Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Avoid these employee monitoring blunders

By Monique Zubicki
employee-monitoring-fp1170x658.jpg

Image by katemangostar via Freepik

August 12, 2022

In September 2021, 45% of full-time employees were still working remotely, and the trend is hard to reverse. People like the freedom of working from home. Without a commute, they save time. Without a boss looming in the background, they can multi-task at home. And, without an office full of colleagues, they don’t have to worry about dressing up or having water cooler chit-chat. 


While employees see these changes as positives, businesses see remote workers as a bit of a risk. People are working on their own computers, working off hours, and potentially taking advantage of company time, stealing data, or worse. 


For these reasons, many companies have implemented employee monitoring technology, also known as “bossware.” But HR teams, managers and executives need to approach employee monitoring correctly. Too often, poorly constructed plans, bad communication and unreasonable expectations get in the way of a successful implementation. 


Work With the New Schedule, Not Against It 

For a remote or hybrid workforce, the “9-5” work day is generally a thing of the past. Unless someone has clear hours where they need to be available to answer phones, such as a call center representative, people work much more fluidly today than they did even three years ago. A typical schedule might be “6-7, 10-4, 7-9” where people take breaks to eat, take kids to school and exercise on their own time. 


The good news is that the remote workforce is more productive. That shouldn’t be discounted. Allowing people to set their own schedule, as long as it doesn’t get in the way of overall company productivity, can keep them loyal and hard working. 


Employee monitoring needs to work with this general trend, not against it. For any manager, the best way to truly understand if someone is working odd hours is to monitor their schedule over time — not compare it to a 9-5 standard. If someone always goes offline for three hours in the afternoon, only to return in the evening and complete their workday, that shouldn’t set off alarm bells. However, if they stop returning to their computer in the evening, then it’s time to worry. 


The easiest way to accommodate different schedules is to work with direct managers to understand what their team typically does, and how productive the current schedule is. If everything is going well, then there’s only a need to monitor for future change, not force people to go back to a schedule they liked less. 


Be Specific With Alerts 

A manager might think it’s time to sound the alarm if they receive an alert that someone is on Amazon all day long. However, if they are an Amazon Music subscriber, that alert is essentially meaningless. 


It’s important that alerts are specific in a few ways. First, the keywords themselves need to be specific. One common problem occurs when people are trying to flag employees who are looking for another job on company time. The word “resume” not only comes up when employees are interviewing, it’s used when they are hiring on their own team. It’s also commonly typed without the accent. Whenever someone types “resume,” they could simply be talking about resuming something, or they could mean “resume.” 


It’s better to be very specific. Perhaps there are industry competitors that can be flagged when used in connection with words like “interview,” for example. Also, managers should prioritize only the most important alerts. For a team that works with sensitive data, flags around anything that might indicate data theft, for example, would be the most important element to get right. Then, when an alert does get triggered, managers actually pay attention to it and can act on it. 


This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: cyber security data protection employee monitoring risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Monique Zubicki is Head of Sales and Business Development at Awareness Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Want to Stop Data Breaches? Keep an Eye Out for These Six Employee Personas

    See More
  • cyber data

    How to use employee personal data monitoring to close security gaps

    See More
  • surveillance-cameras.jpg

    Monitoring a workforce benefits employees and employers

    See More

Related Products

See More Products
  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing