Teams | Collaboration | Customer Service | Project Management

Latest Posts

Mentions - get the attention in a busy chat

Group conversations can get noisy – new ideas, status updates, answers to questions, the occasional joke. It can be easy to miss important info, or a question directed at you. The new mentions functionality highlights your name visually and makes it easy to scan the text and find the sections relevant to the reader. Searching for "@My Name" (replace it with your actual name, of course) returns all mentions of you giving everyone another way to search and filter the most important messages.

Stakeholder communications during a crisis

When Maersk, a global leader in shipping and logistics, was hit by the NotPetya ransomware attack in 2017, it not only found itself unable to manage day-to-day operations efficiently, but also unable to effectively inform the markets and its stakeholders of its response. Combined, the financial impact of NotPetya on Maersk is estimated to have exceeded USD$300m.

The recovery period following a major network incident can be the most risky

Whether it’s a malicious cyber attack, or a complete system outage; when disaster hits your network the immediate priority is to maintain business operations and resolve the issue. However, what you might not realize is that during this recovery period your business could be at even greater risk of a data breach, or malicious attempts to eavesdrop on your confidential discussions!

Every business needs a crisis collaboration solution

Has your business chosen an appropriate communication and file sharing tool that can be relied upon in the event of a complete network shutdown? While many businesses maintain a business continuity plan to help them assess potential threats to their organizations, surprisingly few specify the communications tools that should be used in the event of malicious cyber attack (or other a system outage), that renders the corporate network unavailable.

Greatest challenge to secure enterprise messaging = employee education

For CIOs and IT teams, the debate over which secure enterprise messaging app to use is typically fought over the level of security on offer. However, for business users, the decision is often less clear, and typically the result of poor understanding. New research has highlighted that many people remain unclear over the level of protection offered by secure, end-to-end-encrypted (E2EE) messaging apps, when compared to basic services such as SMS text messaging (and even phone calls).

Do mobile messaging apps have a role in government and the public sector?

The answer is: “Yes, but it depends on the app being used!”. Public sector employees are no different to their private-sector counterparts in that they’re demanding more modern, mobile solutions for collaboration and communication. However, without clear direction from ICT leaders, many are becoming reliant on consumer-grade tools that put data, and digital compliance, at risk.

The enemy within

Any talk of security usually defaults to external threats. But what about threats from inside of your firewall? How often do you consider those? Of course, no one likes to think of their employees as untrustworthy, but the reality is that employees are responsible for 54% of data breaches. And while many of these threats are simply down to negligence (an employee being compromised by a phishing attack, for cexample), a large amount involved malicious intent.

Protect your organization from a Business Email Compromise attack

Imagine the scenario. Your most valued client receives an email from you requesting an invoice payment. Being the great client that they are it’s processed promptly! The trouble is, that email wasn’t really from you. It was sent from a cyber attacker who’d gained access to your corporate network and spoofed your identity – tricking your client into making payments into criminal accounts.