Teams | Collaboration | Customer Service | Project Management

Security

Wire Tracks Turbo-charged Growth with Security at the Forefront

As the need for secure and effective collaboration tools rises globally, Wire, the most secure collaboration platform, tracks turbo-charged growth in Q1 2020, driving upward trajectory into Q2. Leading with security as the key building block of its flexible collaboration platform, Wire added 200 new enterprise customers in April alone, reaching a total of over 1,200 paying enterprise customers as of its calendar first quarter.

How Do You Solve a $6 Trillion Problem?

Because the global economy has transitioned from manufacturing to one based in knowledge, cyberattacks are now the fastest-growing crime in the world and are expected to cost businesses and governments $6 trillion a year by 2021. Today, a company’s most valuable assets are its intellectual property and proprietary data.

The Risks of Shadow IT during Lockdown

In recent weeks, circumstances around the Covid-19 crisis have meant that companies have had to pivot quickly to remote working. The trouble is, many organizations didn’t have a plan in place for this change. It’s understandable that they’d want to turn to market-ready, widely available tools to collaborate quickly from anywhere, however, there’s a real danger of cobbling together your business collaboration stack using consumer-grade tools.

Teramind Named in the Gartner 2020 "How to Choose Between Enterprise DLP and Integrated DLP Approaches" Report

The Report Sheds Light on Data Loss Prevention Challenges and Identifies the Use Cases for Integrated DLP vs. Enterprise DLP Solutions. A recent report published by Gartner titled “How to Choose Between Enterprise DLP and Integrated DLP Approaches” (Gartner subscription required) found that “the data loss prevention market includes products with DLP capabilities integrated in security products or SaaS applications, as well as cohesive enterprise DLP suites.

How to Build a Remote Security Mindset

Millions of employees are now working from home as a result of the COVID-19 pandemic. Meanwhile, business is booming for cybercriminals: We’re seeing a recent and unprecedented surge in successful cyberattacks. Worse, the cost of those attacks is climbing exponentially and is expected to hit as much as $6 trillion annually by next year. To address the problem, executives must reexamine their assumptions about security and the systems they have relied upon in the past.

Video Conferencing - A trade-off between Privacy and Usability?

Zoom is currently undergoing a lawsuit regarding illegally disclosing user data to third parties, including Facebook. “According to the suit, Zoom’s privacy policy doesn’t explain to users that its app contains code that discloses information to Facebook and potentially other third parties.” What lessons should companies take away when investing in tools like zoom?

COVID-19: Accelerating the Future of Work

As remote work becomes the 'new normal' for many around the world, the security threats resulting from the rapidly changing work conditions are posing an unprecedented challenge for businesses. The immediate need to shift work conditions left organizations scrambling to institute remote working policies with many executives unprepared to roll out the right tools and procedures securely and at scale. However, for companies it's not just about being prepared for a global pandemic.

Wire named High Performer in G2 Crowd

First - a big thank you to all of our customers and partners who continuously show support and share their experience using Wire. When we launched Wire as the most secure collaboration platform, we were hoping the reception of the platform would be positive. We were not expecting to move from "Niche Vendor" to High Performer in such a short time.

How to spot a phishing attack

The average office worker receives 121 emails per day. When faced with information overload such as this, it can be easy to let your guard down and fall for a phishing attack. Phishing is one of the largest security threats out there. They take many different forms and often resemble the types of communications you receive every day — internal team communications, special offers from your favorite companies, or specific emails that pertain to your role (support tickets, leads, incidents, etc.).