Skip to content

Understanding Modern Management: The Next Era of Windows Device Management

The way we work and the tools we use have transformed over the past few decades. Not long ago, the office was defined by stationary, bulky desktop computers and a working model confined to physical office spaces. Data was stored on local servers, and access to information was often a slow, cumbersome process. Today, the scene is different: desktops have given way to portable laptops, physical offices are no longer the sole hub of productivity, and cloud storage has completely replaced the need for on-premise servers. This shift towards a mobile, agile workforce, and cloud-based infrastructure—has made it clear: the tools that organizations once relied on for device and data management are no longer sufficient. As businesses embrace this new way of working, the need for modern device management has never been more pressing.
In this next era, managing a diverse range of devices, ensuring seamless access, and maintaining robust security requires a strategy that is adaptable, cloud-driven, and built for the dynamic needs of the modern workforce. As the boundaries between work and home continue to blur, and the devices we rely on become increasingly diverse and complex, managing them with traditional methods is no longer sufficient—it’s now a necessity. This blog will explore how Modern Device Management for Windows addresses these challenges and how Scalefusion UEM’s advanced capabilities empower you to efficiently manage and secure your Windows digital assets in today’s dynamic work environment.

The Shift from Traditional to Modern Device Management: Why?

IT and device management has experienced a profound transformation in recent years. The traditional model of managing devices—where IT teams manually configure and oversee each device, often in isolated silos—is no longer sufficient. This model simply cannot accommodate the dynamic nature of the modern workforce, where employees use various devices, and security concerns are more complex than ever. Traditional device management, which relied heavily on on-premise solutions, was designed for a different era. It centered around managing desktops and laptops within the confines of the office network. This static approach did not anticipate the complexities of remote work, the widespread adoption of mobile devices, and the exponential rise in cyber threats. The limitations of this approach are becoming more apparent:
  • Limited Flexibility: Traditional management tools were often rigid and designed for specific hardware or software configurations. As businesses adopt diverse devices—from laptops and tablets to smartphones and IoT devices—traditional systems struggle to maintain consistency and control. This lack of flexibility creates inefficiencies and heightens the risk of security gaps.
  • Manual Processes and High Overhead: Device management was once a labor-intensive process. IT teams had to manually install updates, patch systems, and enforce policies. This approach was not only time-consuming but also prone to human error. Today’s organizations need more agile solutions that minimize manual intervention and reduce operational costs.
  • Security Risks: In the past, IT teams had full control over the devices within a physical office network. However, with the emergence of remote and hybrid work, employees access company data from personal devices and public networks.
According to recent reports, a total of 10,626 confirmed data breaches were recorded in 2024, nearly double the previous year (5,199).[1] This high number reflects both attackers’ growing capabilities and organizations’ expanding digital footprints. Traditional management systems cannot effectively secure these devices across diverse locations, making them vulnerable to threats like data breaches and ransomware.
  • Inability to Scale: As organizations grow, so does the complexity of device management. Traditional systems often struggle to keep up with the needs of large, diverse workforces. Scaling device management efforts in a traditional setup requires significant investment in infrastructure, manpower, and time—resources that could otherwise be allocated to innovation and growth.
In light of these challenges, the need for modern device management is undeniable. Modern device management solutions offer a dynamic approach, addressing both the security and operational complexities of today’s workforce. These solutions are cloud-based, allowing IT teams to manage devices from anywhere, at any time. They provide real-time visibility into device activity and compliance, automating updates and patches, and offering granular security controls that protect sensitive company data across a variety of devices. As businesses undergo digital transformation, especially in environments relying heavily on Windows-based systems, the shift to modern management becomes an essential component of securing and supporting today’s hybrid workforce. The evolution is clear: businesses need scalable, secure, and flexible solutions that meet the demands of an increasingly mobile, remote, and diverse workforce, particularly in a Windows-centric environment.

Modern Management: The Next-Era of Windows Device Management

Modern management is a key aspect of cloud-based, comprehensive endpoint management solutions, blending secure device management with an optimal user experience. For organizations using Windows devices, modern management simplifies device enrollment, configuration, and security at scale. With cloud-based solutions like Scalefusion UEM, businesses can efficiently deploy updates, enforce security policies, and manage applications. This helps them gain complete visibility into the status of every device—without the constraints of on-premise infrastructure. Features like Windows Autopilot streamline the provisioning process for new devices, while built-in security frameworks like Windows Defender protect against advanced threats. By integrating device management and security, modern management supports on-premise, hybrid, remote, and Bring Your Own Device (BYOD) environments. Today, modern management enhances unified endpoint management (UEM) by offering agile, cloud-based control over all Windows OS devices and endpoints. This ensures consistent security policy enforcement across all devices, regardless of location. Organizations gain the control they need, while users enjoy the seamless access and flexibility they expect—making this model an essential asset for the modern workforce.

What should IT admins expect from a Modern Management solution for Windows?

Modern management solutions promise to streamline operations, enhance security, and ultimately transform how businesses manage their devices in current workplaces. However, organizations must understand what modern management for Windows entails:

1. Zero-Touch Provisioning

According to a study by Gartner, companies implementing zero-touch deployment can reduce device provisioning time by up to 90%.[2] Modern device management solutions for Windows leverage cloud-based tools, such as Windows Autopilot, to facilitate zero-touch provisioning. With Autopilot, organizations can preconfigure devices before they are even shipped to users. When an employee receives a new device, they simply connect it to the internet and sign in with their corporate credentials. The device is pre-configured with the security policies, allowing employees to use the business-ready device for work. For IT administrators, zero-touch provisioning significantly reduces the time and effort required for device deployment, allowing them to focus on more strategic initiatives. This automation also minimizes user disruption and enhances the overall onboarding experience for new employees.

2. Balanced Security and User Productivity

Organizations must prioritize security to protect sensitive data as network threats become more sophisticated. However, stringent security measures can frustrate users and hinder their ability to efficiently perform their tasks. The modern device management model integrates robust security features with user-friendly functionalities. This includes implementing conditional access policies that allow users to authenticate based on their context, such as work email, location, or device health. Additionally, features like data encryption, secure application management, and endpoint protection ensure that sensitive information remains secure without impeding user workflows. By balancing security and productivity, IT administrators can create an environment where users feel empowered to work while safeguarding organizational assets. This not only enhances overall productivity but also reduces the likelihood of security breaches, thereby preserving the organization’s reputation and operational integrity.

3. Automation

As organizations scale, the volume of tasks required to manage devices can become overwhelming. Manual management processes are time-consuming and prone to human error, which can lead to inconsistencies and compliance issues. Modern device management frameworks leverage automation to streamline routine tasks such as software updates, policy enforcement, and compliance audits. Automation tools can schedule updates during off-hours to minimize disruption, ensure that devices are consistently maintained, and automatically report compliance statuses. For instance, IT teams can set up automated alerts for devices that fall out of compliance, allowing for swift corrective actions. This automation reduces the administrative burden on IT staff, enabling them to concentrate on higher-value tasks, such as strategic planning and improving user experience. With automation in place, organizations can achieve higher operational efficiency while maintaining a consistent security posture.

4. Cost-Optimization

With increasing pressures on budgets, organizations must find ways to optimize costs associated with device management while maintaining high performance and security standards. Modern device management solutions focus on cost optimization through efficient resource allocation and visibility into device utilization. Organizations can lower operational costs associated with IT support and management by automating processes, reducing manual intervention, and enabling device sharing. Additionally, analytics tools provide insights into device, software, and application performance and usage patterns, enabling organizations to make informed decisions about hardware and software investments and licensing.

Modern Windows Device Management with Scalefusion UEM

Organizations leverage the following modern device management capabilities for WindowsOS-based devices with Scalefusion UEM:

1. Windows Autopilot-Based Provisioning

Scalefusion UEM supports modern device management with zero-touch provisioning by integrating Windows Autopilot. With Windows Autopilot, you can configure new Windows 10 and above devices to automatically join Microsoft Entra ID and seamlessly enroll into Scalefusion UEM upon first boot. Once Windows Autopilot is configured through Scalefusion, newly procured Windows devices can be shipped directly to end users with the assurance that they will automatically enroll in Scalefusion on the first boot. Windows Autopilot-based provisioning ensures secure and standardized setup and management without requiring manual intervention, aligning with the core principles of efficient and modern device management.

2. Customizable Device Profile

With Scalefusion UEM, you can create tailored device profiles according to your use case. Scalefusion’s Windows Device Profile enables you to configure applications, websites, and browsers on managed Windows devices. Once configured, these device profiles can be applied to different devices and user groups or individual devices. This provides you a granular, context-based control over your Windows device inventory.

3. Application Delivery and  Management

Scalefusion UEM’s Windows application management allows you to allow and block applications on Windows devices used for work. For seamless application delivery, Scalefusion enables you to install and publish applications from the Windows Business Store. You can also push the Win32 application on the managed Windows devices. For organizations who want to push their private applications, Scalefusion offers Enterprise Store. Through this store, you can push their private applications via Universal Windows Apps (UWP), Windows Enterprise Installer, PowerShell script, and EXE for legacy applications. Additionally, to create a cohesive secure device environment, Scalefusion offers proprietary apps such as FileDock for secured file sharing, Remote Support for remote troubleshooting, and ProSurf browser for controlled and limited access to websites. This eliminates the need for IT admins to integrate additional third-party software for the above functionalities.

4. Browser Configuration

Scalefusion’s browser configuration feature allows precise control over Chrome, Edge, and Firefox browsers. You can set specific parameters, including homepage, browsing history, extensions, and printing options. Additionally, you can manage pop-ups, Flash plugins, YouTube access, and geolocation settings for enhanced security. These configurations help maintain a secure and controlled browsing experience across managed devices

5. Kiosk Mode

Scalefusion’s Windows kiosk mode enables you to transform Windows devices into dedicated kiosks by configuring them in Single-App or Multi-App Kiosk Mode based on your needs. Single-App Kiosk Mode restricts the device to a single application, ideal for use cases like self-service kiosks, POS systems, or digital signage, where focused functionality is essential. This mode enhances security by limiting user access to only the intended app. Multi-App Kiosk Mode allows access to multiple pre-approved applications, offering flexibility in environments where users need a few essential tools. This setup is useful for shared devices in sectors like retail and healthcare, where controlled, multi-app access is necessary. Once configured, these kiosk modes can be applied across devices, user groups, or individually, ensuring secure, context-based device management.

6. Over-the-air Software and OS Update

With Scalefusion, you can set up and manage OS update policies for Windows 10 devices, allowing precise control over update rollouts. You can choose to automate updates for essential components while selecting other updates for manual approval, tailoring the update process to organizational needs. For updates that require approval, Scalefusion provides tools to check and apply pending updates at both the individual device level and across device groups. This ensures that updates are managed efficiently, keeping devices up-to-date without impacting user productivity.

7. Efficient Patch Management

Scalefusion MDM offers a robust Windows Patch Management solution that streamlines asset management and ensures devices remain secure and compliant. Scalefusion acts as an automated patch management tool. It simplifies the process by allowing you to remotely manage and apply patches to Windows systems enabled with Windows Server Update Services (WSUS). With Scalefusion’s Workflows, you can reduce repetitive tasks, lowering cognitive IT load and ensuring timely patch rollouts. The Windows Patch Management feature allows you to set specific schedules for deploying OS updates and third-party application patches, whether on specific days, times, or at regular intervals. Through its Windows Agent-based Update & Patch Management, Scalefusion automates the assessment, deployment, and updating of third-party applications, providing a proactive approach to security and compliance across managed Windows devices.

8. Remote Monitoring and Management

Scalefusion UEM doubles up as a Remote Monitoring and Management software. This is beneficial for organizations with a large Windows device inventory. As an RMM software, Scalefusion streamlines remote management and helps you proactively monitor and manage employee devices and client endpoints to ensure their best health.

9. Ability to Configure Windows Defender

With Scalefusion MDM, you can easily configure and push Windows Defender policies across all your managed Windows devices, ensuring they are protected from malware and other cyber threats. You can set policies for real-time monitoring, automatic signature updates, and advanced features like cloud protection, allowing you to manage device security seamlessly without manual intervention. This helps to maintain up-to-date protection across your fleet, ensuring your devices are always secured against the latest threats. By using Scalefusion’s integration with Windows Defender, you gain the ability to enforce consistent security policies across your organization, regardless of the location of your workforce. Whether your team is remote, hybrid, or on-site, you can ensure that all devices adhere to the same security standards, giving you peace of mind and simplifying compliance with security regulations. This centralized approach not only enhances security but also improves operational efficiency.

10. Detailed Device Reports and Automated Workflows

Comprehensive reporting and workflow automation are key to effective Windows laptop and desktop management. With Scalefusion’s Reports feature, you can generate detailed reports that provide insights into device health, security incidents, application usage, and compliance status. These reports help identify issues early and ensure devices stay secure and compliant. Windows MDM also offers robust workflow automation, allowing administrators to set up automated actions triggered by specific events. For example, devices exhibiting suspicious behavior can be automatically quarantined, while alerts can be sent for compliance violations, such as outdated software. This ensures timely responses to potential issues. By automating routine tasks, IT admins can focus on more strategic objectives while improving security and operational efficiency. Workflow automation helps mitigate risks by addressing incidents quickly and ensuring devices remain compliant without constant manual oversight.

11. Strong Network Security

With Scalefusion’s Network Security feature, you can ensure that your managed devices only connect to authorized and secure networks. By configuring Wi-Fi and VPN settings, you can enforce secure connections that protect corporate data and resources. For Wi-Fi, you can control user access to Wi-Fi settings within specific apps, as well as enable or disable manual connections to networks. Distributing Wi-Fi profiles allows you to define which networks devices can connect to, ensuring that only secure, approved networks are used for accessing corporate resources. For VPN, you can configure VPN profiles with predefined settings such as server addresses, protocols, and authentication methods. You can also select which apps will operate over the VPN, ensuring that data transfers are securely encrypted. This configuration provides comprehensive security for all connections to corporate networks, safeguarding your organization’s infrastructure.

12. Enhanced Remote Support

Scalefusion’s Remote IT Support offers powerful tools for efficient device management. With Remote Cast and Control, you can view and interact with device screens in real-time, troubleshoot, push or delete files, and capture screenshots or screen recordings—all remotely. This ensures quick resolutions without needing user involvement. The VoIP Calling feature allows you to communicate directly with end users during troubleshooting. It enhances support by letting you guide users through steps, gather issue details, and provide immediate feedback, speeding up issue resolution and improving support quality. Additionally, Remote Commands let you send instructions to devices, such as launching services or installing apps, allowing proactive maintenance. Scalefusion integrates with ITSM tools like Jira and Freshservice, creating support tickets with relevant device information, reducing administrative effort, and speeding up issue resolution.

Step Into The Next Era of Modern Windows Management with Scalefusion UEM

The shift from traditional to modern device management is essential for organizations adopting hybrid, mobile, and cloud-driven work environments. Traditional methods, built for static office networks, are not efficient enough to address the complexities of managing a diverse range of devices, ensuring robust security, and maintaining operational efficiency across remote and hybrid workforces. Modern Device Management solutions, like Scalefusion UEM, offer the agility, scalability, and security needed to manage Windows-based devices effectively in a dynamic digital landscape. By leveraging cloud-based solutions, zero-touch provisioning, automation, and advanced security features, organizations can streamline device management, reduce manual intervention, and enhance both user productivity and security. Scalefusion’s comprehensive Windows management capabilities empower IT admins to maintain full visibility and control over devices, ensuring that they are secure, compliant, and optimized for performance.  

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The Future of Unified Detection and Response: Leveraging AI and Automation to Drive MSP Cybersecurity

As cyber threats grow increasingly sophisticated and relentless, managed service providers (MSPs) play a critical role in defending small and medium-sized businesses (SMBs) from a rising tide of digital dangers. Unified detection and response solutions, driven by advancements in artificial intelligence (AI) and automation, offer a powerful toolset for MSPs to secure their clients while optimizing their resources. This approach not only addresses SMBs’ urgent security needs but enables MSPs to grow their client base sustainably without overextending their resources. By adopting unified detection and response, MSPs can expand their reach, protect more clients effectively, and establish a reputation for resilient, high-quality service.

Key Points to Focus On: 

  • Scalable Security Through AI and Automation: Unified detection and response equips MSPs with the ability to scale their services with efficiency. Automation of crucial threat detection and response functions means MSPs can protect a growing number of clients without increasing team size or risking service quality. With unified detection and response, MSPs can confidently scale operations, driving client growth and meeting increasing demand without compromising their capabilities.
  • Proactive Cyber Defense for Enhanced Protection: With AI-driven tools embedded in unified detection and response solutions, MSPs can monitor network activity around the clock, detecting and preventing emerging threats in real time. This proactive approach allows MSPs to offer a higher level of defense, ensuring their clients feel protected against the evolving threat landscape. Proactive protection strengthens client relationships and differentiates MSPs in a competitive market.
  • Cost-Effective Growth for MSPs: Unified detection and response enables MSPs to expand their businesses in a financially sustainable way. By reducing manual intervention, streamlining workflows, and optimizing resources, MSPs can enhance revenue without a proportional increase in overhead. This creates an affordable, enterprise-grade cybersecurity solution for SMBs while facilitating manageable growth for MSPs.

In an era where cyber threats are increasingly complex and immediate, unified detection and response offers MSPs the tools they need to protect their clients effectively. By integrating AI and automation, MSPs can deliver top-tier cybersecurity solutions at scale, allowing them to grow their businesses while keeping costs manageable. Here’s how AI-powered unified detection and response solutions are revolutionizing the MSP approach to cybersecurity and enabling sustainable growth.

Meeting the Scalability Needs of MSPs

For many MSPs, the ability to scale their business is crucial to staying competitive in today’s market. However, scaling often involves a trade-off between growth and resource availability, making it challenging for MSPs to maintain high-quality service as they take on more clients. Unified detection and response, combined with AI and automation, changes the equation by enabling MSPs to serve more clients without increasing team size or burdening existing resources.

AI and automation allow MSPs to streamline many routine tasks associated with cybersecurity, such as monitoring for suspicious activity, updating policies, and managing alerts. With unified detection and response, MSPs can centralize threat intelligence, which simplifies the response process by reducing the number of tools needed and enhancing efficiency. Instead of managing multiple, disconnected systems, teams can leverage a unified platform that enhances speed, reduces complexity, and improves focus. This holistic approach allows MSPs to expand their client rosters and serve each client’s security needs comprehensively and efficiently.

Building a Proactive Cyber Defense Framework

The modern cyber threat landscape is dynamic and highly adaptive, posing significant challenges for SMBs and MSPs alike. Traditional, reactive security measures struggle to keep up with the rapid pace of cyber threats, leaving businesses vulnerable to attack. Unified detection and response, powered by AI, introduces a proactive defense strategy that allows MSPs to identify and neutralize threats before they have a chance to impact client networks.

AI-driven tools in unified detection and response solutions continuously monitor client environments, assessing behavior patterns, identifying anomalies, and flagging potential threats as they arise. This real-time analysis enables MSPs to react quickly and precisely to emerging risks. Moreover, by learning from each incident, AI systems become better equipped to identify similar threats in the future, creating an adaptive layer of defense that evolves with the threat landscape. For MSPs, this proactive approach means they can reassure clients that they’re protected by a sophisticated, always-evolving security strategy, fostering long-term trust and partnership.

Cost-Effective Growth for MSPs

One of the most attractive benefits of unified detection and response for MSPs is the ability to grow their business without a proportional increase in operational costs. Typically, expanding a cybersecurity practice requires investments in additional personnel, technology, and infrastructure. However, with AI and automation-driven unified detection and response, MSPs can achieve this growth in a more cost-effective manner.

By automating time-consuming tasks and reducing manual intervention, unified detection and response minimizes overhead and allows MSPs to maintain profitability as they scale. This efficiency allows MSPs to offer comprehensive, enterprise-level security to their clients at a price point accessible to SMBs. As a result, MSPs can expand their client base and grow revenue streams while keeping costs low, creating a sustainable model that supports both business growth and high-quality service delivery.

The Impact of AI on Cybersecurity for MSPs

Artificial intelligence is transforming unified detection and response by making cybersecurity solutions smarter, faster, and more adaptable. AI systems can process massive amounts of data at high speed, analyzing network activity, detecting anomalies, and assessing risk factors in real time. By rapidly sifting through this data, AI can identify potential threats that human analysts might miss, offering a level of detail and precision that enhances MSPs’ security capabilities.

Additionally, AI’s ability to learn from each incident and adapt to new information creates an evolving security framework that stays relevant in an ever-changing threat landscape. This continuous learning process improves the accuracy of threat detection and response over time, making security more proactive and less reliant on manual input. For MSPs, AI-driven solutions reduce the need for constant oversight, allowing their teams to focus on strategic tasks rather than day-to-day threat management. By speeding up response times and improving detection accuracy, AI enables MSPs to offer clients a more robust security solution, bolstering their reputations as trusted cybersecurity partners.

Guardz: Committed to Empowering the MSP Community

At Guardz, we understand the unique challenges and opportunities that MSPs face in today’s cybersecurity landscape. Our mission is to empower MSPs by providing cutting-edge cybersecurity solutions tailored to their specific needs, and our close engagement with the MSP community allows us to stay attuned to the evolving requirements of this field. Guardz’s approach to unified detection and response integrates AI and automation to help MSPs deliver exceptional protection while managing their resources efficiently. Through continuous collaboration, dedicated support, and a deep commitment to innovation, Guardz is a trusted partner to MSPs, helping them grow their client bases, deliver unparalleled security, and drive lasting success in a fast-paced digital world.

Unified detection and response represents a transformative opportunity for MSPs to achieve scalable, effective cybersecurity that meets the demands of today’s threat landscape. By embracing AI and automation, MSPs can build proactive, adaptive defenses for their clients, expand their client base sustainably, and maintain cost-effective growth. Guardz stands ready to support the MSP community with the tools, insights, and expertise needed to turn these possibilities into realities, empowering MSPs to lead the future of cybersecurity.

About Guardz
Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How to set up and manage passkeys for your PayPal account

First of all, what are passkeys?

Passkeys are a new, highly secure authentication method developed with the help of the FIDO Alliance. The goal is to help people log in to their accounts more safely and easily than with traditional passwords.

To achieve this, passkeys combine biometric verification (like your fingerprint) with cryptographic keys to provide a secure login option that can be activated with just a touch. Unlike passwords, passkeys can’t be guessed, making them resistant to phishing and brute-force attacks. That’s why they offer the perfect blend of security and convenience.

How to create a passkey for your PayPal account

Setting up a passkey for your PayPal account is a simple process that takes about 5 minutes. Here’s how to do it:

  1. Go to PayPal’s Help Center, locate the section on passkeys, and open the link to the “Passkey Creation” page.

  2. Log in to your PayPal account with your PayPal password.

  3. Authenticate your device using your fingerprint, facial recognition, or device password.

  4. Follow the on-screen instructions to complete the setup of your passkey.

 

How to log in to PayPal with a passkey

Once you create a passkey for your PayPal account, you can log in quickly and securely. Here’s how:

  1. Launch the PayPal app and enter your email address on the login screen.

  2. If you’re using the device you created the passkey on, it will automatically trigger the passkey login. If you’re on a different device, select “Other options,” then “Passkey from a nearby device,” and finally, scan the QR code displayed on your screen using the device with your passkey.

  3. Unlock your device using your preferred biometric (Face ID, Touch ID), PIN, or password to complete the passkey login.

How to manage your PayPal account passkey

At any moment, you can review or remove the passkeys you’ve created for your PayPal account.

Review your passkey

You can easily review your passkeys by going to your account settings and opening the “Passkey Management” page. From there, you can disable, update, or remove any of the passkeys linked to your PayPal account.

Delete your passkey

To delete a passkey, follow these steps:

  1. Go to the “Passkey Management” page.

  2. Find the passkey you want to delete.

  3. Click “Remove this passkey.”

  4. Confirm the action.

Important: if you remove your passkey via PayPal settings, it won’t automatically be deleted from your device. So, to fully remove it, you’ll also need to go to your device settings and delete it there too.

Store and manage your passkeys with NordPass

If you’re looking to add even more security and convenience to your login experience, NordPass is the perfect tool to store and manage your passkeys. While it’s known as a password manager, NordPass also lets you create, store, and organize passkeys for all your online accounts, keeping everything safe in one place. You can even share your passkeys with others or use them alongside your current password for an added layer of protection with two-factor authentication (2FA).

Haven’t tried passkeys yet? Use NordPass to create your first ones and see just how easy and secure logging into your accounts can be.

Frequently Asked Questions (FAQ)

How do I know if a passkey is available for my PayPal account?

It’s easy to check if you can use passkeys with your PayPal account. Simply visit PayPal’s “Passkey Creation” page on your device and try to create a passkey. If the option isn’t available, you’ll be notified that passkeys are not currently available for use with your account.

How do I use my existing passkey for PayPal across all my devices?

If you’d like to log in with a passkey on a device other than the one where it’s stored, simply select the “Passkey from a nearby device” option during login and follow the prompts. However, to access your passkey across all your devices, you’ll need a solution like NordPass. It securely stores your passkeys in an encrypted storage, ensuring you can access them from any device.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

ESET Research discovers Mozilla and Windows zero day & zero click vulnerabilities exploited by Russia-aligned RomCom APT group

  • ESET researchers discovered two previously unknown vulnerabilities, one in Mozilla and the other in Windows, being exploited by the Russia-aligned RomCom Advanced persistent threat (APT) group.
  • Analysis of the exploit led to the discovery of the first vulnerability, now assigned CVE-2024-9680: a use-after-free bug in the animation timeline feature in Firefox. ESET reported the vulnerability to Mozilla on October 8, 2024; it was patched within a day.
  • This critical vulnerability has a score of 9.8 out of 10.
  • Further analysis revealed another zero-day vulnerability in Windows: a privilege escalation bug, now assigned CVE 2024 49039, that allows code to run outside of Firefox’s sandbox. Microsoft released a patch for this second vulnerability on November 12, 2024.
  • The two zero-day vulnerabilities chained together armed RomCom with an exploit that requires no user interaction other than browsing to a specially crafted website.
  • Potential victims who visited websites hosting the exploit were located mostly in Europe and North America.

MONTREAL, BRATISLAVANovember 26, 2024 — ESET researchers discovered a previously unknown vulnerability, CVE-2024-9680, in Mozilla products, exploited in the wild by Russia-aligned APT group RomCom. Further analysis revealed another zero-day vulnerability in Windows: a privilege escalation bug, now assigned CVE-2024-49039. In a successful attack, if a victim browses a web page containing the exploit, an adversary can run arbitrary code – without any user interaction required (zero click) – which in this case led to the installation of RomCom’s backdoor on the victim’s computer. The backdoor used by the group is capable of executing commands and downloading additional modules to the victim’s machine. The Mozilla-related critical vulnerability discovered by ESET Research on October 8 has a CVSS score of 9.8 on a scale from 0 to 10. In 2024, RomCom struck in Ukraine and other European countries, as well as the United States. According to our telemetry, from October 10, 2024 to November 4th, 2024, potential victims who visited websites hosting the exploit were located mostly in Europe and North America.

On October 8, 2024, ESET researchers discovered vulnerability CVE-2024-9680. It is a use-after-free bug in the animation timeline feature in Firefox. Mozilla patched the vulnerability on October 9, 2024. Further analysis revealed another zero-day vulnerability, in Windows: a privilege escalation bug, now assigned CVE 2024 49039, that allows code to run outside Firefox’s sandbox. Microsoft released a patch for this second vulnerability on November 12, 2024.

The vulnerability CVE-2024-9680 discovered on October 8 allows vulnerable versions of Firefox, Thunderbird, and the Tor Browser to execute code in the restricted context of the browser. Chained with the previously unknown vulnerability in Windows, CVE-2024-49039, which has a CVSS score of 8.8, arbitrary code can be executed in the context of the logged-in user. Chaining together two zero-day vulnerabilities armed RomCom with an exploit that requires no user interaction. This level of sophistication demonstrates the threat actor’s intent and means to obtain or develop stealthy capabilities. Furthermore, successful exploitation attempts delivered the RomCom backdoor in what looks like a widespread campaign.

RomCom (also known as Storm-0978, Tropical Scorpius, or UNC2596) is a Russia-aligned group that conducts both opportunistic campaigns against selected business verticals and targeted espionage operations. The group’s focus has shifted to include espionage operations collecting intelligence, in parallel with its more conventional cybercrime operations. In 2024, ESET discovered cyberespionage and cybercrime operations of RomCom against governmental entities, defense, and energy sectors in Ukraine, the pharmaceutical and insurance sectors in the US; the legal sector in Germany; and governmental entities in Europe.

“The compromise chain is composed of a fake website that redirects the potential victim to the server hosting the exploit, and should the exploit succeed, shellcode is executed that downloads and executes the RomCom backdoor. While we don’t know how the link to the fake website is distributed, however, if the page is reached using a vulnerable browser, a payload is dropped and executed on the victim’s computer with no user interaction required,” says ESET researcher Damien Schaeffer, who discovered both vulnerabilities. “We would like to thank the team at Mozilla for being very responsive and to highlight their impressive work ethic to release a patch within a day,” he adds. Each vulnerability was fixed by, respectively, Mozilla and Microsoft.

This is at least the second time that RomCom has been caught exploiting a significant zero-day vulnerability in the wild, after the abuse of CVE-2023-36884 via Microsoft Word in June 2023.

For a more detailed analysis and technical breakdown of the discovered vulnerabilities, check out the latest ESET Research blogpost “RomCom exploits Firefox and Windows zero days in the wild” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X) for the latest news from ESET Research.

Heatmap of potential victims

 

 

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

VPC best practices: How to secure access and strengthen your cloud

Summary: VPC best practices help keep your cloud safe. Set up secure configurations, control access, monitor traffic, and encrypt data. Regular reviews improve security and performance.

Virtual private clouds (VPCs) are virtualized cloud environments hosted on public cloud infrastructure. We use VPCs to create self-contained cloud environments with robust security protection. If you need to guard sensitive data or segment cloud assets, VPC solutions could be the best option.

A VPC also has financial benefits. When we compare virtual private cloud vs. private cloud solutions, virtualized hosting almost always cuts costs (and often improves performance).

If you choose to deploy a VPC, it’s vital to do so securely. VPCs are always vulnerable without the correct access controls and other security measures. This article will explore VPC security in more depth, including VPC security best practices to lock down your cloud-hosted assets.

Importance of securing VPC

VPC security matters because cloud security failures have dire consequences. Cloud attacks are also increasingly common. According to IBM’s Cost of a Data Breach Report 2024, 82% of breaches involved cloud-stored data.

In the same year, companies admit losing over 1 billion customer records to data thieves. One of the largest attacks targeted cloud data hosting company Snowflake, leaking records from AT&T, Ticketmaster, and even banking giant Santander.

Not all cloud deployments are equal. Comparisons between private cloud and public cloud solutions show that private cloud deployments protect data more efficiently. And virtual private clouds can be even more robust. Even so, unsecured cloud data is always at risk.

Despite these risks, confusion remains about who handles VPC security. Many companies assume their cloud vendor handles all security, so they set up their cloud service and forget about it. This is a mistake. Cloud security is a shared responsibility.

Vendors secure underlying infrastructure, including barriers between VPC instances. Users must secure access to cloud-hosted assets, including VPCs. Without robust controls, outsiders can breach VPCs and easily access data.

 

VPC best practices for security

Securing every VPC is critically important. There is no room for complacency, whether you handle protected health information or financial records. Fortunately, you can cut data breach risks by applying VPC security fundamentals.

What is VPC security all about? The list below includes security best practices to guide your virtual cloud deployment.

1. Configure your VPC securely

VPC security begins with configuration settings, including network segmentation, route tables, and network access control lists (NACLs).

VPC architecture enables basic segmentation via classless inter-domain routing (CIDR) blocks and subnets. CIDR blocks specify the number and range of allowable IP addresses on each VPC. Subnets are logically connected groups of IP addresses within the VPC and can be public or private.

A public subnet retains direct internet connectivity, creating an access risk if the subnet relates to sensitive resources. A private subnet lets you separate sensitive resources from other VPC assets and the public internet. This is a more secure VPC design solution.

VPC configuration should also consider the role of route tables and access control lists. These tools filter access requests and complement each other in VPC architecture.

Route tables record IP addresses linked to private subnets. They route traffic to connected assets, preventing general access to other resources.

Network access control lists (ACLs) define which users can enter a VPC subnet. When creating a VPC, check the default ACL settings. Most platforms allow all inbound and outbound traffic. Custom ACLs let you approve legitimate users, adding an extra layer of network security.

Finally, security groups logically group users and VPC assets. They also tend to have default settings that you can customize as needed. Check port, protocol, and IP addresses, and modify default security group configurations to suit your needs.

2. Securing access

Securing access is probably the most important VPC security best practice. Identity and Access Management (IAM) for VPCs includes internal and external controls. Both are critical in VPC security.

Internal controls define how users act inside the VPC perimeter. Platforms like Amazon Web Services use security groups to assign permissions for all users. Following the principle of least privilege (PoLP), permissions should enable access to essential resources while blocking access to everything else.

Access controls must also filter traffic originating outside the VPC.

NordLayer can help you manage external VPC access by network users. Our tools allow VPC users to implement flexible, lightweight, yet powerful controls for all users. VPN coverage links to VPC private gateways, concealing endpoints from external actors.

Remote workers can connect securely via our site-to-site VPN that encrypts VPC connections. Device posture management approves only compliant user devices, while multi-factor authentication guards against common credential theft attacks.

Secure API access is also vital. Services like AWS VPC Link create secure gateways for API calls. Avoid exposed VPC endpoints at all costs, as API exploits are a common route into cloud environments.

3. Monitor traffic on your VPC

In most cases, cloud service providers offer built-in security monitoring tools as part of the package. Reliable VPC traffic monitoring tracks security threats, unexplained behavior, and possible performance issues. VPC flow logs allow you to achieve these goals.

Flow logs record IP traffic within VPC perimeters. You can link them to specific security groups and track metrics like refused connection requests. With high-quality tracking data, you can detect intrusions rapidly and take action to protect critical data.

When this type of monitoring is not provided by default, clients can turn to third-party providers for more support.

VPC flow logs also help you diagnose security group configuration issues. Flow data helps detect excessively restrictive group identities that block vital traffic.

VPC users should also take advantage of monitoring integrations where possible. CloudTrail and CloudWatch are, for example, specific AWS services that provide logging and monitoring, respectively, within AWS environments.

  • CloudWatch makes flow logs even more powerful, offering real-time alerts and data insights. Use it to create customized security rules for resources and monitor performance at a granular level.
  • CloudTrail generates activity logs across the VPC. This makes it vital for accurate audits and tracing of malicious user requests.

4. Use secure VPC peering

A VPC peer link enables you to connect many VPCs for data transfers, load balancing, or to ensure optimal performance. Peering establishes a direct VPC peer link via private IPv4 or IPv6 addresses. This boosts security as a VPC peer link does not rely on the public internet to connect resources. Data flows stay within secure VPC boundaries.

Use peering to connect applications or to create secure links with other VPCs (for instance, systems managed by third-party suppliers).

When peering VPCs, check that route tables comply with your security policies. Limit routing to private subnets, instead of allowing direct connections between the CIDR blocks of VPC peers.

5. Encrypt data within the VPC

Encryption should protect data at rest within VPCs and data in transit between VPCs or across the network perimeter. VPC platforms like IBM or Amazon AWS provide native encryption for at-rest data. Users can manage encryption keys, deciding who can decrypt data and who is denied access.

VPC platforms generally do not encrypt traffic entering or leaving the VPC. This is the user’s responsibility, and there are a couple of options.

Firstly, AWS offers Direct Connect. This creates secure direct connections to AWS private gateways. Direct connections do not use the public internet. They tend to have low latency, ensuring high speeds and reliability.

Cloud and site-to-site VPNs could be better solutions. This can cause confusion, as users sometimes incorrectly oppose VPC vs. VPN technology. VPNs create encrypted tunnels for inbound and outbound data. They complement VPCs by securing connections over the public internet.

For example, NordLayer’s business VPN creates secure connections to VPCs over the public internet. This suits remote workers, providing flexibility and secure connectivity.

Always-on VPN functionality also encrypts every connection to the VPC. There are no loose ends. Users share the same encrypted tunnel, no matter where they log on.

6. Optimize cost and performance

Performance and cost optimization assist security by limiting the number of exposed endpoints and allowing only essential network traffic.

Here are some suggestions to keep the cost of VPC deployments down:

  • Plan the size and number of VPCs. Leave some room for growth, but don’t buy more capacity than you reasonably need. Most solutions enable scaling as your operations expand, and excess capacity can be costly.
  • Don’t add extra VPCs if VPC sharing works. Sharing works well when you need to segment resources at an account level. New VPCs should logically segment your business resources. You don’t need a VPC for each team.
  • Minimize the need for NAT gateways. VPC hosts charge for additional gateways, and every extra endpoint raises data breach risks. Centralized private gateways are more secure and probably more cost-effective. Low-risk assets can also sit behind public gateways – which incur very low or zero fees.
  • Manage the use of IP addresses in your VPC. Elastic IPs and standard IP addresses incur extra costs. Ensure you utilize all assigned IP addresses. This doesn’t just cut costs. It also limits the scope for external cyber-attacks.
  • Business VPNs also reduce overall security costs. Amazon charges a fee for VPN coverage or Direct Connect. You can achieve comparable security via NordLayer’s VPN (which covers other network assets as well).

Optimizing traffic is just as important, allowing you to monitor data transfers and user activity on each VPC (and cutting costs).

  • Use IP management tools to keep tabs on assigned and unused addresses.
  • Keep low-risk workload components within the same Availability Zone. This cuts the need for expensive data transfers.
  • Use multiple Availability Zones to host critical assets. Redundancy hedges against AZ outages, keeping resources available at all times.
  • Take advantage of flow logs to detect bottlenecks or routing issues.

Ensure secure cloud access with NordLayer

Whatever deployment type you choose, NordLayer can help secure access to VPC environments with features like Site-to-Site VPN. Employees can connect securely to VPC through Virtual Private Gateways, whether working from the office, home, or other remote locations. The connection is encrypted, and users’ personal IP addresses stay masked for added privacy.

Additional security features include multi-factor authentication (MFA), Device Posture Security to block unauthorized devices, and Cloud Firewall to create network access rules. These tools ensure that only authorized users and devices can reach your VPC without requiring Direct Connect or AWS VPN.

To find out more, check out NordLayer’s pricing page or get in touch with our Sales Team to discuss VPC solutions.

Alternatively, why not sign up with NordLayer as an MSP partner? Our partner program generates consistent revenues for members. As a cybersecurity partner, you will also benefit from NordLayer’s security expertise. Earn revenue and improve your VPC security posture by signing up today.

 

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×