10 Steps to Keep Children Safe Online

Technology, in particular the Internet, has completely changed the way that we work, shop, play and learn. Classrooms around the world have been transformed as teachers who now have access to real-time information, immersive technologies and creative tools inspire and motivate their students. Blogs, podcasting and video sharing now provide real and authentic audience for children’s work as well as a rich variety of new learning materials.

Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat it

Anonymous proxies are an unseen threat—a student’s or employee’s backdoor to malicious or productivity-sapping sites on the Internet. If your URL filtering solution relies on the old-school URL database/keyword approach, your ship is leaking and you may not see the holes.

Internet Safety & Responsible Use – Emerging Threats in Education

The media is often full of examples of how children and young people are at risk and under constant threat from some of the dangers posed by the Internet. The truth is that just like any environment, online or offline, virtual world or real world, there will always be dangers.

Productivity, Internet Abuse, and How to Improve One by Eliminating the Other

The Web can be an incredible business tool—and a potential threat. The change that the Internet has and will continue to produce in the world marketplace—and in life in general—is certainly comparable to revolutionary innovations in the past, such as the introduction of automobiles or even the printing press.

Protecting Your Network Against Risky SSL Traffic

Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure Socket Layer (SSL), a transport layer encryption protocol that protects data against unauthorized access. In this manner, the financial information submitted during an online banking session is protected as it is sent from the user’s client to the bank’s server.

Social Media in Education: Enhancing Learning and Managing eSafety

Social media is both powerful and purposeful, yet its full potential is still to be realised in education. How can it be used to transform our classrooms in the same ways that it has transformed many other aspects of our lives?

Social Networking in the Business World: A Strategic Approach

Is an outright ban on workplace social networking a good idea? Or should companies be more calculated in their points of view and look at how the negative effects social networking has on a company’s bottom line can actually turn positive if management adopts a more strategic policy than has been common in the past.

The Essential Role of Reporting in Effective Web Filtering

It is perhaps natural to assume reporting is secondary and less important to blocking access to some Websites and allowing access to others. In fact, robust reporting offers extremely valuable capabilities that extend beyond the mere confirmation that a Web filter works.

The Legal Risks of Web and Email

Access to Web and email are essential for any business to be successful. However, there are a large number of potential legal risks that organizations need to be aware of and ensure that they put in place effective policies and procedures to minimize these risks.

Understanding Web Filtering Technologies

The Internet is now a huge resource of information and plays an increasingly important role in business and education. However, without adequate controls in place, organisations are likely to be faced with a broad range of issues. These range from excessive personal use of the Internet during business impacting staff productivity to legal risks if users access inappropriate content.

Stemming the Email Tide

It is hard to image any business managing without the use of email these days. Technology has made it easier for all of us to read and send email at anytime and from anywhere. This fuels our need to be connected to our email system and drives our behaviour to read email as soon as it arrives. Email is fast becoming an addiction.

The Increasing Risks from Email

With organisations now facing a growing number of security threats and an increasingly regulated and compliance driven business environment, ensuring security and compliance across their email infrastructure is paramount. The complexity of this challenge is ever changing and requires a comprehensive email gateway security solution that will provide outstanding protection against email security risks.

Empowering learning with BYOD

Bring Your Own Device, or BYOD, is the simple idea that young people and
school staff are allowed to bring their own Internet-enabled device into school
and use it to help them work, learn and (if appropriate) socialize.
However, for what may seem like such a simple idea there are a lot of barriers
(organizational, pedagogical, technical and cultural) that will need to be
overcome to ensure the success of BYOD in schools.

Port Mirroring (SPAN Port) Deployments for Web Filtering

There are many different ways to deploy a Web filter in your network. Port Mirroring or SPAN Port deployment is a deployment approach that can be used, but there are significant issues related to this method that can limit the effectiveness of your filter.
This short white paper discusses some of the inherent switch-related performance issues in mirrored ports and describes some of the functionality limitations the deployment method has on Web filters.

The Seven Key Facts about SSL Content Inspection

SSL Traffic levels are on the increase and legacy approaches to content filtering no longer
provide the levels of protection and security required. A more viable approach is to deploy
a Web content filter that allows you to securely intercept your SSL traffic then analyze and
categorize the content. This approach delivers advanced protection against SSL threats,
This white paper provides a high level overview of why SSL traffic levels are rising, the
limitations of legacy approaches to managing SSL traffic and the benefits delivered by a
Web filter that uses SSL content inspection.

The Benefits of SSL Content Inspection

SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic to new heights. But not all SSL traffic is benign and without the right security tools, SSL can be a blind spot into your network.
Web filters that use URL inspection can only provide limited protection against malicious SSL traffic and so a more advanced approach that intercepts the SSL traffic allowing the filter to examine the traffic is fast becoming a critical requirement.

How to Monitor Employee Web Browsing and Email Legally

The Internet and email are indispensable resources in today’s business world. However, they do carry risks, and many companies now recognise a need to monitor how their staff are using these tools. But what are the laws around this for employers, and how is it to best implement these kinds of practices?
This white paper provides an overview of some of the issues around monitoring employee Web browsing and use of email.

The Legal Risks of Bring Your Own Device (BYOD)

There are wide ranging benefits to be gained by companies who allow their employees to work with their own technologies in this way. However, along with the benefits, the practice of BYOD also brings with it a range of associated legal issues and risks to corporate wellbeing, if not carefully managed.