StaffCop Blog

StaffCop Blog

Information security audit of a company

Information security of a company takes a significant place in modern business world. Non-compliance with information security rules leads to data leaks damaging the market reputation of the company. There are cases when companies are forced to leave the market due to data leaks, and this almost al-ways leads to the collapse of the business.

Keyloggers: what do we know about them?

It’s hard to imagine a modern company without a computer network. Usage of workstations increases employee productivity due to increased speed of information search, information exchange and the ability to communicate with remote colleagues. However, computers and access to the internet can become the reasons of distraction of employees from their duties.

Keylogger

Keylogger is a special kind of software that logs history of pressing keys and represents it the form of text that was input with the keyboard.

Work time tracking, employee monitoring and remote control

It’s hard to imagine a modern company without a computer network. Usage of workstations increases employee productivity due to increased speed of information search, information exchange and the ability to communicate with remote colleagues. However, computers and access to the internet can become the reasons of distraction of employees from their duties.

What can you learn during the trial period of StaffCop?

After finishing the trial period of StaffCop the majority of companies have to make crucial decisions concerning their business processes. We hear about data leakage quite often, although the majority of the directors are sure that it won’t happen to their companies.

Information security in events of StaffCop Enterprise

StaffCop Enterprise collects data in the form of events. This article explains what cybersecurity threats are registered as events, what actions can be taken over events of various kinds and how you should react on threats.