July 8, 2020
Image: Should TikTok be Banned?

India and the US Military has banned TikTok – Should You?

Should you ban your employees from using TikTok in the workplace? Data security and privacy […]
June 30, 2020
A hand counts several $100 US bills

Cybersecurity for Small Businesses with a Limited Budget

Cybersecurity for small businesses doesn’t have to be expensive, but it is critical. According to […]
April 20, 2020
Image: CurrentWare company logo. Title: How to Develop an Endpoint Monitoring and Management Policy. Next to the title is a series of illustrations featuring a computer, USB flash drives, emails, a cell phone, and other decorative elements

How to Develop An Endpoint Monitoring & Management Policy

FAQ: Endpoint Security and Data Loss Prevention Before we begin, we will clarify the key […]
April 13, 2020
A man sits at his desk working on a computer. The shadowy figure of a colleague looms behind him.

Casting Light on Shadow IT

“Shadow IT” – also known as Stealth IT, Client IT, or Fake IT – is […]
February 25, 2020
Rogue USB Devices Harm Endpoint Security

Don’t Plug In That USB! – How Rogue USB Devices Harm Endpoint Security

Universal Serial Buses (USBs) are incredibly common connectors used in electronic devices such as flash […]
February 18, 2020
Ransomware Attacks in 2019

An Overview of Ransomware Attacks in 2019

Ransomware has cost companies an average of $84,116 per ransom in the last quarter of […]
January 20, 2020
Cybersecurity Risks of Remote Workers

5 Cybersecurity Risks of Remote Workers & How To Mitigate Them

The trend of employees working from home is continuing to rise, with an IWG study […]
January 14, 2020
LifeLabs Data Breach

15 Million Health Records Leaked – Is LifeLabs Doing Enough?

In October 2019, LifeLabs – Canada’s largest diagnostic test provider – disclosed that they fell […]
December 24, 2019
California Consumer Privacy Act

What is the California Consumer Privacy Act (CCPA)

Note: As of July 1st, 2020 the California Consumer Privacy Act (CCPA) is now being […]
December 20, 2019
Children's Internet Protection Act (CIPA)

Internet Filtering & Monitoring For CIPA Compliance

What is the Children’s Internet Protection Act (CIPA) The Children’s Internet Protection Act (CIPA) is […]
December 12, 2019
HIPAA Compliant Logo

HIPAA Compliance: What is it & How do I become Compliant?

HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that was enacted in […]
December 9, 2019
Cell Phones Risking Cybersecurity

Are Cell Phones Risking Your Cybersecurity?

It’s Friday afternoon and in just a few short hours your employees will be making […]
November 5, 2019

How to Block USB drives with Group Policy

It is best practice for an organization to control USB/Endpoint devices being used within the […]
October 18, 2019

CurrentWare Infographic Featured on PC Mag!

Our infographic was featured in a PC Mag article on data breaches! To learn more […]
October 3, 2019

What is Data Loss Prevention (DLP)?

Data Loss Prevention or DLP is the practice and usage of tools, technologies, and processes […]