Collaboration and communication security
With persistent security risks that continue to evolve, unified communications security mechanisms -- such as end-to-end encryption, meeting access management and content sharing security -- can help safeguard business data.
Top Stories
-
Tip
21 Aug 2024
The ultimate contact center security checklist
If customers know organizations can keep their data safe in the contact center, they have more positive experiences. This checklist of best practices can help establish that trust. Continue Reading
By- Scott Sachs, SJS Solutions
-
Tip
22 Apr 2024
AI, toll fraud and messaging top the list of UC security concerns
AI might get all the attention, but IT leaders are also concerned about some other key security vulnerabilities within their unified communications platforms. Continue Reading
By- Irwin Lazar, Metrigy Research
-
Tip
22 Apr 2024
AI, toll fraud and messaging top the list of UC security concerns
AI might get all the attention, but IT leaders are also concerned about some other key security vulnerabilities within their unified communications platforms. Continue Reading
By- Irwin Lazar, Metrigy Research
-
News
09 Apr 2024
Google adds generative AI, video creation to Workspace
The tech giant strengthened its workplace productivity and collaboration platform with new artificial intelligence capabilities and the ability to create videos. Continue Reading
By- Shaun Sutner, News Director
-
Definition
02 Feb 2024
communications security (COMSEC)
Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written information that is transmitted or transferred. Continue Reading
By- Paul Kirvan
- Ben Cole, Executive Editor
-
Answer
19 Jan 2024
Can Microsoft Teams chat be monitored?
The quick answer is yes -- IT administrators can monitor employees' messages in Microsoft Teams. But organizations need the proper license plans and policies in place. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
30 Nov 2023
wiretapping
Wiretapping is the surreptitious electronic monitoring and interception of phone-, fax- or internet-based communications. Continue Reading
By -
Feature
16 Nov 2023
Ensuring collaboration tool compliance and governance
Collaboration tool compliance and governance have grown increasingly complex as organizations adopt cloud-based tools that generate different types of content and data. Continue Reading
By- Katherine Finnell, Senior Site Editor
-
Tip
19 Oct 2023
How to build a content governance model
With a proper content governance model, organizations can improve their content marketing efforts, benefit their SEO rankings and reach larger audiences. Continue Reading
By- Laurence Hart, CGI Federal
-
Tip
06 Oct 2023
Collaboration security and governance must be proactive
Even as companies deploy more collaboration tools, they aren't keeping pace with effective governance strategies for these tools and their generated content. Continue Reading
By- Irwin Lazar, Metrigy Research
-
Definition
27 Sep 2023
dual SIM phone
A dual SIM phone is a mobile phone, typically a smartphone, with the capacity to use two subscriber identity module (SIM) cards. Continue Reading
-
Definition
22 Sep 2023
real-time communications (RTC)
Real-time communications (RTC) is any mode of telecommunications in which all users can exchange information instantly or with negligible latency or transmission delays. Continue Reading
By- Kinza Yasar, Technical Writer
- Alissa Irei, Senior Site Editor
-
News
29 Aug 2023
Microsoft Teams attack exposes collab platform security gaps
Criminal and state-sponsored hackers are ramping up cyberattacks on instant messaging platforms and other workplace collaboration tools. Meanwhile, enterprises' readiness lags. Continue Reading
By- Shaun Sutner, News Director
-
News
25 Jul 2023
DocuSign launches AI-backed live video ID verification tool
The e-signature vendor's new AI-supported identity confirmation tool uses biometrics and live video to verify signers' identity and physical presence at the time of signing. Continue Reading
By- Mary Reines, News Writer
-
Tip
07 Jul 2023
How IT departments structure collaboration management
Today, there are countless apps used to communicate across companies. IT departments are taking two approaches to organize the teams responsible for collaboration deployments. Continue Reading
By- Irwin Lazar, Metrigy Research
-
Feature
27 Jun 2023
Collaboration tool sprawl challenges and how to address them
Using multiple communication and collaboration tools can cause productivity headaches. There are steps IT can take to avoid these issues and manage collaboration tool sprawl. Continue Reading
By- Mélanne Ghahraman, TechTarget
-
Definition
21 Jun 2023
Nessus
Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. Continue Reading
By -
News
08 Jun 2023
Cisco generative AI heads to Security Cloud, Webex
Cisco plans to release generative AI features in the Webex platform and Security Cloud this year. Together, the products tighten security for remote workers. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
31 May 2023
Top 6 UCaaS benefits for businesses
More organizations are recognizing the benefits of the cloud and making the jump to UCaaS. Learn the six business benefits of UCaaS -- and the potential drawbacks. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Definition
30 May 2023
eavesdropping
Eavesdropping is the act of listening to, recording or intercepting private communications. Continue Reading
By- Robert Sheldon
- Gary Audin, Delphi Inc.
-
Tip
18 May 2023
4 key unified communications security threats to watch for
Keeping your unified communications system safe requires tools that are specifically geared to voice and video apps. Learn how to take a multilayered approach to UC security. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Feature
26 Apr 2023
Microsoft and Cisco certification deepens interoperability
These UC blogs review Microsoft's and Cisco's latest integrations and the business strategy driving them, as well as how to ensure collaboration security in the workplace. Continue Reading
By- Mélanne Ghahraman, TechTarget
-
Tip
19 Apr 2023
Tips to avoid a bumpy Exchange 2010 migration to Office 365
Now that Exchange Server 2010 and Exchange 2013 are legacy products, administrators should make the push to migrate to avoid becoming the next ransomware target. Continue Reading
By- Helen Searle-Jones, Tritech Group
-
News
12 Apr 2023
Cisco provides extra-secure Webex for U.S. government
Cisco will provide a higher-security cloud-based unified communications platform for U.S. national security and defense personnel to monitor classified data, starting in 2024. Continue Reading
By- Mary Reines, News Writer
-
Definition
24 Mar 2023
vishing (voice or VoIP phishing)
Vishing (voice or VoIP phishing) is a type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities. Continue Reading
-
Definition
19 Dec 2022
cyberbullying
Cyberbullying is a type of bullying in which one or more individuals use digital technologies to intentionally and repeatedly cause harm to another person. Continue Reading
-
Feature
30 Nov 2022
Collaboration platforms play key role in hybrid work security
As hybrid work and virtual collaboration grow, legacy security tools are no longer enough. Learn why organizations must update their security strategies. Continue Reading
By- Katherine Finnell, Senior Site Editor
-
Answer
29 Nov 2022
What are SBC configuration best practices?
Proper SBC configuration requires partnering with providers and security teams to examine circuits and potential traffic. Learn the best practices for implementing an SBC on your network. Continue Reading
By- Carrie Goetz, StrategITcom LLC
-
Opinion
09 Nov 2022
Multichannel communications need more than email security
To remain protected against social engineering attacks in all communication channels, enterprises need new security strategies that extend beyond email to new collaboration tools. Continue Reading
By- Dave Gruber, Principal Analyst
-
Enterprise Strategy Group
We provide market insights, research and advisory, and technical validations for tech buyers.
-
News
26 Oct 2022
Cisco adds more Webex-Teams integration for hybrid work
Cisco Webex users now have more hybrid work features, including a new whiteboard and integration with Teams, iPhone and iPad cameras. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
21 Oct 2022
Balancing remote work privacy vs. productivity monitoring
Weighing employee productivity monitoring against remote workers' privacy is a serious issue that requires protecting personal and corporate data and setting the right policies. Continue Reading
By -
Tip
19 Oct 2022
How to combat voice security issues in collaboration platforms
Enterprise collaboration is an integral part of doing business. But companies must learn to guard against voice security issues that could compromise their networks. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Answer
12 Oct 2022
Are Microsoft Teams calls encrypted?
Microsoft Teams calls are encrypted at rest and in transit. But organizations that want an additional layer of security can enable end-to-end encryption for one-on-one calls. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
News
24 Aug 2022
Apple's hybrid work plans draw worker pushback
Apple's executives say in-person collaboration is essential to the company's innovative culture. Employees have asked the company to rethink forced hybrid work. Continue Reading
By- Mike Gleason, News Writer
-
Tip
19 Aug 2022
Why organizations need to revisit end-user device policies
Now that WFH collaboration is established at many organizations, companies need to review and revise their end-user device policies to manage security and IT support. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
11 Jul 2022
How end-to-end encryption supports secure team collaboration
End-to-end encryption provides secure collaboration but limits certain productivity features. Learn how end-to-end encryption fits in a team collaboration security strategy. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
28 Jun 2022
Understanding WebRTC security architecture
WebRTC is a secure technology for real-time communications, but security also depends on the application using it. Find out how developers can maintain that security. Continue Reading
By- Tsahi Levent-Levi, BlogGeek.me
-
News
14 Jun 2022
Cisco links Webex to ThousandEyes internet intelligence
Integration between the Cisco Webex Control Hub and ThousandEyes lets IT administrators spot internet problems before they can affect video conferences. Continue Reading
By- Antone Gonsalves, News Director
-
Answer
10 May 2022
Where do Zoom recordings go? How to find saved recordings
Zoom meeting recordings are saved and stored on your desktop or the Zoom cloud. But your organization may have security rules that restrict meeting recordings. Continue Reading
By -
Definition
09 May 2022
parameter tampering
Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's authorization. Continue Reading
By -
Definition
21 Apr 2022
security information management (SIM)
Security information management (SIM) is the practice of collecting, monitoring and analyzing security-related data from computer logs and various other data sources. Continue Reading
By -
Tip
11 Apr 2022
3 ways to retool UC platform security architecture models
The security gap created when remote workers use unified communications to collaborate can be erased through tools designed to augment traditional security mechanisms. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
29 Mar 2022
Deploy an information barrier policy for Microsoft Teams
Mistakes happen, but can be costly when they involve compliance. Office 365 information barriers can prevent inadvertent sharing to protect the organization's sensitive data. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Answer
19 Jan 2022
How secure is Zoom video conferencing?
Companies can take some simple steps to protect their Zoom meetings, but they should also consider ways to better educate their employees on how to use the software. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
13 Dec 2021
5 collaboration features to disable for security reasons
Most enterprises lack sufficient collaboration security strategies. Instead, companies are disabling features to improve security. Learn which features are most often disabled and why. Continue Reading
By- Irwin Lazar, Metrigy Research
-
Answer
30 Nov 2021
How do you apply a zero-trust security policy to UC?
An important piece of remote and hybrid work is keeping UC environments secure. Learn how a zero-trust policy keeps user and app communications secure. Continue Reading
By- Andrew Froehlich, West Gate Networks
-
Tip
23 Nov 2021
Start managing with these Microsoft Graph API features
Microsoft Graph offers several administrative advantages when handling jobs on Microsoft 365 and Azure AD, but be aware of some potential trouble spots when employing this technology. Continue Reading
By- Liam Cleary, SharePlicity
-
Feature
22 Jun 2021
Top hybrid collaboration security threats and strategies
Hybrid work can add new security wrinkles for collaboration tools. Learn about the key threats and the importance of a proactive hybrid collaboration security strategy. Continue Reading
By- Katherine Finnell, Senior Site Editor
-
Tip
06 Apr 2021
4 Microsoft Teams security issues and how to prevent them
As collaboration platforms become essential to everyday operations, understanding Microsoft Teams security issues is more important than ever. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Feature
31 Mar 2021
4 cloud collaboration security best practices for CISOs
In the new era of remote work, cloud-based team collaboration is a virtual necessity, but it can also be risky. Analysts and CISOs explain how to keep your organization secure. Continue Reading
By- Alissa Irei, Senior Site Editor
-
Tip
24 Mar 2021
Collaboration tool security: How to avoid common risks
As the use of collaborations tools and platforms surges, new research from Metrigy emphasizes organizations need to focus on collaboration tool security to reduce risk. Continue Reading
By- Irwin Lazar, Metrigy Research
-
Feature
24 Sep 2020
UC and collaboration security requires a strong framework
While UC and collaboration security can be challenging to address, a strong foundational framework can keep communications data secure and controlled. Continue Reading
By- Katherine Finnell, Senior Site Editor
-
Tip
31 Jul 2020
Develop an effective unified communications security plan
A complete unified communications security plan requires an understanding of threats to UC systems, how to mitigate them and how to proactively address long-term security needs. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Tip
14 May 2020
Video conferencing security and why it's so hard to attain
As the number of remote workers soars, video conferencing security has become a critical issue. What do you need to know about securing your conferencing platform? Continue Reading
By- Tsahi Levent-Levi, BlogGeek.me
-
Answer
01 Oct 2019
How can UC analytics detect a security breach?
UC analytics can be the first warning that your UC system's security has been breached. Comparing statistics month to month can help identify potential security problems. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Feature
10 Sep 2019
3 key questions to ask about unified communications security
Unified communications security can be tricky. Learn how to craft a strategy that addresses security challenges and the requirements of individual UC tools. Continue Reading
By- Katherine Finnell, Senior Site Editor
-
Answer
13 Aug 2019
What areas should hybrid cloud video security address?
Hybrid cloud provides several benefits to a business. But hybrid cloud video security shouldn't be taken for granted. Learn what four areas should be considered. Continue Reading
By -
News
02 Aug 2019
Cisco security flaw leads to $8.6M payout in whistleblower case
The settlement resolves allegations that a Cisco security flaw left governments vulnerable to hackers for years without the company taking action. Continue Reading
-
Answer
15 Jul 2019
How can organizations address VoIP security threats?
An unguarded VoIP system could be vulnerable to attack. Learn what security measures can help prevent VoIP security threats from affecting your organization. Continue Reading
By- Carrie Goetz, StrategITcom LLC
-
Answer
03 Jul 2019
What are the challenges of unified communications security?
Unified communications security can be disjointed, as different apps are open to different attacks. A strong UC security roadmap should address three areas. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Answer
24 Jun 2019
How do you support UC network security?
Many elements can put your UC network at risk, from unsecured information to DoS attacks. Learn five ways to thwart would-be attacks and protect your UC services. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Tip
30 May 2019
Microsoft Teams has HIPAA collaboration compliance benefits, risks
Microsoft Teams can be a boon for communication and collaboration in healthcare settings, but collaboration compliance with HIPAA regulations must be top of mind. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
-
Answer
30 May 2019
How can IT evaluate team collaboration apps for security compliance?
Choosing the right team collaboration apps for your business must include looking at your organization's security and compliance needs. IT should focus on tools that meet established security standards. Continue Reading
-
News
24 May 2019
Expanded deal with Collab9 brings Avaya cloud to governments
Avaya has expanded its partnership with Collab9 to bring Avaya cloud UC and contact center products to federal, state and local governments. Continue Reading
-
Feature
19 Feb 2019
Know the security risks of CPaaS and communication APIs
Learn how your data may be at risk when deploying CPaaS and communication APIs and how to protect your organization from potential data security risks. Continue Reading
By- Micah Levine, TechTarget
-
Tip
26 Dec 2018
2 key use cases of blockchain in communications
Blockchain in communications can provide additional layers of UC security by reinforcing voice identity and privacy, while also protecting companywide collaboration. Continue Reading
By -
Answer
28 Nov 2018
How do APIs work, and how can you ensure they are secure?
Understanding how APIs work and how they are used is essential when formulating security policies. Our expert outlines four steps to set up a first line of defense. Continue Reading
By- Tsahi Levent-Levi, BlogGeek.me
-
Answer
19 Nov 2018
What role does SBC security play in VoIP protection?
Knowing which SBC security features are essential is important to stave off potential attacks. Our expert gives insight into what features are necessary for robust protection. Continue Reading
By- Kevin Tolly, The Tolly Group
-
Tip
09 Nov 2018
3 reasons Google Assistant Duplex raises security, privacy concerns
Google Assistant Duplex introduces a new level in machine-driven conversation technology, but not without raising security and privacy concerns. Continue Reading
By -
Answer
17 Oct 2018
What potential chatbot security threats could AI introduce?
New chatbot AI technology comes with potential security risks. UC expert Jon Arnold explains what to be aware of when deploying new AI-based voice technology. Continue Reading
By -
News
11 Jul 2018
DHS, SecureLogix develop TDoS attack defense
The U.S. Department of Homeland Security and vendor SecureLogix are making 'rapid progress' in developing a TDoS attack defense. The technology is expected in the coming months. Continue Reading
By- Antone Gonsalves, News Director
-
Tip
08 May 2018
GDPR rules have big effect on UC applications
The European Union General Data Protection Regulation sets tighter controls on businesses and how they handle customers' personally identifiable information. Continue Reading
By- Irwin Lazar, Metrigy Research
-
Opinion
23 Aug 2017
Addressing three cloud-based collaboration security threats
Cloud-based collaboration software offers productivity benefits, but carries security risks. Learn about three collaboration security threats facing organizations and how to address them. Continue Reading
By- Tom Carter
-
Tip
05 Jul 2017
UCaaS providers reap the benefits of changing attitudes toward cloud
Many organizations are viewing UCaaS as a more secure alternative to their on-premises technologies. Is it time for you to consider unified communications as a service? Continue Reading
By- Irwin Lazar, Metrigy Research