top of page
![](https://static.wixstatic.com/media/06e07efeadf349d6941b3b59baef908a.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/06e07efeadf349d6941b3b59baef908a.webp)
![Employee Off-boarding: How Disgruntled Staff Can Damage Your Company](https://static.wixstatic.com/media/06e07efeadf349d6941b3b59baef908a.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/06e07efeadf349d6941b3b59baef908a.webp)
Marco Lam
Mar 27, 2023
Employee Off-boarding: How Disgruntled Staff Can Damage Your Company
When a company decides to lay off staff, it can be a challenging and stressful time for everyone involved. While most employees will...
![](https://static.wixstatic.com/media/11062b_ec281b726b0e41229fb01d60ccfc742c~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/11062b_ec281b726b0e41229fb01d60ccfc742c~mv2.webp)
![Employee Off-boarding with a Log Archival System](https://static.wixstatic.com/media/11062b_ec281b726b0e41229fb01d60ccfc742c~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/11062b_ec281b726b0e41229fb01d60ccfc742c~mv2.webp)
Marco Lam
Mar 27, 2023
Employee Off-boarding with a Log Archival System
In this blog post, we will discuss how a log archival system helps management in real-life cases of offboarding staff stealing information f
![](https://static.wixstatic.com/media/11062b_d86893d4fda44b05b9cbf2f9cd655bad~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/11062b_d86893d4fda44b05b9cbf2f9cd655bad~mv2.webp)
![Balancing the Scale: Legal and Emotional Considerations for Installing a Logging System](https://static.wixstatic.com/media/11062b_d86893d4fda44b05b9cbf2f9cd655bad~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/11062b_d86893d4fda44b05b9cbf2f9cd655bad~mv2.webp)
Marco Lam
Mar 22, 2023
Balancing the Scale: Legal and Emotional Considerations for Installing a Logging System
Installing a logging system on an employee's workstation can be an effective way to monitor their activities and ensure compliance with...
![](https://static.wixstatic.com/media/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.webp)
![General Data Protection Law (Lei Geral de Proteção de Dados - LGPD) from Brazil](https://static.wixstatic.com/media/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.webp)
Christy Chung
Feb 12, 2023
General Data Protection Law (Lei Geral de Proteção de Dados - LGPD) from Brazil
The General Data Protection Law (Lei Geral de Proteção de Dados, or LGPD) in Brazil establishes the rules for the protection of personal...
![](https://static.wixstatic.com/media/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.webp)
![Information Technology Rules from India](https://static.wixstatic.com/media/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.webp)
Christy Chung
Feb 12, 2023
Information Technology Rules from India
Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 The...
![](https://static.wixstatic.com/media/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.webp)
![The Privacy Act 1993 from New Zealand](https://static.wixstatic.com/media/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.webp)
Christy Chung
Feb 12, 2023
The Privacy Act 1993 from New Zealand
The Privacy Act 1993 sets out the framework for the protection of personal information in New Zealand The provisions related to security...
![](https://static.wixstatic.com/media/080b1a_36e5236cf5384f24989a114d16c13450~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_36e5236cf5384f24989a114d16c13450~mv2.webp)
![Personal Information Protection Act (PIPA) from South Korea](https://static.wixstatic.com/media/080b1a_36e5236cf5384f24989a114d16c13450~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_36e5236cf5384f24989a114d16c13450~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Information Protection Act (PIPA) from South Korea
The provisions related to security log monitoring in South Korea's Personal Information Protection Act (PIPA) can be found in several...
![](https://static.wixstatic.com/media/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.webp)
![Personal Information Protection Act (PIPA) from Japan](https://static.wixstatic.com/media/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Information Protection Act (PIPA) from Japan
The provisions related to security log monitoring in Japan's Personal Information Protection Act can be found in several sections of the...
![](https://static.wixstatic.com/media/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.webp)
![Personal Data Protection Act (PDPA) from Singapore](https://static.wixstatic.com/media/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Data Protection Act (PDPA) from Singapore
The Personal Data Protection Act (PDPA) in Singapore requires organizations to implement appropriate security measures to protect...
![](https://static.wixstatic.com/media/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.webp)
![Personal Information Protection and Electronic Documents Act (PIPEDA) from Canada](https://static.wixstatic.com/media/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Information Protection and Electronic Documents Act (PIPEDA) from Canada
The PIPEDA is a federal privacy law that sets out standards for the collection, use, and disclosure of personal information by...
![](https://static.wixstatic.com/media/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.webp)
![Privacy Act 1988 from Australia](https://static.wixstatic.com/media/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.webp)
Christy Chung
Feb 12, 2023
Privacy Act 1988 from Australia
Security log monitoring in Australia's Privacy Act 1988 can be found in several sections of the act, including: * Section 11A,...
![](https://static.wixstatic.com/media/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.webp)
![General Data Protection Regulations from the European Union (EU)](https://static.wixstatic.com/media/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.webp)
Christy Chung
Feb 12, 2023
General Data Protection Regulations from the European Union (EU)
The General Data Protection Regulation (GDPR) is a regulation on personal information published by the European Union (EU) in 2016. The...
![](https://static.wixstatic.com/media/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.webp)
![Federal Information Security Modernization Act of 2014 (FISMA) from the US](https://static.wixstatic.com/media/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.webp)
Christy Chung
Feb 12, 2023
Federal Information Security Modernization Act of 2014 (FISMA) from the US
United States: Federal Information Security Modernization Act of 2014 (FISMA) The provisions related to security log monitoring in the...
![](https://static.wixstatic.com/media/7c5c62_cc55fcb082cf4ea38283d3c1ac2e1010~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_cc55fcb082cf4ea38283d3c1ac2e1010~mv2.webp)
![Is StormEye.io meet your business needs with regulated data?](https://static.wixstatic.com/media/7c5c62_cc55fcb082cf4ea38283d3c1ac2e1010~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_cc55fcb082cf4ea38283d3c1ac2e1010~mv2.webp)
-
Oct 26, 2022
Is StormEye.io meet your business needs with regulated data?
Introduction If you’re looking for a way to protect the data on your network from cyber attacks, StormEye.io is a great solution. We...
![](https://static.wixstatic.com/media/7c5c62_ad3626f104dd49c9ae0145c8fc96905c~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_ad3626f104dd49c9ae0145c8fc96905c~mv2.webp)
![Why Small businesses should pay attention to cybersecurity](https://static.wixstatic.com/media/7c5c62_ad3626f104dd49c9ae0145c8fc96905c~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_ad3626f104dd49c9ae0145c8fc96905c~mv2.webp)
-
Oct 26, 2022
Why Small businesses should pay attention to cybersecurity
Introduction Cyberattacks are a growing problem for businesses of all sizes. Cybersecurity threats can have a direct impact on the bottom...
![](https://static.wixstatic.com/media/7c5c62_04ceafd5e3bb4e3a8129a832dea25aba~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_04ceafd5e3bb4e3a8129a832dea25aba~mv2.webp)
![Start your network log archival now](https://static.wixstatic.com/media/7c5c62_04ceafd5e3bb4e3a8129a832dea25aba~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_04ceafd5e3bb4e3a8129a832dea25aba~mv2.webp)
-
Oct 23, 2022
Start your network log archival now
Archiving your network logs is a smart way to keep your data safe, but it's also an important part of running a secure business. If you...
![](https://static.wixstatic.com/media/7c5c62_c555d66d1cd94ff8b4fcfb373eb1c689~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_c555d66d1cd94ff8b4fcfb373eb1c689~mv2.webp)
![What is network log ?](https://static.wixstatic.com/media/7c5c62_c555d66d1cd94ff8b4fcfb373eb1c689~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_c555d66d1cd94ff8b4fcfb373eb1c689~mv2.webp)
-
Oct 22, 2022
What is network log ?
If you're not a tech-savvy person, the term "network log" might sound like something out of a science fiction movie. But in reality, it's...
![](https://static.wixstatic.com/media/7c5c62_1564eabbabe54fce8cba218addce38b2~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_1564eabbabe54fce8cba218addce38b2~mv2.webp)
![What happen if I am not storing network log?](https://static.wixstatic.com/media/7c5c62_1564eabbabe54fce8cba218addce38b2~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_1564eabbabe54fce8cba218addce38b2~mv2.webp)
-
Oct 22, 2022
What happen if I am not storing network log?
If you're not properly archiving your network logs, you could be opening yourself up to some serious cybersecurity risks. Here's a look...
![](https://static.wixstatic.com/media/7c5c62_25a36f09c7334761b555791f7dc887c1~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_25a36f09c7334761b555791f7dc887c1~mv2.webp)
![Why company in all size should start network log archival?](https://static.wixstatic.com/media/7c5c62_25a36f09c7334761b555791f7dc887c1~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_25a36f09c7334761b555791f7dc887c1~mv2.webp)
-
Oct 22, 2022
Why company in all size should start network log archival?
A network log archival system is an important part of any business's cybersecurity strategy. It helps to ensure that your company's data...
![](https://static.wixstatic.com/media/nsplsh_4b4142666a75534f783734~mv2_d_4602_3072_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/nsplsh_4b4142666a75534f783734~mv2_d_4602_3072_s_4_2.webp)
![What happen if I am not storing network logs](https://static.wixstatic.com/media/nsplsh_4b4142666a75534f783734~mv2_d_4602_3072_s_4_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/nsplsh_4b4142666a75534f783734~mv2_d_4602_3072_s_4_2.webp)
-
Oct 21, 2022
What happen if I am not storing network logs
If you’re not properly archiving your network logs, you could be opening yourself up to some serious cybersecurity risks. Here’s a look...
bottom of page