Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities - PowerPoint PPT Presentation

bernad
internet content and e policy strategies messaging explosion brings risks and opportunities l.
Skip this Video
Loading SlideShow in 5 Seconds..
Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities PowerPoint Presentation
Download Presentation
Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities

play fullscreen
1 / 21
Download Presentation
Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities
299 Views
Download Presentation

Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Internet Content and e-Policy StrategiesMessaging Explosion Brings Risks and Opportunities October 4, 2001 Michelle Drolet

  2. Corporate Strategy • Winning companies need to leverage the Internet to stay ahead. In doing this, they give their employees every possible advantage. • Empower employees with Internet access • Provide them with corporate e-mail accounts • Encourage them to corroborate on company-confidential documents • Give them laptops to work from home • Provide them with home Internet access

  3. Corporate Strategy • Creating a work environment that is… • Efficient • Productive • Effective • Diligent • Task Oriented • Web Savvy • And what else does that create?

  4. Corporate Strategy • A corporation that is: • insecure • hackers exposing your corporate trade secrets • vulnerable • internal or external attacks upon sensitive corporate information • legally at risk • employees sending out offensive e-mail or browsing to inappropriate web sites

  5. Corporate e-Mail Usage

  6. Employee Internet Access

  7. Industry Facts • 55% of workers exchange potentially offensive messages at least once a month (PC Week) • 30-40% of workplace Internet surfing is not business related (IDC) • In a survey of 13,000 e-mail users, 90% said they received spam at least once a week (Gartner Group) • In a survey of 800 workers, 21-31% admitted to sending confidential information to recipients outside the company via e-mail (PC Week)

  8. Real Companies, Real Problems • The New York Times fired more than 20 employees for sending inappropriate and offensive e-mail. • July 28, 2000 the Associated Press reported that Dow Chemical will fire 50 workers and discipline more than 200 more for sending pornography and violent images through company e-mail. • August 22, 2000, Computerworld reported that Dow Chemical will fire as many as 40 employees for new violations of the company's Internet policy. • September 4, 2000, The Seattle Post Intelligencer reported that 3 high school teachers have been suspended without pay for sending explicit pictures over the schools e-mail system.

  9. Internet Usage Issues • Legality • employers are faced with legal issues: defamation, trade secret protection, sexual harassment, criminal accountability • Productivity • 30 to 40% of productivity is lost due to Internet and e-mail access in the workplace • Security • protection of intellectual property • Bandwidth • clogging your T1 line with what?

  10. Issues - Legality • “Since the company is the one that gave employees access, the company is liable - unless the company can show it took reasonable steps to prevent problems.” • Corporate Politics on the Internet: Connection with Controversy, 1996

  11. Issues - Productivity • Internet access allows your employees to: • Read the news: 72% • Make travel arrangements - 45% • Make purchases - 40% • Search for new jobs - 37% • Check their stock portfolio - 34% • Coordinate social events - 28% • Download music, online chat, play games, visit pornographic sites…. • Send your trade secrets to the competition... Source: September 2000 Vault.com Survey

  12. Issues - Security • Single virus costing company millions of dollars in lost information and downtime • Critical intellectual properties stolen by external or internal resources • Internet and external hacking can ruin a company

  13. Issues - Bandwidth • What are your employees doing on your time and dime? • Downloading… • The Dancing Baby • Holiday Greetings • The Frog in a Blender • Running PointCast • Sending Chain Letters

  14. First Steps... • Review Corporate Policies • Update existing policies • Create new policies (Internet and e-Mail usage) • Understand your Corporate Culture • Make sure your particular culture is communicated in your policies • Test your Corporate Environment • where are the vulnerabilities • what are your strengths, weaknesses

  15. Next Steps… • Policy Education • paper-based policy manual • electronic policy management solution • communicates policy and change in policy • reports compliance • conduct training sessions • create policy video • routine company meetings

  16. Final Steps... • Enforcement Technology • e-mail content scanning • URL filtering • intrusion detection and blocking • anti-virus protection

  17. Electronic Policy Management • e-Minder • Manages, schedules and tracks policy education process • Tamper proof database • Management of multiple policies • Secure central administration • Employee acknowledgment screens, browser based • Employee Infraction Report • Employee status and history

  18. Corporate Policy • Communicating Corporate Policy • Reduces Corporate Liability • Increases Productivity

  19. Who is CONQWEST ? • Leaders in Internet security industry coupling best-of-breed technology with top notch support and customization services • Industry leading partners • Significant customer list of over 300 companies • Seasoned security landscape and technology experts • Patent-pending on new policy management technology

  20. Security Landscape • Firewalls and VPN • NetScreen • Anti-Virus • Trend Micro • Sophos • URL Filtering • WebSense • Trend Web Manager • e-Mail Content • Content Technologies - MimeSweeper • Trend Micro - eManager • Policy Management • CONQWEST - e-Minder • Intrusion Detection and Blocking • Network ICE - ICE Pak • Security Audits • Intrusion Services • Network Architectures • Policy Development • Installation Services

  21. Your Internet Security and Policy Management Partner