I had a former employee that I have discovered, through his admission, that he deployed stealth remote monitoring on some other employee'd home computers and delivered the application via email to the remote computer. I would have thought anti-virus or anti-spyware programs would have prevented this. Now I am concerned that the extet of the malicious activity is greater than he admits. How can I check for the existence of stealth monitoring or key-logging and how can I prevent it in the future?
I do not know what program was used. However, I did a quick search on Google and found a lot of products claiming to be able to do this type of activity.
Any suggestions would be greatly appreciated.