Why Zero Trust Security beats Antivirus everytime

Some old-fashioned wisdom for a modern problem; an ounce of prevention is worth a pound of cure. PwC’s 2023 Digital Trust Insight Survey presents a hypthetical scenario It’s clearly based on the 2021 HSE data breach (the national Irish health executive), but it underscores a global issue in security; organizations are too reliant on antivirus … Read more

3rd party contractors are a ticking time-bomb for IT security

PwC’s 2024 Digital Trust Insight Survey is a window into what’s keeping cybersecurity leaders up at night. While the report covers various aspects of data security and privacy, one worrying trend emerges; many organizations are deeply concerned about data breaches due orginating from 3rd-parties.  Indeed, almost a quarter of the 3800+ professionals who took the … Read more

Securing the Edge: Protecting Virtual Environments from Endpoint Threats

In today’s rapidly evolving digital landscape, the necessity of safeguarding sensitive data and systems cannot be overstated. In particular, organizations relying on virtual environments to enable their workforce like virtual desktop infrastructure (VDI) and Desktop as a Service (DaaS) solutions must address the issue of endpoint security. During a recent webinar, I discussed the importance … Read more

Embracing Remote Work and Ensuring Data Security: An interview with Billy West, VP of IT at Working Solutions 

ThinScale provides data security and helped Working Solutions embrace remote work

We had the pleasure of speaking with Billy West, Vice President of IT at Working Solutions, a leading on-demand Business Process Outsourcing (BPO) company.   Working Solutions has been a pioneer in adopting remote work long before it became a widespread trend, and their partnership with ThinScale has played a critical role in ensuring data security … Read more

Role-based administration and why it is vital for true IT security

Secure your IT admins with ThinScale

Risks to environments with unlimited admin privileges Security breaches are often times worst case scenarios for organizations. However, they are more common than you may think. Since last year, there have been 817 data breaches in the US alone. The truth is a lot of these breaches can be avoided if proper cybersecurity principles are … Read more

The Gig CX Revolution: An Interview with Courtney Meyers, co-CEO of Omni Interactions

ThinScale interviewed Courtney Meyers, co-CEO of Omni Interactions

In the ever-evolving landscape of customer service, businesses are exploring innovative ways to enhance their customer experience (CX) while optimizing operational efficiency. We sat down with Courtney Meyers, Co-CEO of Omni Interactions, a tech-enabled GigCX company that is revolutionizing the contact center industry, to discuss their operational model and what makes it work. During our … Read more

ThinScale Cloud: Patch management and software deployment made easy

Patch management is a critical aspect of maintaining the security of your computer system. It involves regularly updating software with the latest security patches and bug fixes. These patches are designed to address vulnerabilities in the software that hackers and other malicious actors can exploit.   Failure to maintain up-to-date patches can leave your system open … Read more

Centralize your management with ThinScale’s unified endpoint management

As organizations increasingly embrace digital transformation, managing diverse endpoints has become complex. A unified endpoint management (UEM) solution streamlines this process by providing a centralized platform for monitoring, securing, and maintaining all endpoints within an enterprise. Asset Management A unified endpoint management solution should provide robust device inventory and discovery capabilities. It should automatically detect … Read more

A Guide to Better Patch Management

Patch management is about identifying, acquiring, and deploying software updates. In particular, security patches are essential to address known vulnerabilities and minimize risk within your IT infrastructure. But patching is a time-consuming job. Sometimes it can be weeks, even months, before a patch is applied where needed. And this leads to significant problems. Often, data … Read more

Delivering a Secure BYOD Policy for Healthcare Providers

Bring Your Own Device (BYOD) policies have become increasingly common. The benefits of allowing employees to use their own devices are huge. But in the healthcare industry, where professionals access sensitive patient information, BYOD policies aren’t always favoured. However, with the right planning and implementation, personal devices can be an effective way to increase productivity … Read more