The Case for Optimism in Employee Monitoring

Posted by Greg Moran on 11/17/17 9:44 AM


On Sunday, November 12, LinkedIn included in its Daily Rundown an article from The Guardian about employee monitoring technology. 
They then asked for feedback under the hashtag #bigbrotheremployer (nothing leading in that hashtag!).

It's been an interesting few days watching people weigh in on the topic, including Future of Work author Jacob Morgan.


Full disclosure: I'm the COO of Wiretap™ and I am quoted in The Guardian's article. I thought that it might be helpful to provide a perspective from the point of view of someone who has spent years contemplating the virtues, vices and slippery slopes of the employee monitoring landscape.

Read More

Topics: Compliance, Regulatory Compliance, #employeemonitoring, #bigbrotheremployer, #collaborationgovernance

Microsoft Ignite 2017 Wrap Up

Posted by Matt Huber on 10/9/17 3:53 PM

The Microsoft Ignite 2017 conference this year was one of the best yet.

The venue, speakers, city, staff, and so much more were just the perfect mix to host this year. Special thanks to all of those who had a chance to stop by our booth and check out the plinko game. Many people won "cold hard cash" and a few won "Franklins" or "Jacksons" — as put by Alan and Kristian, our expert game hosts and contest announcers. We also gave away many "lucky pens" and other Wiretap swag. We also gave away 500 shirts — and if you wore it to the special drawing, you had a chance to win one of many Wiretap branded power-bricks or an awesome Phantom 4 Drone! 

Read More

Topics: ESN, Enterprise Social Network, ESN Security, Office 365, Microsoft, Yammer, Ignite, Teams, Microsoft Ignite 2017

How Does Aware By Wiretap’s Yammer Retention Tool Help With Regulatory Compliance?

Posted by Matt Huber on 9/18/17 7:59 AM

Many risk-adverse companies find that keeping their Yammer content for too long is a risky practice when disaster strikes.  Disaster can come in many forms; a security breach, lawsuit, information ex-filtration and more.

Read More

Topics: ESN, ESN Security, Yammer governance, Record Retention, Regulatory Compliance, Office 365, Microsoft, Yammer

The Hidden Cost of Security-Related Consent Decrees - The Secret Weapon of Regulatory Agencies

Posted by Greg Moran on 8/22/17 5:10 PM

For those of us that have worked in highly regulated industries, consent decrees are not a new concept. However, in the tech industry, many companies are beginning to understand the power of this regulatory weapon. Last week the FTC slapped a consent decree on Uber for its flawed privacy practices that led to the disclosure of private information for 100,000 Uber drivers. The FTC cannot fine a company for its first violation, so many viewed the consent decree as a slap on the wrist for a serious violation. Perhaps they should have been fined, but let's parse the effect of that consent decree for a moment to see what it really means.

Read More

Topics: Consent Decree, Security Audit, Uber

Intellectual Property Leaks: A Top ESN Security Risk — A Wiretap Infographic Series (5 of 5)

Posted by Britt Newton on 7/26/17 5:24 PM

On average, intellectual property (IP) constitutes at least 80% of a company’s value. At any point in time, that IP is at risk from employees and partners that may accidentally or purposely expose business plans, merger/acquisition details, R&D results or patent information to unauthorized parties in or outside the company. A single leak can cost an organization millions — even billions — of dollars.

Read More

Topics: Infographic Series

Noncompliance: A Top ESN Security Risk — A Wiretap Infographic Series (4 of 5)

Posted by Britt Newton on 7/24/17 5:19 PM

The risks and costs associated with noncompliance can be extremely high. In some industries, financial penalties alone can cost an organization tens of thousands of dollars a day. This doesn’t include the time and expense of getting and staying compliant, damage to the company’s reputation, loss of shareholder trust, and so on.

Read More

Topics: Infographic Series

Insider Threats: A Top ESN Security Risk - A Wiretap Infographic Series (3 of 5)

Posted by Britt Newton on 7/21/17 1:32 PM

Organizations have always faced threats from inside. At any given time in a large, competitive workplace, there is usually at least one individual plotting their exit, attempting to garner information, business contacts and customers on their way out — or an employee or partner involved in some type of criminal activity. Sometimes, employees are inadvertently involved in malicious insider activity without even knowing it — tricked by another employee to send a file or download and share a document that shouldn’t be shared. Now with ESNs on the rise, those same employees and partners have even greater access to sensitive information that can be used against the company.

Read More

Topics: Infographic Series

Data Leaks: A Top ESN Security Risk — A Wiretap Infographic Series (2 of 5)

Posted by Britt Newton on 7/13/17 4:55 PM

A single data leak can cause millions of dollars or more in damage to an organization. ESNs and collaboration tools that aren’t properly monitored or secured expose the enterprise to possible data leaks and general chaos.

Read More

Topics: Infographic Series

HR Policy Violations: A Top ESN Security Risk — A Wiretap Infographic Series (1 of 5)

Posted by Britt Newton on 7/7/17 11:31 PM

Every large organization deals with HR policy violations and issues. Some execs might fear that a private social network could encourage unproductive behavior, but the opposite is true. The key is ensuring that the collaboration network and tools are properly secured and monitored.

Read More

Topics: Infographic Series

Security and the Enterprise Social Network

Posted by Matt Huber on 1/3/17 3:00 PM

By now, most people have heard of or are using a Enterprise Social Networks (ESN). You are probably using one in the form of Instant Messengers, Chat clients, or bulletin boards in your company and haven’t put that label on it. When we talk about these terms, they almost sound generic and archaic. But if you are new to them, the best way to describe these is to boil them down to their core components. Remember AOL chat rooms? A/S/L anyone? How about Bulletin Board systems? Those require admins to skim content to prevent the community from going up-in-flames. What if we add those systems to the enterprise today and mix in your culture? You may find that you have a pretty risky, yet rewarding tool to use. We call that Unsafe Collaboration.

Read More

Topics: ESN, Enterprise Social Network, ESN Security