Use content-filtering software to block P2P websites. Configure routers and firewalls to close the ports used by file-sharing software. P2P services may appear, disappear and change IP addresses, so this requires vigilance.Monitor network traffic for certain types of files such as .mpegs. This could also raise a flag if an outsider were using your network to traffic illegal files. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Set up access privileges so that employees can’t download software. Install software or change permissions as needed. Limit the amount of disk space employees have. Dole out extra space only when you know it’s for a legitimate purpose.Consider installing auditing software, such as Lighthouse from Cohesiant, that tracks what kinds of software are installed on employees’ computers. Related content feature Gen AI success starts with an effective pilot strategy To harness the promise of generative AI, IT leaders must develop processes for identifying use cases, educate employees, and get the tech (safely) into their hands. By Bob Violino Sep 27, 2023 10 mins Generative AI Generative AI Generative AI feature A fluency in business and tech yields success at NATO Manfred Boudreaux-Dehmer speaks with Lee Rennick, host of CIO Leadership Live, Canada, about innovation in technology, leadership across a vast cultural landscape, and what it means to hold the inaugural CIO role at NATO. By CIO staff Sep 27, 2023 6 mins CIO IT Skills Innovation feature The demand for new skills: How can CIOs optimize their team? By Andrea Benito Sep 27, 2023 3 mins opinion The CIO event of the year: What to expect at CIO100 ASEAN Awards By Shirin Robert Sep 26, 2023 3 mins IDG Events IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe