It seems 2008 had two predominant themes.

1. I’m infected.  HELP?
2. How can I control what my staff do?

Being a support based organization, we spend most of our time in a reactive mode recovering various infections be they virus, bots and spyware, which at the end of the day, there really isn’t a whole lot of difference from a user’s perspective.  After the recovery or cleanup, the next question is how did it occur, and what can we do about it.

The truth be told, there is no absolute solution that can guarantee the problem will never recur.  That said, Most clients, new and existing, fail to realize how often we’re under attack from the least likely of sources.  Forget the waste of time and productivity, both from various surfing and spam as well as other time wasters (Facebook and the numerous video sites) and risk exposing activities like peer to peer networks (Limewire, Bit Torrent); computers have become integral to our businesses yet we constantly expose ourselves to various risks.

Let us show you how you can take steps to reduce this activity, including employee acceptable use contracts to monitoring to preventative solutions.

Verified by MonsterInsights