Building the human firewall: 6 pillars of Security Awareness Training

Anyone working in IT security can attest to the difficulties in maintaining effective security posture in their environment with uneducated or unaware end-users. The context that security training provides is vital for employees to understand why they are working within their specific parameters. Without this insight, it is little surprise that 74% of security breaches … Read more

IT Admin Series: 01 Protecting Your Organization With User Restrictions

Endpoint deployments are the first and weakest point of contact when it comes to potential threats. User restrictions must be applied to protect your organization. If IT teams implement robust endpoint security solutions, configure roles and access correctly, assign the correct permissions, enforce good password policy with MFA as reinforcement, and maintain consistent monitoring over … Read more

Process Security: The Answer to Complex Endpoint Security Use Cases

ThinScale Provides complete flexibility when securing endpoint environments

Securing endpoints without breaking application compatibility or simply affecting productivity is an ongoing challenge for modern IT departments. Often, concessions must be made, either by restricting or losing app functionality or loosening security protocol and making exceptions for vital LoB apps. Striking the perfect balance between robust security policies and workload requirements is crucial. ThinScale’s … Read more

The Top 5 Trends & Priorities for Security Leaders in 2024 

CISO priorities

Throughout 2024, the speed of digital transformation across every industry will continue at pace, demanding that security leaders stay agile, and remain open to new technologies and approaches. Here are five key areas in particular that deserve attention: 1. Embedding Zero Trust Let’s forget about the buzzword that Zero Trust Architecture (ZTA) has become. The … Read more

Why Zero Trust Security beats Antivirus everytime

Some old-fashioned wisdom for a modern problem; an ounce of prevention is worth a pound of cure. PwC’s 2023 Digital Trust Insight Survey presents a hypthetical scenario It’s clearly based on the 2021 HSE data breach (the national Irish health executive), but it underscores a global issue in security; organizations are too reliant on antivirus … Read more

3rd party contractors are a ticking time-bomb for IT security

PwC’s 2024 Digital Trust Insight Survey is a window into what’s keeping cybersecurity leaders up at night. While the report covers various aspects of data security and privacy, one worrying trend emerges; many organizations are deeply concerned about data breaches due orginating from 3rd-parties.  Indeed, almost a quarter of the 3800+ professionals who took the … Read more

Securing the Edge: Protecting Virtual Environments from Endpoint Threats

In today’s rapidly evolving digital landscape, the necessity of safeguarding sensitive data and systems cannot be overstated. In particular, organizations relying on virtual environments to enable their workforce like virtual desktop infrastructure (VDI) and Desktop as a Service (DaaS) solutions must address the issue of endpoint security. During a recent webinar, I discussed the importance … Read more

Embracing Remote Work and Ensuring Data Security: An interview with Billy West, VP of IT at Working Solutions 

ThinScale provides data security and helped Working Solutions embrace remote work

We had the pleasure of speaking with Billy West, Vice President of IT at Working Solutions, a leading on-demand Business Process Outsourcing (BPO) company.   Working Solutions has been a pioneer in adopting remote work long before it became a widespread trend, and their partnership with ThinScale has played a critical role in ensuring data security … Read more

Role-based administration and why it is vital for true IT security

Secure your IT admins with ThinScale

Risks to environments with unlimited admin privileges Security breaches are often times worst case scenarios for organizations. However, they are more common than you may think. Since last year, there have been 817 data breaches in the US alone. The truth is a lot of these breaches can be avoided if proper cybersecurity principles are … Read more