventors of real-time, mobile Internet monitoring and web filtering has released Safe Search enforcement as a component of its web filtering capabilities. Google, Bing and Yahoo Search provide optional search settings to filter out inappropriate and adult-oriented content from their search results. Pearl Software’s latest Echo cybersecurity products ensure Safe Search is enabled and not circumvented by the end user.

“Using their web browsers, end users have the ability to easily disable their search engine’s Safe Search setting,” said Pearl Software CTO, Joe Field. “Because Pearl Echo does its work on the user’s device down at the network layer, Pearl Echo can be configured to override the user's settings, ensuring that Safe Search remains on.” Safe Search uses the search provider’s proprietary technology to filter a fair amount of inappropriate material and adult content. For this reason, Safe Search enforcement is just one aspect of Pearl Echo’s blended approach to web filtering. More...

Pearl Software Releases HTTPSafety.Check™ to Safeguard Cybersecurity Policy During Web Access

New Web Filter Technology tests encryption strength, ensuring a safer browser experience.

Philadelphia, PA (PRWEB) May 02, 2017

Pearl Software, the creator of real-time, mobile Internet cybersecurity has released HTTPSafety.Check as part of its web filtering platform. A vast number of web servers that offer weak encryption are vulnerable to attack making protected data transfer susceptible to prying eyes. Pearl Echo’s HTTPSafety.Check blocks sites that don’t maintain a current and strong level of encryption, ensuring a safer browser experience. More...

Pearl Software Releases Echo Smart.Capture™ For Targeted Cybersecurity Analytics

New Web Filter Technology Helps Management Focus on Internet Usage Trends

Exton, PA (PRWEB) March 28, 2017

Pearl Software, the creator of real-time, mobile Internet monitoring and web filtering has released Echo Smart.Capture as part of its cybersecurity product line. Pearl Echo Version 12 R2 now includes the ability to monitor a user’s web browsing while filtering out non-pertinent traffic. Echo Smart.Capture uses heuristics to determine what monitored activity is user-based versus activity such as advertisements, style content or Facebook and Twitter tie-ins that a site may use in rendering content in a web browser. More...

Pearl Software Releases Pearl Echo 12 R2 Web Filter

Echo Cybersecurity Extends Encryption Monitoring to Remote Desktop Services

Exton, PA (PRWEB) February 27, 2017

Pearl Software released Pearl Echo Version 12 R2, its flagship Internet monitoring and web filtering product. This latest release extends Pearl Echo’s Crypto.View™ technology to work in a multi-user and server-centric environment like Microsoft’s Remote Desktop Services (RDS) and Citrix’s XenServer. Echo Crypto.View provides administrators with full insight into encrypted communications including secure web (HTTPS) as well as secure email (SSL/TLS). Pearl’s patented real-time cyber threat suite includes the ability to monitor and control Internet communications that have been protected with encryption without jeopardizing the integrity of communication security. More...