Eye Of The Tiger…NOT!

Cloud Architect, Enthusiast, Evangelist

Created with Sketch.

Eye Of The Tiger…NOT!

It’s the eye of the tiger
It’s the thrill of the fight
Rising up to the challenge of our rival
And the last known survivor
Stalks his prey in the night
And he’s watching us all
With the eye of the tiger

Survivor

How I love that song. It can give you the energy to destroy a WOD and get that PR. But for this blog we are not talking about working out. Today this song is not about you, well it is, but you are not the one with the “eye of the tiger”. You are the prey… well, technically, you are not the prey, because you shouldn’t be doing what you are doing. Let’s get to it.

TL;DR: Don’t use company resources for personal affairs. You are not the victim.

This post is about being sneaky at work and doing personal things when one should be working. You know the person, the one that receives all their social media and texting on their work computer. Thinks no one is looking because their phone is in a drawer, purse or pocket. Does the quick Alt+Tab when someone approaches. Up to this point it would seem that you have “the eye of the tiger” preying on company funds. Not too fast kitty.

They’re Watching You

Private eyes
They’re watching you
They see your every move

Daryl Hall & John Oates

Recently, I worked with a security “expert” who, in the most belittling way, gave me instructions on how to use Whatsapp on my computer. Some security “expert”. You’ll see why in a minute.

Most enterprises use some form of end user monitoring. Usually this is a secondary effect of protecting business assets with firewalls and intrusion prevention systems (IPS). These monitor both internal and external traffic which can include your browsing, texting and social media usage. Large enterprises purposely monitor all user traffic in order to attain industry compliance: ISO, HIPAA, PCI, SOX and others. They are also protecting against Data Loss (DLP)

Company email is the number one business asset that you should not use for personal things. Do not tie it to any online shopping, medical or personal accounts. Technical support probably has access and can read all email. In addition, email may be read long after you have left the company.

Internet use is heavily tracked and censored. You probably already received an alert that the site you tried to access is a no-no. Even if a site is secure (https) your security department might have installed security measures to “unlock” these sites.

Social Media can be monitored too. Although you haven’t friended/followed your boss or colleagues it could be that your office has placed recording software on your computer. Like anything recorded it can be viewed later on. Internal company messaging systems can be tracked. So make sure to speak highly of leadership while others send you a message that says, “don’t you just hate this place?!?”

Company Laptop can be monitored even while you are at home or offline. For example, a credit card provider has to know if you have taken credit card numbers and emailed them to your relative in another country. It’s called Data Loss Protection (DLP)

Be Safe Not Sorry

My recommendation is do not use company assets for personal matters. That should be common sense but it isn’t very common. Even if you want to check something out on your phone make sure that you are not connected to the WiFi at work (yes, that gets tracked too). This is not meant to teach you how to get around being monitored at work. It’s meant to teach you that you should be working while at work. You don’t have “the eye of the tiger” and you are also not the “prey”. Your employer is doing what they are entitled to by law to protect their business. Yes, they “are watching us all, with the eye of the tiger”. Yes, “they see your every move”.

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: