Blogs

TSFactory

  • Home
  • VDI Wiki
  • Blogs
    • Everything RDP
    • InfoSec Digest
    • Tom’s RDS Blog
  • Learn More
    • Media
    • News
  • Product Resources
    • Brochures
    • White Papers
    • Manuals
    • FAQs
    • Support
    • Reviews
    • Bulletins
  • Solutions
    • User Activity Monitoring
    • Employee Monitoring
    • Contractor Activity
    • Auditing
    • Compliance
    • Cybersecurity
    • Insider Threat Detection
    • RDP Recorder
  • Industries
    • Contact Centers
    • Government
    • Financial Services
    • Technical Services
    • Education
    • Healthcare

Author: Chelsie Wyatt

The 5 Basic Cybersecurity Mistakes You Make Everyday

May 14, 2020September 10, 2021 Chelsie Wyatt InfoSec Digest

We like to think we’re quite savvy when it comes to cybersecurity at work, but it is easy to make common mistakes that can have far reaching consequences. One singular incident can cause stolen data, diminished customer confidence, reputational harm and compliance penalties that can be costly.

Continue reading


Why You Need RecordTS Session Recording For Remote Workers Now

April 14, 2020September 10, 2021 Chelsie Wyatt InfoSec Digest

While most companies have a way to monitor employees within their workplace, few have tools to monitor them as they’re working from home. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won’t be able to see […]

Continue reading


Cybersecurity Tips in the Time of Covid-19

April 9, 2020September 10, 2021 Chelsie Wyatt InfoSec Digest

How to Work from Home Securely 6 Cybersecurity Tips in the Times of Covid-19 When Covid-19 (Coronavirus) began to spread rapidly in China and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now workers all around the world who haven’t had experience working remotely before are getting to grips […]

Continue reading


The Challenges of Long Term Remote Working

April 1, 2020September 10, 2021 Chelsie Wyatt InfoSec Digest

The pandemic has required that most organizations close their offices and ask their employees to work from home. This has presented challenges for employers and employees alike given the rapid expansion of remote working. This is according to a new report from Leonne International, polling 200 senior decision-makers from large and medium-sized companies. The report […]

Continue reading


5 Data Security Risks

January 6, 2020September 10, 2021 Chelsie Wyatt InfoSec Digest

5 Data Security Risks     1. No data security policies – and poor enforcement A small business needs to reflect upon its own policies to see whether data security is imbibed into their work culture. Without a security policy, most businesses end up vulnerable to attacks and most of them fail to contain breaches […]

Continue reading


Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data

November 8, 2019September 10, 2021 Chelsie Wyatt InfoSec Digest

The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1) The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both […]

Continue reading


5 Cybersecurity Threats From History

October 18, 2019September 10, 2021 Chelsie Wyatt InfoSec Digest

The first computer virus was created in the early 1970s and was detected on ARPANET, the predecessor to the internet. In 1988 the first computer worm was distributed, gaining mass mainstream media attention. A quarter of a century later and viruses have evolved to become a pandemic. Viruses have proliferated quickly and malware has become […]

Continue reading


6 Common VDI Mistakes

September 2, 2019January 28, 2021 Chelsie Wyatt InfoSec Digest

6 Common VDI (Virtual Desktop Infrastructure) Mistakes   Mistake 1: Not Involving Users From the outset of a VDI or RDSH project, end-user involvement is essential to help your project team understand how workers perform their day-to-day jobs. With an RDSH deployment, for example, you’re serving up apps instead of full desktops, so you have […]

Continue reading


Virtualization Desktop Infrastructures: The History, Benefits and Drawbacks

July 1, 2019January 28, 2021 Chelsie Wyatt InfoSec Digest

Virtualization Desktop Infrastructures

Continue reading


The 5 Best Network Security Tools

June 8, 2019September 23, 2021 Chelsie Wyatt InfoSec Digest

The 5 Best Network Security  Tools Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends so users get the most robust protection […]

Continue reading


Posts navigation

Older posts
Newer posts
  • Bluesky
  • Facebook
  • LinkedIn

Newsletter

dazzling Theme by Colorlib Powered by WordPress