{"id":179748,"date":"2021-08-30T02:47:00","date_gmt":"2021-08-30T07:47:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/"},"modified":"2021-08-30T02:47:00","modified_gmt":"2021-08-30T07:47:00","slug":"employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/employee-surveillance-amazon-exploring-the-feasibility-of-keystroke-tracking-plan\/","title":{"rendered":"Employee Surveillance: Amazon Exploring the Feasibility of Keystroke Tracking Plan"},"content":{"rendered":"
An internal document obtained by Motherboard revealed Amazon\u2019s plan<\/a> to track employee\u2019s keystroke entries. The tech and e-commerce giant plans to curb ever-increasing data leaks using this type of surveillance. Imposters, rogue employees, and hackers routinely compromise customers\u2019 confidential information.<\/p>\n Amazon is considering deploying advanced keystroke tracking tools. A company known as BehavioSec is working with the e-commerce firm to license specialized tools capable of enhancing system surveillance. The vendor\u2019s software relies on behavioral biometrics to determine the nature of user activity. Behavioral biometrics eliminates the need to depend on static data or personally identifiable information.<\/p>\n Profiles generated by BehavioSec\u2019s software make it easier to detect suspicious activity. Amazon shortlisted BehavioSec\u2019s product based on privacy considerations. Other tools considered by the firm presented privacy challenges linked to keystroke data collection.<\/p>\n According to the internal document, Amazon detected several breaches that compromised customers\u2019 sensitive data. In one of the incidents, an imposter illegally accessed customer data by posing as a service agent. For this reason, the company is looking to deploy an effective IT security solution to verify users\u2019 identities and monitor device usage.<\/p>\n The security gaps present a serious threat that could damage customers\u2019 confidence and Amazon\u2019s reputation. Data exfiltration is a major concern for the management team since many employees work from home. Amazon plans to thwart threats that arise under various conditions, including unauthorized access via a device that an employee forgot to lock.<\/p>\n It aims to eliminate imposter takeover by 2022 since employee and customer data security is a top priority. The company stated that it regularly explores and tests wide-ranging cybersecurity technologies to bolster data protection measures. However, it is mindful of the need to achieve a delicate balance between\u00a0monitoring employee activity<\/a>\u00a0and remaining compliant with privacy laws.<\/p>\n The internal document also revealed that outsourced workers in the Philippines and India present a higher risk of data exfiltration. Most of the recorded incidents happen in these countries. Hence, Amazon is hoping that BehavioSec\u2019s solution will address the problem.<\/p>\n In general, companies rely on the employee-manager team to enhance security controls. However, the remote work trend introduced a new dynamic that compromised companies\u2019 basic security controls. When employees work from home, it becomes difficult to detect all unauthorized access to sensitive data.<\/p>\n Under such circumstances, companies need to find viable solutions to compensate for the reduced controls. Experts believe that keystroke monitoring is a security feature that remote workers should expect to find on company devices in the future. BehavioSec\u2019s profiling mechanism plays an essential role in helping companies detect sophisticated cyber attacks.<\/p>\n Highly skilled hackers often gain access to corporate systems and remain undetected for lengthy periods. Behavioral profiling detects such intrusions by monitoring anomalous patterns and user behaviors. This approach detects patterns in one or more connected devices. For instance, security software will raise a red flag if a video surveillance camera connects to a suspicious domain.<\/p>\n In Amazon\u2019s case, behavioral profiling makes it easier to identify compromised devices. Many of the company\u2019s customer service agents work remotely in shared residences. Meanwhile, some agents store their devices on properties with poor physical security.<\/p>\n Federal law allows businesses to monitor their employees\u2019 activities under specific circumstances. Several states also provide regulatory guidelines on the subject. However, transparency is a key component of employee monitoring practices. Failing to inform employees about workplace or digital surveillance may result in legal action.<\/p>\n<\/p>\n
Closing Security Gaps<\/h3>\n
Managing Employee Activity<\/h3>\n
Employee Surveillance Key Considerations<\/h3>\n