THINK CLOUD'S NEW CYBERSECURITY SOFTWARE
Think Cloud's New Cybersecurity Software
Your new cybersecurity upgrade
Your new cybersecurity platform blocks attacks 24/7 before they can cause harm, stopping malicious files or applications from running on your devices. Unlike traditional security tools that react only after a threat is detected, we now use a zero-trust approach to lock down your systems and protect your business from evolving cyber‑attacks.
Why are we upgrading your cybersecurity?
At Think Cloud, we’ve evolved from relying on a reactive security approach, detecting and responding to threats after they occur, to adopting a fully proactive defence strategy. By adopting a zero-trust security approach, we’re now able to prevent threats from executing in the first place.
This shift reflects our commitment to being more than just an IT provider. We’re your dedicated IT partner, focused on delivering the highest level of protection and ensuring your business stays secure, resilient, and ahead of emerging cyber risks.
What impact does it have on you?
As part of our transition to a zero-trust approach, you’ll notice a small but important visual change on your device. We’ll be replacing the old security icon with a new icon as seen below. When you see the new logo on your machine, this simply means the new cybersecurity is now active and blocking unauthorised files or applications.
Because we use a zero-trust approach, applications or files will be blocked if they change, demonstrate risky behaviour, or present any potential security threat. This is completely normal, not an error. It’s how the system keeps you safe by preventing unknown or unauthorised applications or files from running.
To make things easier, we’ve included a guide below for Mac devices that explain:
How to request approval for applications or files you need
Where to find your blocked items so you can quickly see what has been stopped and why
These steps ensure you stay fully secure while still being able to access the tools you need to do your job.
Mac How to Guide
How to request approval for software
Step 1: When you are trying to access an application or file you may see this notification pop up
Step 2: Click options, then click request access to be able to request to use the application or file you are trying to access
Step 3: Enter your escalation notes and add your email for notifications
Step 4: Click send a request
Step 5: Our Cyber Heros will review the request and providing the application or file is a legitimate business request it should be resolved within the hour. If the request is something new to the business or there may be potential risks with the request, we will contact you to discuss the reason for having the application or file.
Where are blocked items?
Step 1: Select the logo in the menu bar
Step 2: Navigate to blocked items
Step 3: Select “view” to access the approval portal to request approval for your application or file
Step 4: Enter your escalation notes and add your email for notifications
Step 5: Click send a request
Step 6: Our Cyber Heros will review the request and providing the application or file is a legitimate business request it should be resolved within the hour. If the request is something new to the business or there may be potential risks with the request, we will contact you to discuss the reason for having the application or file.
Do you need help? Contact Us!
If you have any questions during the rollout, please contact Dean via 01482 333505 or book a meeting here.