An online scammer recently tried to dupe the daughter of a Pearl
Software employee. The scammer was double-crossed, revealing his true
country of origin, source IP and ISP. The FBI is now involved.
For many small businesses, the lure of selling end-of-the-year
inventory on eBay or Craigslist is tempting. The problem is that these
sites can be littered with scammers looking for unprotected sellers that
are not highly cautious during the holiday season. What follows are a
few of the biggest scams that can cost businesses serious money and
A scam that often occurs during the holidays is
fake buyers who will complete the purchasing process through PayPal for
items from a small business. Once the honest seller sends the item, the
scamming buyer files a dispute or chargeback with PayPal saying that he
or she never received the merchandise. This is dangerous because, in
most instances, PayPal will side with the buyer if the seller has failed
to take precautions. More...
It is strongly recommended that an Internet Acceptable Use Policy be
developed and communicated to all employees when an organization begins
using an Internet monitoring or web filtering product.
New Jersey Supreme Court issued an opinion in Stengart v. Loving Care
Agency, Inc. considering whether an employee had a reasonable
expectation of privacy in emails she exchanged with her attorney via her
web-based personal email account using a company laptop. In concluding
that the former employee did have an expectation of privacy, the Court
analyzed the adequacy of the notice provided by the company's electronic
communications policy and the important public policy concerns raised
by the attorney-client privilege. More...
Terminating an employee for poor performance or misconduct is not
simple. If inappropriate employee Internet usage supports your decision
to remove an individual, it is important that you dot your “I’s” and
cross your “T’s”. The more documentation you have supporting Internet
usage, the more likely you will be to prevail should an ex-employee file
a wrongful termination suit against your company. More...
Tougher legislation aimed at protecting copyrighted materials is driving
illegal file sharing underground and causing users to unlawfully
'Piggy-back' off wireless networks in order to download content
anonymously, leaving businesses open to bandwidth abuse and theft. Many
businesses have set up loosely secured hotspots for visitors or for
convenience. Illegal access by outsiders may cause businesses new
headaches as illegal file sharing is traced back to the point of access.
is precedence, however, that may help businesses that get ensnared in
this situation. In 2005, a 40 year old Florida man was arrested and
charged with a felony for stealing bandwidth from a nearby WiFi
connection. The man was charged under a seldom used-Florida law that
prohibits accessing a computer or network knowingly, willfully and
without authorization. The owner of the WiFi connection was concerned he
might be linked to whatever the accused was doing such as accessing
porn sites or child pornography.
A comprehensive reporting module is a “must have” with any employee
Internet management solution. The reporting module’s purpose is to
synthesize raw data and turn it into information that can be easily
understood and used by MANAGERS to manage their employees. The amount of
time and labor cost a user spends at sports related Web sites is an
example of an informative report. The number of violations to your
organization’s Internet Acceptable Use Policy is another. Reports should
provide information graphically and numerically and should be able to
be scheduled to be run and distributed automatically. Advanced features
like report customization and distributed reporting can also be
beneficial. In large or growing organizations you may want to have
managers run their own reports however you may want to limit you
manager’s visibility to data of only those employees for which they are
Exton, PA (PRWEB) May 21, 2014
Pearl Software announced the release of Echo.Cloud.Filter™, its cloud-based Web filtering solution. The Echo.Cloud.Filter provides organizations with over 60 content categories to block including custom Web white and black lists. Because its Web filtering occurs in the cloud, the solution is operating system and device independent. Filtering rules can be implemented without installing software on endpoints or adding additional hardware on-premises. Administrators can be confident that access to Web content is in line with policy, even if users are guests on the network or bring their own devices (BYOD) to use on an organization’s Wi-Fi hotspot.
“IT staff has the incredible challenge of securing their network while trying to accommodate users’ as they detach from their desktop with their personal devices like smart phones and tablets,” said Pearl Software CTO, Joe Field. “With Echo.Cloud.Filter, users of an organization’s Internet are easily pointed to our filtered DNS servers where custom access rules are applied. Administrators log into the Echo.Cloud.Filter portal to view usage details as well as set policy.”
Echo.Cloud.Filter provides organizational-level reporting and filtering policies. The product is configured in minutes as there is nothing to install and nothing to maintain. The Echo.Cloud.Filter DNS servers are redundant and multi-tiered, capable of filtering every URL request and either honoring them or redirecting them to a default or custom warning page. The Web filtering rules are based on Pearl’s Echo.Fitlers™ URL filter database, a component of Pearl Software’s leading suite of Internet monitoring and control products. For organizations needing additional monitoring and control features, Pearl Software provides Website.Echo as well as its flagship product, Pearl Echo.Suite.