Skip to main content

How to Block YouTube Videos on Windows

YouTube is the world's largest and most popular video site. It might take a lot of time for your employees to visit YouTube during business hours every day.

To improve work efficiency, the boss must ban employees from accessing YouTube during business hours, or at least knowing how much time employees spend on YouTube.

A lot of articles on how to block the YouTube website mentioned the method of editing the hosts file in the C:\Windows\System32\drivers\etc folder. This method may look good, but it is not suitable for the company management staff computers.

You can block YouTube on Windows by following the steps below:

1. Download and install OsMonitor employee monitoring software

2. Check the "Block Video Websites" option in the system settings of OsMonitor Server. You can allow access to YouTube for some employees while blocking the website for the others. All these settings are done on the OsMonitor Server, without the need for operating the employee's computer.

3. You can click the small button near each option to view or edit the URLs that you want to block. By adding the URLs of the websites you wish to block, you not only can block YouTube but also all kinds of other video websites.

4. When the YouTube website is visited, the browser will close automatically on the employee's computer. The OsMonitor server logs the event and the boss can view the record of blocking YouTube under the recent event column of OsMonitor Server.

5. If you don't block access to YouTube, you can see how much time each employee spends each day visiting YouTube.

As a powerful monitoring software, OsMonitor can block access to any website, YouTube apps and other apps that are not related to work on all Windows OS computers, including Windows 7 and Windows 10.

Get WeChat Conversations with WeChat Monitoring Tool

WeChat is popular social software in China with hundreds of millions of users. If you have products or services for Chinese customers, it is necessary to use WeChat as one of the online communication tools for customer service. Employees usually use WeChat for Windows, because it feels more comfortable transferring files and typing compared to the mobile version of WeChat.
Wish to keep track of your employees’ quality and efficiency of work when they provide customer services through online chat tools like WeChat? OsMonitor is the solution. OsMonitor can perfectly monitor WeChat for Windows by automatically capturing the conversations between employees and customers and saving them on your OsMonitor server. The boss can check these WeChat chat histories at any time, which are helpful for tracking the status of employees and customers. However, OsMonitor only monitors the WeChat for Windows version, which means that anything your employees do with their private WeChat on mobile phones is not under monitoring. So, you don’t need to worry if monitoring WeChat conversions can infringe their privacy.
If you want to monitor WeChat chat history, don’t forget to check the ‘Log WeChat Conversation’ option on OsMonitor server.

Please make sure that the employee computer is being monitored and WeChat is running on the employee's computer. At this time, all chats with the customer will be recorded. Boss can easily see all WeChat chats on OsMonitor server by looking at the ‘History View’.

Run the free 10-day trial version now and discover even more powerful features of OsMonitor.

Automatic screen tracker for Employees with Screenshots

OsMonitor is a powerful employee monitoring software that works on all Windows system, including Windows 7, Windows 10, and supports both 32 bit and 64 bit OS.

One of the main features of OsMonitor is screen tracking. The boss can keep track of all employee's computer desktops on his or her computer with OsMonitor, which allows the boss to view employee computer screens in real time, or look at the screenshots that are saved to the history database any time later.

The boss can see the latest activities on screens of all employee computers through OsMonitor server:

App usage tracking – you will know how much time each employee spends on each application during work time:

Monitor any employee's screen at any time:

You can click "Real-time screen monitoring" or zoom in on the screenshots:

 

Track the URLs visited by employees:

OsMonitor has far more powerful features other than the ones shown, get your free trial now and check them out!

Download OsMonitor Free Trial

How to block Flash drive in Windows 10, disable usb drives don’t need group policy?

How to block a USB Flash drive or Smartphone plugged on a computer in Windows 10?
Do you still need a group policy to disable USB drives?
How to find out what your employees are doing with USB Drives?
How can find which files were copied to a USB storage device?
How to show a custom alert message when a Flash drive is plugged in?
How to disable USB storage or Smartphone plugged on a computer?
These can be done in one click with OsMonitor software.

YouTube player

Run OsMonitor Server on a VPS Hosting Monitor the Employees Around the World

For companies whose employees are scattered around the world, if you want to monitor the computers of these employees, you can use VPS Hosting to run OsMonitor server. The way is: install the OsMonitor server on your VPS Hosting and input the dedicated Internet IP of the VPS Hosting in the OsMonitor client. If you need to check the monitoring, log in to VPS Hosting with the Windows remote desktop. The VPS Hosting must be a Windows operating system.

You can find the dedicated Internet IP in your VPS Hosting console. In the future, when you install the OsMonitor client, you just need to enter the IP address.

At this time, you can use the Windows Remote Desktop to log in to the VPS Hosting. Once you have logged in the VPS Hosting, it is as convenient as operating your own computer. Now you can download and run the OsMonitor server on VPS Hosting easily.

After run OsMonitor server and OsMonitor client, if you can't find any computer be monitored in the monitoring list. The reason is the VPS Hosting intercepts most of the TCP ports except for a few ports such as port 80 by default. You need to set it in the VPS Hosting control panel. Make sure the firewall allow TCP ports 7211, 7212, and 7213 go through.

 

 

Why Employee Monitoring Software Should NOT Provide Keylogger Function

The employee monitoring software is used to monitor and constrain the employee's computer activity. Employees’ access to websites, their chat content, Email content can already be obtained through OsMonitor, not to mention features like screen monitoring, daily software usage and time analysis and so on, which are enough for managers to grasp the working information of employees.

The information recorded by the keylogger is messy because each keystroke is recorded, many duplicate and useless contents are present, which is difficult for the administrator to read or use. Any ordinary person will not have time and patience to look through these messy contents.

The biggest problem with keyword tracking is the possibility of recording passwords entered by employees, which is very unsafe and unfair. The employee monitoring software does not need the key recording function at all, because it will make the staff scared, and once the data leaks, enormous risk can be brought. Managers themselves also bear moral and legal risks because they have their employees’ passwords.

The keystroke recording function will also be used by unscrupulous criminals, thus deviating from the original intention of employee monitoring software. This is why OsMonitor will never add the keylogger function.

 

Government’s dumb data disasters demonstrate decaying diligence

The Australian government's habit of losing filing cabinets full of confidential documents is merely a symptom of much deeper problems, in both policy development and implementation.

As Oscar Wilde might have put it: "To lose one filing cabinet full of government documents may be regarded as a misfortune; to lose two looks like carelessness."

Carelessness is something the Australian government seems to be quite good at these days.

News broke on Sunday that in 2013, confidential personnel files from the then Department of Families, Housing, Community Services and Indigenous Affairs (FaHCSIA), now part of the Department of Social Services, had gone walkies for several days.

Just like the secret cabinet files incident reported in January, these documents were discovered in a locked filing cabinet bought from a second-hand furniture store.

"The documents were personnel files which had all the personal details [of employees] like home addresses and phone numbers, as well as previous positions held, CVs, and security clearances," the buyer told The Sunday Canberra Times.

"It was a two-drawer filing cabinet, and the bottom drawer was completely full," he said.

The two incidents aren't quite the same. Personnel files don't have to be handled under the same security protocols as cabinet documents. But there's plenty enough information in them to make identity theft or spearphishing a trivial pursuit.

Yes, this is carelessness.

Then there was the incident where a "classified notebook belonging to a top Defence official" was discovered, along with his ID ... guess where?

"Initial inquiries indicate the items were inadvertently left in a piece of personal furniture recently disposed of by the Defence official," The Canberra Times reported.

Three incidents involving lost documents in second-hand furniture doesn't constitute a wave of incompetence, of course, no more than two or three robberies random clustered together constitute a crime wave. But these physical data leaks are being unearthed at a time when confidence in the government's ability to manage data needs to be questioned, and questioned hard.

Do we need to repeat the now-familiar litany? The government's recklessness with medical data. The omnishambles of the 2016 Census. The collapse of the Australian Taxation Office (ATO) storage system. The unthinking viciousness of Centrelink's robodebt debacle.

Things are no better at the state level -- the corruption of Victoria's Ultranet project and NSW agencies struggling with the security basics, to name but two examples.

Do you detect a pattern? I do. So do former senior public servants, but in another way.

Last month, The Mandarin, a news site that covers leadership in the public sector, concluded that there's an urgent need to recover the capacity for deep policy analysis in the Australian Public Service (APS).

Terry Moran, a former secretary of the Department of the Prime Minister and Cabinet (PM&C), was scathing.

"The APS is failing in areas of social policy because it has been stripped of specialist capability and service delivery experience. If it were a patient it would be in palliative care," Moran said.

"Successive governments haven't nurtured the APS: they've gutted it."

David Borthwick, former secretary of the Department of Environment, Water, Heritage and the Arts, was concerned that a lack of resources meant that departments were flat out delivering their programs, with little time for anything else.

"The quality of the Australian Public Service is the foundation of good government. It must have the capacity -- the skilled workforce and the resources -- to undertake the strategic thinking which underpins longer-term reforms," Borthwick said.

Highly-respected journalist Laura Tingle reported similar concerns in her Quarterly Essay from 2015, Political Amnesia: how we forgot how to govern.

"The blurring of boundaries between the public servant and the political adviser, and the relentless focus on message over substance, results in a diminution of the 'space' in which the independent adviser can operate," Martin Parkinson, currently secretary of the Department of Prime Minister and Cabinet, said at the time.

"Today, in some institutions, smart people look around at their colleagues and find there is no one to talk to, to learn from, who has experience in delivering real reform."

Ken Henry, a former secretary of the Commonwealth Treasury, said much the same thing in Tingle's essay.

"I think many departments have lost the capacity to develop policy; but not just that, they have lost their memory. I seriously doubt there is any serious policy development going on in most government departments," Henry said.

All this is about developing policy rather than implementing programs, of course. But aren't they the exact two things that the government is actually for?

If Australia were struggling to do either one of them, then we'd be deep in the brown stuff. But we're struggling with both.

The most worrying comment for me came from Peter Varghese, a former secretary of the Department of Foreign Affairs and Trade (DFAT).

"Deep policy thinking is an area where our system, at both the political and the public service levels, has struggled over the last decade," The Mandarin quoted Varghese as saying.

"Recovering the capacity for deep policy analysis is urgent because we are at an inflection point in our history. It is not dissimilar to the period after the second world war when the nation had to set out in a new direction and when the political and public service leaderships worked so well together to chart that direction. Or the period from the early eighties when we set out to internationalise the Australian economy; or the nineties when tax and industrial relations policies had to be redefined."

Yes, the Australian government is struggling, both with policy development and with the implementation of data-enabled programs, at the exact moment in history when such things are needed.

The government is even having to hire consultants to teach it how to do basic government stuff like organisational development.

Parliament is currently running an inquiry into how the government uses contractors, with wide-ranging terms of reference. Stay tuned, but remember that this inquiry will only scratch the surface.

From:http://www.zdnet.com/article/governments-dumb-data-disasters-demonstrate-decaying-diligence/

Pennsylvania attorney general sues Uber over delayed data breach notification

The state could seek as much as $13.5 million in penalties from the ride-hailing firm for its response to the 2016 breach.

Pennsylvania Attorney General Josh Shapiro is suing Uber for taking more than a year to notify thousands of drivers in the
Keystone State that their information was stolen in 2016.

In December, it came to light that hackers in 2016 stole data pertaining to 57 million Uber riders worldwide, as well data on more
than 7 million drivers. Uber concealed the breach for more than a year.

That data breach impacted at least 13,500 Pennsylvania Uber drivers, according to Shapiro's office. Under the Pennsylvania Breach
of Personal Information Notification Act, Uber should have notified those drivers of the breach within a "reasonable" time frame.

"Uber violated Pennsylvania law by failing to put our residents on timely notice of this massive data breach," Shapiro said in a
statement. He noted that instead of notifying impacted riders and drivers of the incident, Uber reportedly paid a hacker to keep
it under wraps.

Shapiro called this "outrageous corporate misconduct."

Under Pennsylvania's data breach law, the attorney general can sue Uber for up to $1,000 for each violation. With at least 13,500
Pennsylvanians, impacted, it could seek up to $13.5 million from the ride-hailing firm.

Shapiro is one of 43 state attorneys general investigating the data breach, his office said.

The data breach came to light just a few months after Dara Khosrowshahi stepped up as the new CEO of the embattled business. In a
statement to CNET, an Uber spokesperson said the company's new leadership "has taken a series of steps to be accountable and
respond responsibly" to the breach. "While we dispute the accuracy of some of the characterizations in the Pennsylvania Attorney
General's lawsuit, we will continue to cooperate with them and ask only that we be treated fairly."

From:http://www.zdnet.com/article/pennsylvania-attorney-general-sues-uber-over-delayed-data-breach-notification/

Overcoming the challenges: Back-up and storage for banks

Now is a good time for banks to think audit their back-up and storage to achieve both cost-savings and regulatory compliance.

A gambling and gaming company has achieved 75% in cost-savings with Amazon Web Services (AWS). The return on investment (ROI) it
has achieved is incredible and, more importantly, it can be replicated by banks and other financial services organisations at a
time when the European Union's General Data Protection Regulation (GDPR) are just around the corner - coming into force on May
2018.

So, now is a good time for banks to think audit their back-up and storage to achieve both cost-savings and regulatory compliance.

The other key challenges include:

data locality;
bandwidth and data change rate that needs replication to a remote site hosting the cloud;
privacy.
The gambling and gaming company is keeping some of its data on-site and some of it resides in the cloud. To improve the speed at
which it can back up and restore its data, the firm has used a data acceleration to reduce the time it takes to back up its data.
The less time it takes to back up data, the more it can save financially - and that's despite growing data volumes. The larger the
data volume, the more challenging companies, including banks, find it to move data to and from the cloud.

David Trossell, CEO and CTO of data acceleration company Bridgeworks, explains: "The rush to put everything in the cloud and run
the organisation from there has had an impact on internal service-level agreements (SLAs). An example is of the gaming company.
After migrating everything to the cloud, the response for the HQ staff accessing the database in the cloud became unacceptable:
this is purely down to the time it takes to get from the HQ to the cloud, a factor of the speed of light.

"This has been the experience of many cloud-only strategies where databases have been involved. This forced the pendulum back to
what is now a more acceptable model of a hybrid cloud strategy where the critical data still on-premise, but the non-critical data
along with Backup-as-a-Service (BaaS) and Disaster-Recovery-as-a-Service (DRaaS) residing in the cloud."

So, unlike WAN optimisation, which can't handle encrypted data, WAN and data acceleration optimise the velocity of data transfers.
Data acceleration also mitigates the impact of data and network latency, which can even have a negative impact on DRaaS. Beyond
data acceleration, the trouble is that there is no efficient traditional way of moving the data around, and the options are often
limited for customers.

From:http://www.zdnet.com/article/overcoming-the-challenges-back-up-and-storage/

Lack of funding exposes US federal agencies to high data breach risks

Budget cuts and other restraints are hampering the government from effectively protecting itself against cyberattacks.

US federal agencies suffer the highest volume of data breaches out of government agencies worldwide and budgets are part of the
problem, new research suggests.

On Thursday, cybersecurity firm Thales, in conjunction with analyst firm 451 Research, revealed the results of a new study into
the security practices and effectiveness of government entities.

The 2018 Thales Data Threat Report, Federal Edition, suggests that US federal agencies are experiencing a rise in data breaches
not only from past years but are also reporting higher rates in comparison to non-US government counterparts.

According to the survey, based on the responses of IT professionals working in the federal sector, 57 percent of federal agencies
experienced a data breach in the past year, in comparison to only 26 percent of non-US government agencies worldwide.

This is a vast jump from an estimated 34 percent in 2016 - 2017, and 18 percent in 2015 - 2016.

In addition, 68 percent of respondents say their agencies are "very" or "extremely" vulnerable to the cybersecurity challenges of
today, while only 48 percent of global counterparts admit to the same.

The US government is pushing for IT modernization as part of the Trump Administration's Executive Order 13800. The order has been
met with mixed reviews due to a demand for a full-scale review in a very short timeframe and a lack of concrete requirements to
modernize cybersecurity.

The problem is one faced not only by government agencies but the enterprise at large today. There is a critical need to revamp
systems and reduce the risk of data breaches and successful cyberattacks, but legacy systems, antiquated software and a lack of
funding can make adequate security an impossible task.

Thales suggests that funding is an issue for federal agencies, too.

The overall federal IT budget dropped by roughly $6.2 billion in 2017, and while the White House has set aside investment for over
4,000 IT projects in mission delivery, administrative services, and support systems, IT infrastructure, security, and IT
management, according to Thales, cuts are anticipated over the coming year which may impact basic IT budgetary needs.

According to the federal 2018 budget (.PDF), from 2015 through 2018, government-wide legacy spending as a percentage of total IT
spending rose from 68 percent to 70.3 percent.

With such a large percentage being taken over just to maintain old, insecure, legacy systems, it is no wonder that many employees
in the federal sector have concerns over adequate security.

"Aging legacy systems may pose efficiency and mission risk issues, such as ever-rising costs to maintain and an inability to meet
current or expected mission requirements," the budget reads. "Legacy systems may also operate with known security vulnerabilities
that are either technically difficult or prohibitively expensive to address and thus may hinder agencies' ability to comply with
critical statutory and policy cybersecurity requirements."

Perhaps in order to maintain the balance sheet, federal agencies are turning towards cloud services, with 45 percent of
respondents saying that their agency uses more than five Infrastructure-as-a-Service (IaaS) vendors.

In addition, 48 percent of those surveyed said over 100 Software-as-a-Service (SaaS) applications are in use.

With the weight of legacy systems pushing on their shoulders and the need to work with new, more innovative technologies and
services at the same time, over two-thirds -- 72 percent -- of respondents said that they are becoming increasingly concerned over
vulnerabilities spawned from shared infrastructures.

A further 62 percent were concerned about who has access to encryption keys, and where.

In total, 68 percent of those surveyed added that they are concerned about potential data breaches stemming from the cloud.

"The massive adoption of cloud computing does not correlate with implementations of data security tools suited to protect these
new environments," said Garrett Bekker, Principal Analyst for Information Security at 451 Research. "Although 78 percent view
data-in-motion and 77 percent view data-at-rest encryption as the most effective tools for protecting data, only 23 percent of US
respondents have implemented encryption in the cloud. Additionally, only 31 percent claimed cloud computing security was a top
spending priority."

Despite these worries, 93 percent of respondents said that security spending will be increased over the coming year within their
IT budgets. In total, 56 percent plan to spend their budgets by focusing on endpoint security, 48 percent will hone in on network
security, and 19 percent view data-centric security as a focal point.

Related coverage: Government agrees to up Medicare card privacy and security controls | Homeland Security orders federal agencies
to start encrypting sites, emails | Kaspersky hauling Homeland Security to court to overturn federal ban | Microsoft to expand
Azure Government Secret cloud option for handling classified data | US government subcontractor leaks confidential military
personnel data

According to the survey respondents, complexity, business impact, and a lack of funding are all adoption barriers to modern
cybersecurity protection.

However, federal IT employees and agencies as a whole remain motivated to do more. In total, 53 percent of survey respondents said
the implementation of best practices and the avoidance of penalties are key motivators for change.

In addition, compliance scored highly at 43 percent.

In January, the United States Department of Homeland Security (DHS) confirmed that a data breach took place at the DHS Office of
Inspector General (OIG), leading to sensitive data belonging to 247,167 employees being exposed.

From:http://www.zdnet.com/article/us-suffers-highest-data-breaches-of-government-agencies-worldwide/