Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Avoid these employee monitoring blunders

By Monique Zubicki
employee-monitoring-fp1170x658.jpg

Image by katemangostar via Freepik

August 12, 2022

In September 2021, 45% of full-time employees were still working remotely, and the trend is hard to reverse. People like the freedom of working from home. Without a commute, they save time. Without a boss looming in the background, they can multi-task at home. And, without an office full of colleagues, they don’t have to worry about dressing up or having water cooler chit-chat. 


While employees see these changes as positives, businesses see remote workers as a bit of a risk. People are working on their own computers, working off hours, and potentially taking advantage of company time, stealing data, or worse. 


For these reasons, many companies have implemented employee monitoring technology, also known as “bossware.” But HR teams, managers and executives need to approach employee monitoring correctly. Too often, poorly constructed plans, bad communication and unreasonable expectations get in the way of a successful implementation. 


Work With the New Schedule, Not Against It 

For a remote or hybrid workforce, the “9-5” work day is generally a thing of the past. Unless someone has clear hours where they need to be available to answer phones, such as a call center representative, people work much more fluidly today than they did even three years ago. A typical schedule might be “6-7, 10-4, 7-9” where people take breaks to eat, take kids to school and exercise on their own time. 


The good news is that the remote workforce is more productive. That shouldn’t be discounted. Allowing people to set their own schedule, as long as it doesn’t get in the way of overall company productivity, can keep them loyal and hard working. 


Employee monitoring needs to work with this general trend, not against it. For any manager, the best way to truly understand if someone is working odd hours is to monitor their schedule over time — not compare it to a 9-5 standard. If someone always goes offline for three hours in the afternoon, only to return in the evening and complete their workday, that shouldn’t set off alarm bells. However, if they stop returning to their computer in the evening, then it’s time to worry. 


The easiest way to accommodate different schedules is to work with direct managers to understand what their team typically does, and how productive the current schedule is. If everything is going well, then there’s only a need to monitor for future change, not force people to go back to a schedule they liked less. 


Be Specific With Alerts 

A manager might think it’s time to sound the alarm if they receive an alert that someone is on Amazon all day long. However, if they are an Amazon Music subscriber, that alert is essentially meaningless. 


It’s important that alerts are specific in a few ways. First, the keywords themselves need to be specific. One common problem occurs when people are trying to flag employees who are looking for another job on company time. The word “resume” not only comes up when employees are interviewing, it’s used when they are hiring on their own team. It’s also commonly typed without the accent. Whenever someone types “resume,” they could simply be talking about resuming something, or they could mean “resume.” 


It’s better to be very specific. Perhaps there are industry competitors that can be flagged when used in connection with words like “interview,” for example. Also, managers should prioritize only the most important alerts. For a team that works with sensitive data, flags around anything that might indicate data theft, for example, would be the most important element to get right. Then, when an alert does get triggered, managers actually pay attention to it and can act on it. 


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cyber security data protection employee monitoring risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Monique Zubicki is Head of Sales and Business Development at Awareness Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Want to Stop Data Breaches? Keep an Eye Out for These Six Employee Personas

    See More
  • cyber data

    How to use employee personal data monitoring to close security gaps

    See More
  • surveillance-cameras.jpg

    Monitoring a workforce benefits employees and employers

    See More

Related Products

See More Products
  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing