Posts tagged with "Digital Transformation"



AGAT - THE HIDDEN RISKS OF SCREEN SHARING
Blog | Endpoint Protection · 05. July 2022
Sharing screens during presentations can lead to a full range of dangers, from embarrassing mistakes to catastrophic slips. We’ve all been there: working on a thousand documents at the same time, and, unpromptedly, a virtual meeting requires you to screen share, and while you try to close every window, you realize every little embarrassing detail which is on full display for everyone else to see.

Public Service Announcement: Browser in the Browser (BITB) Attacks
Blog | Endpoint Protection · 17. May 2022
With cybersecurity attacks getting increasingly sophisticated, phishing attempts have grown from convincing emails, SMS, or phone calls to convincing Single Sign-On (SSO) prompts that can expose your corporate users. Continuing the growing trend of sophisticated cyberattacks, a new attack has been reported recently that you should know about: Browser in the Browser (BITB) attack. It takes advantage of the SSO security feature used by most organizations. 

HOW TO BLOCK USERS FROM BECOMING GUESTS IN AN EXTERNAL OFFICE 365 TENANT
Blog | Endpoint Protection · 07. February 2022
Without a doubt, Microsoft Teams is a key asset in corporate communications today. To improve collaboration, Microsoft provides the ability to add external users as guests in external tenants. This increases productivity, but on the other hand can introduce new risks, especially if your users are guests of other tenants and are not bound by your company policy at this time.

How to keep your data safe from Apache Log4j vulnerabilities
Blog | Endpoint Protection · 18. January 2022
In December, the Apache Software Foundation quickly released information about two critical vulnerabilities in its Java-based Log4j library.

Der TI Messenger (TIM)
Blog | Endpoint Productivity · 17. January 2022
Ab Sommer 2022 wird ein Standard für ein sicheres und interoperables Instant-Messaging im deutschen Gesundheitswesen eingeführt: Der TI (Telematikinfrastruktur) Messenger von gematik.

Business Messenger Trends 2022
Blog | Endpoint Productivity · 08. December 2021
Which business messenger are you using in your organization? Learn more about the six trends for business messaging innovation in 2022. The last two years have not only given a significant boost to the digital transformation of companies, but have also advanced internal communications in many places. To connect decentralized teams and mobile employees quickly and securely, new communication channels must be used. Here, DSGVO-compliant business messengers are clearly on the rise. Teamwire has...

Jennlog Malicious Loader
Blog | Endpoint Protection · 08. November 2021
A malicious loader named Jennlog has recently been used by an Iranian threat actor called Agrius in a ransomware attack against a university in Israel. The malware was written in .NET assembly language, and designed to target Windows® machines.

How to prevent users from becoming Guests in an external Office 365 Tenant.
Blog | Endpoint Protection · 25. October 2021
Microsoft Teams is without any doubt a key asset for corporate communications at this time. To improve collaboration, Microsoft offers the ability to add an external user as a guest in the external tenant. This increases productivity but on the other hand can pose new risks especially when your users are guests in other tenants and at that point are not subjected to the policies of your company. The guest option is actually a loophole in compliance and governance of a company that must be...

How to Control External Meeting Communications in MS Teams
Blog | Endpoint Management · 12. October 2021
Blocking sensitive company information from being released, and complying with requirements in business policies - while internal users attend a meeting held externally with persons from outside - their organization are two difficulties that organizations are currently experiencing.

Solution Highlight: VMware Carbon Black
Blog | Endpoint Protection · 14. September 2021
In our recent blog post, we talked about behavior-based security, a whole new approach to tackling today’s security challenges by preventing an attack before it even happens.

Show more