Historically, many organizations and personnel have been concerned about user activity monitoring (UAM). Certain business cultures feel that these activities are an invasion of privacy or are distrustful. However, in today’s Internet connected, data driven world, having specific information or data means the difference in being a market leader and being out of business.
Leveraging User Activity Monitoring to Protect Information and Employees from Cyber Threats
By David Monahan on Mar 4, 2015 2:46:04 PM
Topics:
Edward Snowden
IT Management
access controls
David Monahan
National Security Agency
Scott Crawford
security
Security
spear phishing
User Activity Monitoring
Continue Reading