June 30, 2020
A hand counts several $100 US bills

Cybersecurity for Small Businesses with a Limited Budget

Cybersecurity for small businesses doesn’t have to be expensive, but it is critical. According to […]
May 28, 2020
two people checking their computer activity together

How Do I Check Recent Activity On My Computer?

This article will be answering this common question: “how do I check recent activity on […]
April 20, 2020
Image: CurrentWare company logo. Title: How to Develop an Endpoint Monitoring and Management Policy. Next to the title is a series of illustrations featuring a computer, USB flash drives, emails, a cell phone, and other decorative elements

How to Develop An Endpoint Monitoring & Management Policy

FAQ: Endpoint Security and Data Loss Prevention Before we begin, we will clarify the key […]
April 13, 2020
A man sits at his desk working on a computer. The shadowy figure of a colleague looms behind him.

Casting Light on Shadow IT

“Shadow IT” – also known as Stealth IT, Client IT, or Fake IT – is […]
March 23, 2020
A hand presses an icon of a cloud. The cloud disperses into other icons: A computer, a cell phone, a tablet, a laptop, and an MP3 player

35+ Apps to Help Your Employees Work from Home Successfully

If you’re new to managing employees that are working from home, you may not be […]
March 19, 2020
Man sitting on his couch. He is using a laptop and is clearly thinking deeply.

5 Cybersecurity Considerations When Your Employees Work From Home

The widespread pandemic of COVID-19 caused by the virus SARS-CoV-2 (a novel coronavirus) has forced […]
February 25, 2020
Rogue USB Devices Harm Endpoint Security

Don’t Plug In That USB! – How Rogue USB Devices Harm Endpoint Security

Universal Serial Buses (USBs) are incredibly common connectors used in electronic devices such as flash […]
December 20, 2019
Children's Internet Protection Act (CIPA)

Internet Filtering & Monitoring For CIPA Compliance

What is the Children’s Internet Protection Act (CIPA) The Children’s Internet Protection Act (CIPA) is […]
December 12, 2019
HIPAA Compliant Logo

HIPAA Compliance: What is it & How do I become Compliant?

HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that was enacted in […]
December 9, 2019
Cell Phones Risking Cybersecurity

Are Cell Phones Risking Your Cybersecurity?

It’s Friday afternoon and in just a few short hours your employees will be making […]
November 5, 2019

How to Block USB drives with Group Policy

It is best practice for an organization to control USB/Endpoint devices being used within the […]
October 16, 2019

Your Employees are Your Weakest Link

The risks of operating a business of any size can be immeasurable; whether it be […]
October 3, 2019

What is Data Loss Prevention (DLP)?

Data Loss Prevention or DLP is the practice and usage of tools, technologies, and processes […]
June 21, 2019

What is endpoint detection and response?

Businesses are using the Internet to collect customer data and collaborate on company projects. Cybercriminals […]
June 20, 2019

v5.4.1 Released! Redesigned Reports & New AccessPatrol Features

Version 5.4.1 of CurrentWare has been officially released and we are excited for our customers […]