Productivity apps and messaging security
Get the latest news and information about messaging security risks and protecting productivity applications in the enterprise. Stay up to speed on flaws in Adobe, Microsoft, and Apple applications and learn how to secure productivity applications.
New & Notable
Productivity apps and messaging security News
-
July 08, 2020
08
Jul'20
Microsoft seizes malicious domains used in COVID-19 phishing
Microsoft went to court to seize several malicious domains that were used by cybercriminals in extensive phishing and BEC attacks on Office 365 accounts amid the current pandemic.
-
April 09, 2020
09
Apr'20
Risk & Repeat: Are Zoom security fears overblown?
This week's Risk & Repeat podcast looks at the backlash against Zoom over security and privacy concerns and asks whether there's been an overreaction.
-
April 06, 2020
06
Apr'20
Zoom takes new security measures to counter 'Zoombombing'
Zoom has implemented two key security and privacy measures in order to counter 'Zoombombing.' One enables passwords in meetings by default, while the second creates waiting rooms.
-
April 02, 2020
02
Apr'20
Risk & Repeat: Zoom security comes under fire
This week's Risk & Repeat podcast looks at several security issues Zoom faced over the last week, which led to questions about the company's privacy and security practices.
Productivity apps and messaging security Get Started
Bring yourself up to speed with our introductory content
-
Application, database and data security quiz
Are you up to speed with database and application security know-how? Test your comprehension of best practices, emerging threats and more with this data security quiz. Continue Reading
-
AI-powered cyberattacks force change to network security
Companies now face sophisticated enemies using AI and machine learning tools for their attacks. It's a world of new dangers for those defending network systems and data. Continue Reading
-
Plan now for the future of network security
How to battle well-funded, technologically sophisticated threats and ensure high-quality network performance? CISOs need a plan to meet network challenges now and in the future. Continue Reading
Evaluate Productivity apps and messaging security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
How security champions can help, despite working remotely
By effectively using collaboration tools, security champions can still spread a company's security message even as most offices stay closed and employees work remotely. Continue Reading
-
How to beef up Office 365 email security features
Companies looking to fortify their Office 365 email security can assess options from a variety of third-party vendors. Find out which features are the most important. Continue Reading
-
To secure Office 365, take advantage of controls Microsoft offers
Securing Office 365 properly requires addressing upfront any specific risks of a particular environment and taking advantage of the many security controls Microsoft offers. Continue Reading
Manage Productivity apps and messaging security
Learn to apply best practices and optimize your operations.
-
8 video conferencing security and privacy best practices
Video conferencing tools are a remote worker's lifeline. As such, it is essential to maintain their security. These eight best practices will help ensure secure, private video-enabled meetings. Continue Reading
-
Security testing web applications and systems in the modern enterprise
Security testing web apps with little budget and poor documentation is difficult. Ric Messier discusses building a security testing lab in the DevSecOps, cloud and automation age. Continue Reading
-
RPA security best practices include access control, system integration
Robotic process automation can revolutionize enterprise workflows, but if RPA security risks aren't controlled, bots could end up doing more harm than good. Continue Reading
Problem Solve Productivity apps and messaging security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Enterprise cybersecurity hygiene checklist for 2020
Cybersecurity hygiene in the enterprise must be a shared responsibility between employees and employers. Follow these steps to get the job done by both. Continue Reading
-
Build shadow IT policy to reduce security risks
Security risks have increased during the pandemic as remote workers try to get things done. Find out how CISOs can better manage by creating a shadow IT policy. Continue Reading
-
How a security researcher spots a phishing email attempt
When security expert Steven Murdoch spotted a phishing email in his inbox, the researcher in him decided to investigate. Here's what he learned about criminal phishing tactics. Continue Reading