July 13, 2021

NEW: Screenshot Monitoring, Request URL Unblocking, & More! (v6.0.1)

[…]
June 23, 2021
AccessPatrol USB Device Control software from CurrentWare

AccessPatrol USB Device Control Software Overview (Video)

[…]
May 27, 2021
remote desktop monitoring software - monitor RDP, Citrix, and more with CurrentWare

How To Audit User Activity With Remote Desktop Monitoring Software

[…]
April 1, 2021
New version: CurrentWare 6.0

NEW: Web Console & Let Employees See Their Data On-Demand (v6.0)

[…]
March 25, 2021
Monitoring employees? Here's what you need to know

What You Must Know Before Using Employee Computer Activity Trackers

[…]
March 17, 2021
CurrentWare for NIST SP 800-171

CurrentWare & NIST SP 800-171 Compliance (Web Console FAQ)

[…]
March 3, 2021
Hard Tokens vs USB Blockers - How to Use YubiKeys when USB ports are blocked

What is a YubiKey? (& How to Use Them When USB Ports Are Blocked)

[…]
January 12, 2021
A 32 gigabyte USB flash drive sitting on top of a computer keyboard

How to Disable USB Ports & Block USB Mass Storage Devices

[…]
October 7, 2020
CurrentWare. New Release - Version 5.5.2.October 2020.

Track User Logon History, Web Usage by IP, & More! (v.5.5.2 Update)

[…]
September 24, 2020
Data security tips for offboarding employees - CurrentWare

5 Data Security Tips For Offboarding Employees

[…]
August 10, 2020
AccessPatrol - How to block USB devices

How to Block USB Devices – USB Access Control (Video)

[…]
July 8, 2020
A hand motions to press a cell phone. A glowing lock icon floats above them

What is Endpoint Security? What is an Endpoint?

[…]
June 30, 2020
A hand counts several $100 US bills

Cybersecurity for Small Businesses with a Limited Budget

[…]
May 28, 2020
two people checking their computer activity together

How Do I Check Recent Activity On My Computer?

[…]
April 20, 2020
Image: CurrentWare company logo. Title: How to Develop an Endpoint Monitoring and Management Policy. Next to the title is a series of illustrations featuring a computer, USB flash drives, emails, a cell phone, and other decorative elements

How to Develop An Endpoint Monitoring & Management Policy

[…]