A critical factor in selecting monitoring software is to ensure it is not tied to any one vendor. Effective security requires an independent program able to monitor data flowing from and to any application, irrespective of format, vendor or version. |
It is possible to track a user's actions on a corporate network, but it is not possible to be 100% sure that the person logged in is the user who was assigned the identity. |
Most companies think their data is secure because employees are assigned limited access rights, but we all know how easy it is to obtain someone else's password. In addition, the level of personnel involved in theft means they automatically have access to critical data and, on a bad day, or if they are forced to leave, making the data available for a sum of money is a simple and profitable option and easy to accomplish. |
Some users will provide their password to a stranger who says he is from their company's IT department. |