WaH: Global insights for the South African BPO and CX industry Webinar

Work at home has become a new normal across the world, with companies embracing what was initially seen as a niche form of work as standard during this pandemic. On May 25th, Peter Ryan of Ryan Strategic Advisory, Brendan Kiely of ThinScale Technology and Rod Jones of Rod Jones Contact Centre Consulting came together to speak about key insights found working within and alongside the BPO and CX industries in South Africa and Worldwide.

Read more

Compliance & Meeting PCI DSS, HIPAA & GDPR standards on your endpoints

There’s a lot of movement right now in terms of work at home, how to provision for it quickly in a cost effective way. With this comes inevitable issues around security and, specifically, compliance standards. In this post we wanted to talk a bit about the 3 compliance standards that we see appear the most often in our experience working in the endpoint computing space, what the requirements are for meeting the standards at the endpoint level. At the end of this post we will also tell you how ThinKiosk and Secure Remote Worker meet these requirements, fulfilling a major part of overall environmental compliance.

Read more

ThinKiosk and Secure Remote Worker 6.0

Hello all!

Happy to announce the launch of ThinKiosk and Secure Remote Worker 6.0, both of which come packed with new features we’ve been hard at work on and much requested by our customers and their users. In this update we have introduced convenience for administrators   In this post we are going to be going through the major updates in this release.

Read more

Rapid WAH deployment with Secure Remote Worker on Personal Devices

IT departments are under extreme pressure to roll out dynamic and scalable work-at-home environments as quickly as possible due to the COVID-19 pandemic.  The timeline is “ASAP. Like yesterday” as Brian Madden and Shawn Bass humorously referred to in their recent article. But how do you provide WAH-ready endpoints for agents/employees “yesterday” without sacrificing security and control? The only way to achieve this is by using Secure Remote Worker on personal devices. In this post I will explain why this is.

Read more

Implementing Work at Home? Security considerations for your virtual environment

With recent events we understand that business continuity is one of the things at the forefront of everyone’s mind, with more organizations closing their office locations temporarily and looking to implement home working as part of an overall business continuity plan. In virtual or remote environments, it’s tempting to think that you just need to provide your employees access through a browser or portal application for use at home and leave it at that, but this is not the case. When providing home working for your employees, security is obviously paramount, but one must also consider scalability, manageability, and of course, the end user experience.  While it can be difficult to roll out corporate devices to the entire workforce, if you do decide to allow the use of personal devices then there are steps that can be taken to mitigate risk. 

Read more

Securing your Windows 7 Devices

Windows 7 has been out of extended support for months, however, to no one’s surprise there are still a huge number of Windows 7 devices being utilized in the workplace across multiple industries, with around 25.6% of all devices are still running the operating system, Windows 7 is not going anywhere overnight. That is not to say people AREN’T moving however, the amount of reported Windows 7 devices are dropping at rates similar to XP. Environments are making the move to Windows 10, it’s just a much longer process than we give it credit for. So what exactly takes so long?

The issue is not with notice, we have known about EoL for a long time, the issue, as it often is with IT, is with prioritization. There are a lot of considerations and steps that go into upgrading an OS in a workplace and the idea of disrupting workflow and ignoring current “fires” to provision for what is (or was) seen as currently working fine is for many just was not a feasible undertaking.

Read more

Securing end users and endpoints with thin client computing

Drawing on my twenty plus years of working within end user computing, I can safely say that the weakest link in any end user computing environment when we talk about security, are the end users and the devices which they use. We talk a lot about securing the edge of the network, and for me, the edge of the network, when it comes to end user computing, stops squarely with the end users.

Read more

Best of Both Worlds: MDM & Secure Remote Worker for BYOD

BYOD is quickly becoming a valid and even preferred option in the workplace, with 85% of organisations implementing some form of BYOD. The efficiency that can be achieved with this trend is well documented and largely agreed upon. It’s found that employees work well on familiar devices, this stretches further than just the initial learning curve that … Read more

Secure Remote Worker’s Write Filter

Hi all, we are coming at you again with another blogpost, this time to let you know about our new feature for Secure Remote Worker, in our 6.0 release.

Built to provide a greater level of security and assist in achieving PCI, HIPAA and GDPR compliance, Secure Remote Worker’s write filter will allow for a clinical level of separation between the Secure Remote Worker session and end user’s personal machine. Thanks to the great effort of our dev team,  Secure Remote Worker will allow you to utilize this write filter functionality on all personal Windows devices.

Read more