Because of the ongoing COVID-19 pandemic, more people are working remotely than ever before. On the one hand, productivity hasn't really suffered as there are a large number of cloud-based tools that make it possible to be just as productive outside of the office as you are in it. But on the other hand, there are also certain types of collaboration habits that make security breaches no longer a matter of "if" but "when." Understanding what these are is the best way to avoid them at all costs.
Wire has introduced a new App-lock feature for Wire Pro customers. Team owners can now enable a mandatory App-lock for the entire team. Once enabled, members of the team will be required to authenticate themselves using a passcode or biometrics (depending on the user's choice when configuring) every time they open their Wire app. Owners can also customize the duration after which an unlocked app will be locked again.
With WhatsApps’s latest move to monetize data, personal users and businesses alike have become much more aware of the privacy element of the applications they use. Other major tech players and industry figures have even jumped on the news coverage to further highlight the issue. Apple has arguably taken on the role of privacy watchdog and has made bold statements about how damaging data harvesting is to the world.
Throughout the pandemic, the collaboration tools market experienced a major boom with the rise of remote work. However, the recent acquisition of Slack by Salesforce has reinforced the growing separation between workplace tool suites and specialized collaboration tools. Suites have become “one-stop-shop” solutions that can fill multiple functions for companies and employees, which brings into question, what value is there for niche solutions?
As companies went fully remote, keeping teams connected has become their top priority. The need for digital communication apps led companies to choose popular tools, like Whatsapp, Slack, MS Teams, and Cloud-based apps. While extremely popular, such tools also offer serious security risks. So how can companies deal with sensitive information in a secure manner?