March 25, 2021
Monitoring employees? Here's what you need to know

What You Must Know Before Using Employee Computer Activity Trackers

[…]
March 17, 2021
CurrentWare for NIST SP 800-171

CurrentWare & NIST SP 800-171 Compliance (Web Console FAQ)

[…]
March 3, 2021
Hard Tokens vs USB Blockers - How to Use YubiKeys when USB ports are blocked

What is a YubiKey? (& How to Use Them When USB Ports Are Blocked)

[…]
January 12, 2021
A 32 gigabyte USB flash drive sitting on top of a computer keyboard

How to Disable USB Ports & Block USB Mass Storage Devices

[…]
October 7, 2020
CurrentWare. New Release - Version 5.5.2.October 2020.

Track User Logon History, Web Usage by IP, & More! (v.5.5.2 Update)

[…]
September 24, 2020
Data security tips for offboarding employees - CurrentWare

5 Data Security Tips For Offboarding Employees

[…]
August 10, 2020
AccessPatrol - How to block USB devices

How to Block USB Devices – USB Access Control (Video)

[…]
July 8, 2020
A hand motions to press a cell phone. A glowing lock icon floats above them

What is Endpoint Security? What is an Endpoint?

[…]
June 30, 2020
A hand counts several $100 US bills

Cybersecurity for Small Businesses with a Limited Budget

[…]
May 28, 2020
two people checking their computer activity together

How Do I Check Recent Activity On My Computer?

[…]
April 20, 2020
Image: CurrentWare company logo. Title: How to Develop an Endpoint Monitoring and Management Policy. Next to the title is a series of illustrations featuring a computer, USB flash drives, emails, a cell phone, and other decorative elements

How to Develop An Endpoint Monitoring & Management Policy

[…]
April 13, 2020
A man sits at his desk working on a computer. The shadowy figure of a colleague looms behind him.

Casting Light on Shadow IT

[…]
March 23, 2020
A hand presses an icon of a cloud. The cloud disperses into other icons: A computer, a cell phone, a tablet, a laptop, and an MP3 player

35+ Apps to Help Your Employees Work from Home Successfully

[…]
March 19, 2020
Man sitting on his couch. He is using a laptop and is clearly thinking deeply.

5 Cybersecurity Considerations When Your Employees Work From Home

[…]
February 25, 2020
Rogue USB Devices Harm Endpoint Security

Don’t Plug In That USB! – How Rogue USB Devices Harm Endpoint Security

[…]