ThinScale’s Tech Blueprint EP 3: GPOs – What They Can and Can’t Do

GPOs

Group Policy has long been a cornerstone of IT management — used to enforce lockdowns, deploy software, and manage user environments at scale. But as IT environments evolve, so too must our approach to managing Group Policy Objects (GPOs). In Episode 3 of ThinScale’s Tech Blueprint series, CTO David Coombes breaks down the inner workings … Read more

ThinScale’s Tech Blueprint EP 2: Screen Scraping Malware -The Silent Threat to Your VDI

screen scraping malware

In the second episode of Tech Blueprint, ThinScale CTO David Coombes shines a light on one of the most overlooked threats in virtual desktop infrastructure (VDI): screen scraping malware. In under six minutes, David walks through a live malware simulation that demonstrates just how easily malicious actors can capture and exfiltrate sensitive information — even … Read more

ThinScale’s Tech Blueprint EP 1: Keylogging & VDI – Don’t make this mistake!

In our first episode of the Tech Blueprint, we put a critical endpoint security threat under the microscope: keyloggers. These silent and often undetected tools can compromise user credentials, access sensitive data, and expose entire systems, all without triggering a single alarm. Join ThinScale CTO David Coombes as he breaks down: Whether you’re managing remote … Read more

How Zero-Trust Security Powers the Future of Flexible Workforces

Many companies are pulling remote agents back to the office over security concerns, but smart contact centers are proving there’s a better way. In the recent webinar On Demand Agility Meets Enterprise Security, ThinScale and ShyftOff joined forces to explore how zero-trust security can empower flexible workforce solutions without compromising sensitive customer data. Together, we … Read more

Securing Your Remote Workforce – The Corporate Chapter

ThinKiosk installs on any device operating Windows OS. It creates a secure, isolated shell that leverages Windows but crucially blocks user access to the underlying OS. IT teams can configure and enforce strict security policies on each device, as well as push updates for applications, firewalls, and firmware. What You’ll Learn : Why You Should … Read more

Securing Your Remote Workforce – The BYOD Chapter

With remote working becoming more and more common, organizations are looking to take advantage of BYOD/BYOPC in order to save on costs and operational complexity. However, it has some inherent security issues traditionally. ThinScale’s unique approach to BYOD with Secure Remote Worker solves these security issues. Watch this recording to explore how you can secure … Read more

Unpacking the CX Industry’s Global Investment Trends for 2024

The CX and outsourcing sector is ever-changing, and Ryan Strategic Advisory has always had its finger on this industry’s pulse since 2017 with the CX Ombibus Survey. The aim is to gain and share insights into what the leaders in enterprises are thinking in terms of outsourcing, prioritization of technologies, and more. In this recording, … Read more

Webinar Recording: VDI/DaaS Security Best Practices

As organizations increasingly adopt Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) solutions to support hybrid and remote work, the need for robust security has never been greater. But with evolving threats targeting virtual environments, are you confident in your organization’s defences? In this live session recording, ThinScale experts share insights into securing your VDI/DaaS environment. … Read more