Windows Security virus & threat protection (formerly Windows Defender antivirus) in Windows 11/10 may sometimes detect SoftActivity Monitor application or Agent files on the monitored computers as a threat and remove it. It might be categorized as MonitoringTool:Win32/ActivityMonitor, or PUA:Win32/SoftActivity (Potentially Unwanted Application) or similar.
In fact, there is no virus or malware in SoftActivity Monitor software. The software only does what is declared in its features described on the website, i.e. records users activity on the company-owned computers to help with insider threat detection and employees productivity tracking. SoftActivity application folder can be safely excluded by the admin from scanning to allow this software.
In the last decade, industry professionals have seen remote work on the rise. And, sparked by the forced physical distancing of the coronavirus, more businesses are turning to remote workforces for business continuity.
No matter what your situation is, if you have remote employees and no monitoring solution, you really don’t know if your remote staff is truly working when they should be.
Read on to see how you can measure your remote employee work efforts:
The COVID-19 pandemic has forced many businesses to transition to contingency plans, like remote work, in order to stay afloat.
Even when physical distancing measures are removed, and more businesses can open their doors to in-person customers, many may still allow remote work for their employees.
If you plan to use remote work in your business operations, then you need some type of monitoring in place. Read on to learn more:
Organizations in every sector handle business data. Whether they collect information to process orders or they need to hold onto sensitive employee data for tax purposes, organizations are a treasure trove of sensitive information.
Data collection, and therefore its protection, has become a primary facet of business operations due to the online nature of most businesses in 2021. To manage this, many companies implement data loss protection (DLP) plans.
But what exactly does this look like, and does every business need to implement data loss protection?
Data loss can wreak havoc on any industry. As long as a business collects sensitive data, they are at risk for a data breach or insider threat. This risk is elevated in critical industries like insurance and healthcare because they collect and store far more valuable data on-site.
The insurance industry is, therefore, highly susceptible to security breaches and stolen data. To better understand this issue, we’ve identified the top security considerations for insurance companies and laid out top data loss prevention (DLP) tips for organizations within this industry.
We are glad to announce the release of new version 12.6 of its leading user monitoring applications SoftActivity Monitor and TS Monitor. SoftActivity is used by thousands of organizations for employee productivity tracking and protection against insider threats.
This upgrade will make it easier to monitor users in almost real time mode in web console, without installing the desktop Monitor app for the managers. This can also be done in TS Monitor now.
This upgrade is recommended to our all customers.
What’s new in version 12.6:
new Users Dashboard view in web console:
see all monitored users next to each other with the remote screen image, latest website and app.
it is similar to Dashboard view in Monitor desktop app, but this does not require installing the app.
screens update close to real time, with around 1 min delay, depending on how often you set to take screenshots.
does not require refreshing the web page manually.
filter users by a group, last active time, name, and signed-in status.
TS Monitor 12.6 has now switched version numbering to the same as Monitor, to better indicate inter-compatible versions. TS Monitor version prior to 12.6 was 6.5.
download multiple selected screenshots. Can be used to keep a copy of images as evidence, or for reporting purposes.
improved quality and increased size of thumbnail images for screenshots.
fix: PDF export of Attendance report filtered by a group did not work.
fix: alerts counter will update in real time and a popup notifications should appear in browser for alerts.
fix: errors on Top programs (now Applications) & Top websites (now Websites) views.
numerous UI improvements in web console.
new command line option to force run cleanup of logs and screenshot files older than a set retention interval: sawebsrv.exe --cleanuplogs
Keylogger (keystrokes recording option) is now OFF by default for new installations to help protect users’ privacy. It can be enabled by the admin in Monitor app if your organization requires this.
Chat recording feature has been removed from the product since it only supported Skype, which is not widely used on business desktop computers anymore. Chat history in any messengers can be viewed on screenshots in web console – Applications view. Chat view still remains in web console to view old messages, and will be removed in the next version.
With the rise of work-from-home and the online workplace, most company IT departments and security teams are aware of common security threats, such as malware, spyware, a malicious computer virus, or a phishing attack. These continue to be extremely popular security threats for organizational networks; however, there are more advanced attacks that could put your company at risk. Understanding how these advanced attacks are targeting your company and computer network will help you to put up the necessary safeguards and protect your data.
Standard security practices like having a spam filter, antivirus program, and firewall will still need to be used to protect organizational networks; however, as we know, it is not enough.
Cybersecurity threats are constantly evolving. A comprehensive security stance, which protects against malware, data breaches, and service disruptions, is required at all vulnerable endpoints and every level of an organization.
Here are five common security threats and how to protect against them.
We use cookies for website functionality and security (necessary cookies). They are always enabled. We also use cookies for website analytics and personalized ads. By clicking ‘Accept’, you consent to the use of cookies on this website. To get more information or withdraw consent please check our Privacy Policy.