We are glad to announce the release of new version 12.6 of its leading user monitoring applications SoftActivity Monitor and TS Monitor. SoftActivity is used by thousands of organizations for employee productivity tracking and protection against insider threats.
This upgrade will make it easier to monitor users in almost real time mode in web console, without installing the desktop Monitor app for the managers. This can also be done in TS Monitor now.
This upgrade is recommended to our all customers.
What’s new in version 12.6:
new Users Dashboard view in web console:
see all monitored users next to each other with the remote screen image, latest website and app.
it is similar to Dashboard view in Monitor desktop app, but this does not require installing the app.
screens update close to real time, with around 1 min delay, depending on how often you set to take screenshots.
does not require refreshing the web page manually.
filter users by a group, last active time, name, and signed-in status.
TS Monitor 12.6 has now switched version numbering to the same as Monitor, to better indicate inter-compatible versions. TS Monitor version prior to 12.6 was 6.5.
download multiple selected screenshots. Can be used to keep a copy of images as evidence, or for reporting purposes.
improved quality and increased size of thumbnail images for screenshots.
fix: PDF export of Attendance report filtered by a group did not work.
fix: alerts counter will update in real time and a popup notifications should appear in browser for alerts.
fix: errors on Top programs (now Applications) & Top websites (now Websites) views.
numerous UI improvements in web console.
new command line option to force run cleanup of logs and screenshot files older than a set retention interval: sawebsrv.exe --cleanuplogs
Keylogger (keystrokes recording option) is now OFF by default for new installations to help protect users’ privacy. It can be enabled by the admin in Monitor app if your organization requires this.
Chat recording feature has been removed from the product since it only supported Skype, which is not widely used on business desktop computers anymore. Chat history in any messengers can be viewed on screenshots in web console – Applications view. Chat view still remains in web console to view old messages, and will be removed in the next version.
With the rise of work-from-home and the online workplace, most company IT departments and security teams are aware of common security threats, such as malware, spyware, a malicious computer virus, or a phishing attack. These continue to be extremely popular security threats for organizational networks; however, there are more advanced attacks that could put your company at risk. Understanding how these advanced attacks are targeting your company and computer network will help you to put up the necessary safeguards and protect your data.
Standard security practices like having a spam filter, antivirus program, and firewall will still need to be used to protect organizational networks; however, as we know, it is not enough.
Cybersecurity threats are constantly evolving. A comprehensive security stance, which protects against malware, data breaches, and service disruptions, is required at all vulnerable endpoints and every level of an organization.
Here are five common security threats and how to protect against them.
A business that provides financial services or handles sensitive financial data needs to implement security measures to abide by the multiple financial compliance regulations. Not only that, but cyber attackers predominantly target financial institutions.
According to the IBM X-Force Threat Intelligence Index for 2020, businesses in the insurance and finance sector experienced more cyberattacks in 2020 generally. Hackers are undoubtedly looking to access financial hubs directly, and financial institutions need to protect their client’s financial data.
Unfortunately, cyber attacks can weaken public confidence around that institution, be a significant liability, and cost millions of dollars (even for midmarket companies). Therefore, it’s important to establish security best practices.
The methods of security you use will depend on the type of data you collect, how it is being collected, and the number of data you collect. If you are new to this industry and need to start upping your security, then be sure to establish these six best practices as soon as possible.
With the growing rise of data breaches and insider threats, businesses need to employ as much security as they can afford. Security software, like employee monitoring software, firewall, and security information and event management (SIEM) systems all provide a level of security to business data. However, the level of security needed and the amount of privacy and compliance laws that need to be followed will determine which software products are needed.
Most likely, a business will need to consider data loss prevention software or DLP as a security solution. DLP technology is a set of security tools that monitors computers, servers, networks, and workstations to watch if sensitive information is moved, deleted, copied, or modified. Having this type of software working on behalf of your company is crucial as it allows businesses to mitigate data risk and to catch anomalies before they become attacks.
Read on to learn about DLP software and why you might use it for your data security:
Keeping sensitive data is often a legal requirement for any sized business. Of course, the type of necessary security protections will depend on the type of data being protected, which may require that businesses maintain PCI compliance, SOX compliance, or compliance regulations under GDPR and CCPA.
There is also a range of solutions that a business could employ to protect sensitive data and which also abide by stringent data security controls. And given the rise of data breaches and insider attacks, businesses and organizations need to consider employing multiple security solutions.
With the rise of remote workplaces, given the COVID-19 pandemic and the evolution of remote work technology, more businesses can implement remote work to keep business operations flowing smoothly. Of course, with remote work comes a plethora of security risks and new vulnerabilities. Therefore, it is up to the organization to ensure that the operations in place will not only keep the business protected but also follow legal jurisdictions around employee surveillance.
Whether the solution is temporary or you are looking for something more permanent, your organization needs to ensure that your business is monitoring your remote employees. You also need to make sure that everything you are doing is legal. A system administrator can assist you in this.
Read on to learn how your system administrator job role can be extended to ensure legal remote monitoring practices.
Any size business, organization, or governmental agency collects customer information. Whether you accept orders or provide a service, your business is involved in the transaction of sensitive customer data.
There are rules and regulations around how customer data should be handled. For example, businesses that sell to California residents must abide by the CCPA or the California Consumer Privacy Act. While this is essentially good for your customer’s personal data, it often creates a lot more work for businesses that aren’t prepared for data security. If you’re a small business, then you might struggle to inform your customers of their privacy rights, which may be required by regulation, and to store data correctly.