
5 Reasons You Should Monitor Your Employees’ Computers – The Necessity of Remote Desktop & Session Recording
5 Reasons You Should Monitor Your Employees’ Computers – The Necessity of Remote Desktop & Session Recording
We like to think we’re quite savvy when it comes to cybersecurity at work, but it is easy to make common mistakes that can have far reaching consequences. One singular incident can cause stolen data, diminished customer confidence, reputational harm and compliance penalties that can be costly.
While most companies have a way to monitor employees within their workplace, few have tools to monitor them as they’re working from home. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won’t be able to see […]
How to Work from Home Securely 6 Cybersecurity Tips in the Times of Covid-19 When Covid-19 (Coronavirus) began to spread rapidly in China and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now workers all around the world who haven’t had experience working remotely before are getting to grips […]
The pandemic has required that most organizations close their offices and ask their employees to work from home. This has presented challenges for employers and employees alike given the rapid expansion of remote working. This is according to a new report from Leonne International, polling 200 senior decision-makers from large and medium-sized companies. The report […]
SUMMARY TSFactory’s offices will be closed until further notice, but our staff will continue working and providing support as usual from home. Our phone lines will be open during normal business hours. After hours support can still be scheduled for customers holding active software assurance contracts. Sales and technical demos, trainings and webinars can still […]
5 Data Security Risks 1. No data security policies – and poor enforcement A small business needs to reflect upon its own policies to see whether data security is imbibed into their work culture. Without a security policy, most businesses end up vulnerable to attacks and most of them fail to contain breaches […]
The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1) The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both […]
The first computer virus was created in the early 1970s and was detected on ARPANET, the predecessor to the internet. In 1988 the first computer worm was distributed, gaining mass mainstream media attention. A quarter of a century later and viruses have evolved to become a pandemic. Viruses have proliferated quickly and malware has become […]
6 Common VDI (Virtual Desktop Infrastructure) Mistakes Mistake 1: Not Involving Users From the outset of a VDI or RDSH project, end-user involvement is essential to help your project team understand how workers perform their day-to-day jobs. With an RDSH deployment, for example, you’re serving up apps instead of full desktops, so you have […]