March 18th, 2016
We have published new step-by-step instructions on how to setup SoftActivity TS Monitor to record users activity in a Citrix XenApp farm.
TS Monitor can record be used to record published Apps and Desktops.
November 29th, 2015
What you might have assumed already is now official: human beings have worse attention spans than your common goldfish. Hundreds of thousands of years of evolution, turning us into hyper-alert hunters and gatherers at the top of the food chain, has been undone by less than a decade of Twitter live-streams and Facebook viral stories. Goldfish (who apparently don’t use the Internet – who knew?) can pay attention to what’s in front of them for nine seconds, while your average joe on the street now struggles to stay focused for eight.
It’s just one more piece of evidence showing that people are more distracted than ever; and what technology has broken, technology can hopefully help fix. In business, computer monitoring software isn’t just helpful – it’s essential for overworked IT folks who can’t possibly have eyes everywhere at once.
Indeed, we saw just a few weeks back that in one of the most highly regulated, technical industries around, manual monitoring can be disastrous. In this case, it was airline cockpit pilots who chillingly can’t seem to stay focused on all those buttons and dials on their dashboard while their planes are in flight:Read More
November 23rd, 2015
Computer monitoring software can not only prevent data breaches, misappropriation of company or government property or misuse of sensitive information. It can be a key tool in identifying disgruntled or unprofessional employees.
A great example can be found in a political scandal in Canada that shows provincial civil servants were deleting emails, didn’t properly respond to freedom of information requests and then lied about it under oath.
Yes, even in traditionally rules-abiding, by-the-books Canada, government workers can act badly (with or without the direction of their political masters). Tried-and-trusted computer monitoring software is an obvious preventive solution – and it’s long past time for these government agencies to act on it. Using computer monitoring software compatible with any device or operating system, managers can ensure that even the most dishonest civil servants will be kept on their toes.
How does computer monitoring software help them?Read More
November 16th, 2015
In the workplace, digital security doesn’t begin and ends with the IT guy who set up the password and computer monitoring software on your computer. Every employee in an organization, from the top down, is responsible for keeping a company safe from cyber-attacks. Security should be something every employee takes seriously, and undertakes on a regular basis as part of being a responsible member of the team.
How can employees on the front line do that? We took note of a recent interview with Robert Cioffi, CEO of Yonkers-based Progressive Computing, about ways companies can make their system less vulnerable to attack. First, he talked about the threat:
“[C]yber-criminals are relentlessly targeting the end-user or non-tech savvy person, not the IT experts at companies,” says Cioffi. “Therefore, the end users (employees) are under constant attack and must be ever vigilant.”Read More
October 14th, 2015
Photo Credit: Working World
We’ve all heard the old proverb for dealing with school bullying, about sticks and stones. Not really that effective, back then. Less so, today. The image of the school bully beating up kids for their lunch money has been replaced by a more sinister digital monster. Children can now spread rumors and lies about other children through the powerful anonymity of the Internet, facilitated by the rise in young people owning cell phones.
According to the National Education Association in the U.S., an estimated 160,000 children miss school every day due to concerns over bullying. And given that most children are socialized by their peers not to “tattletale”, sometimes the hardest part is telling adults there’s a problem at all. Until it’s too late, that is.
Canada has one of the most infamous examples of cyber bullying. In 2012, Port Coquitlam teen Amanda Todd committed suicide due to constant harassment and even blackmail.Read More
October 5th, 2015
Photo Credit: Kris Krug
One of the biggest concerns of any employer in the digital age is the ease with which employees can become distracted, wasting their time browsing Facebook, which in turn is wasting your time – and your money. But a new studies shows employers may be (a little bit) more lenient when it comes to giving employees a break.
September 29th, 2015
Photo Credit: Perspecsys Photos
The world’s 10 largest economies lost $445 billion USD annually through cyber-crime last year. Concerned about cyber security? You’re not alone.
Fewer than 10 per cent of companies currently purchase cyber-specific insurance policies, suggesting businesses are ill-prepared to face the growing threat to intellectual and data property rights.
A new report from Allianz Global Corporate & Specialty (AGCS) indicates the global cyber insurance market is forecast to grow to more than $20 billion USD by 2025, a compound annual growth rate of over 20 per cent. The bulk of that increase will be felt in North American markets, according to the report.
The risks to businesses from the worldwide web has increased exponentially year to year, with companies reporting it as the fifth largest risk in this year’s “Allianz Risk Barometer”, compared to its 15th place ranking just two years ago.Read More