Get a Pentest and security assessment of your IT network.

News

Adventures in Key Logging

There is a growing trend toward the use of monitoring software and, in some cases, key logging hardware or software. While these measures may be justified in some circumstances, they should be used with discretion. In some states, you are required to place employees on notice that their computer-related activities may be monitored. Failing to properly advise employees of monitoring activities may violate state and federal laws and, at a minimum, create employee relationship issues. To minimize these issues, every company considering using monitoring tools should also consider updating its technology use policies.”]

Source: https://www.csoonline.com/article/2136652/adventures-in-key-logging.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months