Web Filtering whitepapers
10 Steps to Keep Children Safe Online
Technology, in particular the Internet, has completely changed the way that we work, shop, play and learn. Classrooms around the world have been transformed as teachers who now have access to real-time information, immersive technologies and creative tools inspire and motivate their students. Blogs, podcasting and video sharing now provide real and authentic audience for children’s work as well as a rich variety of new learning materials.
However, with this technology comes increased responsibility. It seems that every other week there is a high profile news story about the latest online fraud, virus outbreak, inappropriate content being hosted on popular websites or children at risk from on-line predators using the very tools that have so much potential for learning.
One of the biggest challenges that education professionals face is effectively striking the balance between delivering a safe online environment for young people that is not so restrictive it diminishes the obvious benefits. This means giving young people the information and skills they need to use the technology responsibly, taking advantage of any opportunities, managing their own safety and the safety of others and being able to deal with any risks that occur.
Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat it
Anonymous proxies are an unseen threat—a student’s or employee’s backdoor to malicious or productivity-sapping sites on the Internet. If your URL filtering solution relies on the old-school URL database/keyword approach, your ship is leaking and you may not see the holes.
With hundreds of new proxy sites created each day, traditional URL filtering just can’t keep up, even when supplemented by standard keyword analysis. What follows is a primer on the problems, the sizable costs and time drain for IT professionals, and a discussion of an effective third-generation solution that goes far beyond the traditional strategy.
Internet Safety & Responsible Use – Emerging Threats in Education
The media is often full of examples of how children and young people are at risk and under constant threat from some of the dangers posed by the Internet. The truth is that just like any environment, online or offline, virtual world or real world, there will always be dangers.
In the real word we manage the perceived risk of these dangers by understanding the environment and doing our best to help educate the most vulnerable, often the very young and very old. The same holds true for the online world. One of the biggest issues that educational professionals face regarding Internet safety and responsible use is that many do not fully understand the online environment and emerging technology or the huge impact this has had on the behaviour and expectations of young people. This in turn makes it very difficult to educate and protect students while at the same time providing the environment that allows them to take full advantage of the learning opportunities of the Internet.
This paper outlines some of the emerging issues that education professionals need to be aware of if they wish to be ambassadors for the Internet Safety and Responsible Use Agenda.
Productivity, Internet Abuse, and How to Improve One by Eliminating the Other
The Web can be an incredible business tool—and a potential threat. The change that the Internet has and will continue to produce in the world marketplace—and in life in general—is certainly comparable to revolutionary innovations in the past, such as the introduction of automobiles or even the printing press.
This white paper, however, will not focus on Internet highlights, but on some of the considerable downsides—and how to eliminate them. Specifically, we will discuss the effect of Internet abuse on employee productivity, which is huge and not fully appreciated. We will then examine the best strategies and technologies to combat abuse so that organizations can enhance the Internet as a tool and remove its potential as a productivity curse.
Protecting Your Network Against Risky SSL Traffic
Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure Socket Layer (SSL), a transport layer encryption protocol that protects data against unauthorized access. In this manner, the financial information submitted during an online banking session is protected as it is sent from the user’s client to the bank’s server.
However, not all of the content that’s encrypted with SSL is benign. The content may be illegal, inappropriate or infected with malware and other threats that can harm the organization’s network, and without visibility into SSL-encrypted traffic, how can you protect the network against these threats? The purpose of this white paper is to help you understand the threats associated with SSL traffic and how to protect your network against them using Web content filtering.
Social Media in Education: Enhancing Learning and Managing eSafety
Social media is both powerful and purposeful, yet its full potential is still to be realised in education. How can it be used to transform our classrooms in the same ways that it has transformed many other aspects of our lives?
Social Networking in the Business World: A Strategic Approach
Is an outright ban on workplace social networking a good idea? Or should companies be more calculated in their points of view and look at how the negative effects social networking has on a company’s bottom line can actually turn positive if management adopts a more strategic policy than has been common in the past.
There are certainly good reasons to suppose that unfettered employee access to social network sites can cost your company dearly, and we will discuss some of these reasons in this white paper. But there are also good reasons for thinking that certain types of social networking can benefit many companies a great deal.
Does it have to be all or nothing? We think not, and the purpose of this paper is to explain how employers can manage employee social networking in a way that significantly reduces the negatives and maximises the positives. The strategy combines employee education, well thought out Acceptable Use Policies (AUPs), and—critically—effective, discriminating Web filtering technology.
SSL Whitepaper US
The Essential Role of Reporting in Effective Web Filtering
It is perhaps natural to assume reporting is secondary and less important to blocking access to some Websites and allowing access to others. In fact, robust reporting offers extremely valuable capabilities that extend beyond the mere confirmation that a Web filter works.
If reporting is reliable, comprehensive, precise and flexible, it can be used in conjunction with Acceptable Use Policies to regulate and ensure compliance of Internet access by users. This white paper explores the value of effective reporting and its place in delivering a more rounded and complete Web filtering solution as well as outlining key reporting requirements, the functionality required to achieve it and the end results.
The Legal Risks of Web and Email
Access to Web and email are essential for any business to be successful. However, there are a large number of potential legal risks that organizations need to be aware of and ensure that they put in place effective policies and procedures to minimize these risks.
Understanding Web Filtering Technologies
The Internet is now a huge resource of information and plays an increasingly important role in business and education. However, without adequate controls in place, organisations are likely to be faced with a broad range of issues. These range from excessive personal use of the Internet during business impacting staff productivity to legal risks if users access inappropriate content.
This has led to the emergence of web filtering products, which organisations can deploy to enable proactive management of Internet access for users.
This whitepaper discusses some of the technology options available for web filtering and reviews the benefits and limitations of each.
Email Filtering whitepapers
Stemming the Email Tide
It is hard to image any business managing without the use of email these days. Technology has made it easier for all of us to read and send email at anytime and from anywhere. This fuels our need to be connected to our email system and drives our behaviour to read email as soon as it arrives. Email is fast becoming an addiction.
This white paper details the drivers behind email, explains individual be- haviours to both reading and sending email, and describes the impact these behaviours have on a business’s productivity. We will then examine the best strategies and technologies to combat email addiction so that individual emailers can use email to its full potential without the added stress, strain and productivity issues that go with it.
The Increasing Risks from Email
With organisations now facing a growing number of security threats and an increasingly regulated and compliance driven business environment, ensuring security and compliance across their email infrastructure is paramount. The complexity of this challenge is ever changing and requires a comprehensive email gateway security solution that will provide outstanding protection against email security risks.
This white paper details the increasing risk from email and the threats both inbound and outbound. We will then examine how organisations go about protecting their email gateway and provide a list of questions organisations should ask when choosing the right solution.
Media Filtering whitepapers
Allowing Safe Access to YouTube in the Classroom
YouTube, which is owned by Google, is a video sharing website where users can upload and share videos and has been one of the biggest Internet success stories. An estimated 65,000 video clips are uploaded to the site every day and it is now the fourth most visited site on the Web. Many countries are using YouTube to improve engagement with citizens and have YouTube channels dedicated to Government speeches and news with many commercial media organisations using YouTube to distribute high quality video content, including the BBC, CNN, The History Channel, Russia Today.
Due to the fact that YouTube receives 20 hours of video content every minute making it impossible for Google to screen content as it is uploaded, the site has never been far from controversy over inappropriate or offensive content. Despite the issues around inappropriate content, the site now hosts a large and rapidly increasing number of high quality educationally relevant videos covering the entire curriculum, however schools have so far been reluctant to allow students and teachers open access to the site.
This white paper examines the risks and challenges of using YouTube in the classroom and discusses some of the latest solutions to allow schools to use YouTube safely in the classroom.