Webinar Recording: VDI/DaaS Security Best Practices

As organizations increasingly adopt Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) solutions to support hybrid and remote work, the need for robust security has never been greater. But with evolving threats targeting virtual environments, are you confident in your organization’s defences? In this live session recording, ThinScale experts share insights into securing your VDI/DaaS environment. … Read more

Reduce IT costs in 2025 while improving endpoint security

Cut costs without impacting endpoint security

In 2025, organizations face the challenge of bolstering endpoint security against increasingly sophisticated cyber threats while managing constrained budgets. Achieving robust endpoint protection and reducing IT costs require strategic investments and innovative approaches. Below are key strategies to enhance endpoint security and effectively reduce IT expenses in the upcoming year. 1. Adopt Unified Endpoint Security … Read more

Mandiant researchers uncover that QR codes can be used to circumvent browser isolation

Mandiant researchers uncover QR codes can be used to bypass isolated browsers, and Digital Eye use SQL injection to hide malicious code inside Visual Studio and Azure

This week, we explore a recent discovery revealing how malicious actors can exploit QR codes to bypass isolated browsers. Additionally, we delve into a cyber espionage campaign aimed at IT service providers in Southern Europe. New threat can introduce malicious actions to an environment Security researchers at Mandiant have uncovered a method by which attackers … Read more

SpyLoan Malware affects 8 Million Android customers

ThinScale TL;DR SpyLoan and Ransomware gangs seek Pen testers

In today’s TL;DR, we look at a recent SpyLoan malware discovery by McAfee on multiple applications on the Google Play Store and the increasing trend of Ransomware groups hiring skilled Pen testers to improve their malicious software. 8 Million Android customers affected by SpyLoan Malware A recent investigation by McAfee has identified 15 malicious Android … Read more

These Law Firms Saved Thousands Improving Their Endpoint Security

Endpoint security can also save money for legal entities

In the legal sector, where sensitive and confidential information is handled daily, law firms are increasingly becoming prime targets for cyberattacks. The consequences of a data breach can be severe, impacting not only a firm’s reputation and client trust but also exposing it to substantial litigation and financial losses. Securing endpoint environments is crucial, but … Read more

Dispelling the Myths Around Remote Working

Remote work has become a significant trend in recent years, accelerated by global events and technological advancements. Despite its growing popularity, numerous myths and misconceptions still surround the practice. Let’s debunk some of the most common myths about remote work and uncover the reality of this modern work style. Myth 1: Remote Work is not … Read more

IT Admin Series: 02 MFA best practices

MFA, multi-factor authentication best practices for on-premises and remote workforces

Multi-factor authentication (MFA) has become the standard for almost any workforce utilizing IT systems. It creates an extra layer of defence against malicious actors attempting to access corporate resources. However, it is not something that can just be implemented and forgotten about; due consideration must be given to ensuring an organization’s MFA is as effective … Read more

Building the human firewall: 6 pillars of Security Awareness Training

Anyone working in IT security can attest to the difficulties in maintaining effective security posture in their environment with uneducated or unaware end-users. The context that security training provides is vital for employees to understand why they are working within their specific parameters. Without this insight, it is little surprise that 74% of security breaches … Read more

The Top 5 Trends & Priorities for Security Leaders in 2024 

CISO priorities

Throughout 2024, the speed of digital transformation across every industry will continue at pace, demanding that security leaders stay agile, and remain open to new technologies and approaches. Here are five key areas in particular that deserve attention: 1. Embedding Zero Trust Let’s forget about the buzzword that Zero Trust Architecture (ZTA) has become. The … Read more