• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Collaboration App Cybersecurity Issues Have Remote Workers Looking for Alternatives

Philip Piletic / 5 min read.
May 16, 2021
Datafloq AI Score
×

Datafloq AI Score: 78

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/hNcXF

As an increasingly large percentage of work moves online, bad actors are attempting to inject malware into streams that they wouldn’t have ever considered valuable in the past. Messaging and chat services were traditionally considered low-value to attackers, who usually looked for places that they could grab a great deal of sensitive information from. This information could then be encrypted and held for ransom or, alternatively, sold on the open market.

These trends have changed sharply as a result of the growth in the remote work industry. A new study suggested that 71 percent of employees share critical business information using an instant messaging tool. These tools are often designed with collaboration rather than security in mind, making this statistic that much more startling. Cybersecurity analysts are now advocating a series of remediations that could make these services more safe to use.

The Danger of Sharing Information in a Public Room

Considering that an overwhelming majority of web chat services boast at least some form of encryption, it‘s easy to imagine that you’re safe when discussing business matters inside of a private chat room built solely for the sake of having such conversations. In many cases, though, the terms of service put out by the organizations that manage these apps include text that suggests they’re not as locked down as they might seem. Certain applications actually allow developers from their parent companies to examine the contents of rooms selected at random, ostensibly for quality control purposes.

It’s relatively obvious what might happen if this information were to fall into the wrong hands, but what’s more concerning is that many platforms that claim to have full endpoint security aren’t necessarily locked down the way that people think they are. For instance, those looking into Slack have traditionally been pleased by the fact that they don’t voluntarily disclose information to governmental authorities.

Parties involved in litigation, however, can request information from Slack as evidence in a lawsuit. Slack’s own transparency report admits that they disclosed information at least 10 times between November 1, 2017 and April 30, 2018, so it’s likely that this is more common than it sounds. While this is somewhat small considering the large number of users on the platform, it’s important to keep in mind considering the possibility of someone issuing a targeted request in order to collect information about a potential business competitor.

Breaches have been a major problem with platforms like Slack, Skype and Discord as well. The problem isn’t even just restricted to communications platforms. As the education market has moved both employees and students to an online workplace, it’s become an increasingly large target as well. In March 2021, around 5 million accounts from online education site Descomplica got posted to a cracker’s forum. This breach included far more than what you’d normally find people discussing in your average Slack room or Discord server, but it does serve to prove the point that serious security questions should be raised by anyone using a public service such as these.

While some cybersecurity advocates have suggested that people move exclusively to private cloud accounts as their only form of communication, there are much more reasonable alternatives out there that are becoming popular with people in the meantime.

Alternatives to Traditional Online Communications Platforms

Many public email providers have faced the same kinds of criticism that online chat services are facing, which is why it’s so surprising that a great deal of secure business communication is actually moving back to email instead of graduating to another more recent protocol. However, secure private email accounts are far easier to operate than private cloud services, and they’re seen as an excellent way to safeguard against potential data breaches. Best of all, they’re interoperable with any other email service.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

However, that might prove problematic since major email providers like Gmail have admitted to scanning through messages received on their end, which is a privacy concern when discussing certain types of sensitive information related to specific business practices. While an effective remediation for this issue is as simple as making sure people don’t send emails to anyone who is out of the corporate network, that’s almost impossible to enforce except by imposing a very strict allow-list policy that filters outgoing emails if they’re directed to anyone outside of a select group.

As a result, some have taken to using enterprise-level entity resolution tools to communicate with one another in spite of the fact that this isn’t normally considered part of the design specification of this kind of software. Considering that fake collaboration apps as well as compromised ones that take advantage of insecure mobile devices have started to siphon away information from various users, this sort of solution is gaining a real foothold.

That’s especially true in industries where remote workers are required to manage their own tech, which increases the chances they might fall prey to an imitator.


Repurposing Existing Tools for Newer, More Secure Uses

Countless pieces of software have some sort of communications module built into them, but these are seldom used outside of very specific circumstances. However, over time IS department staffers have started to find drastically new methods of deployment that favor these over other technologies. If a person is able to send a message through a specific app, then there’s no reason they shouldn’t be doing so according to this line of reasoning. Standard data validation subroutines are often built into these programs as well, which has helped to make them an even more attractive alternative.

Admittedly, digital security by obscurity isn’t the best practice, but there’s nothing wrong with relying on it as one possible method of dealing with the problem. That’s one of the methods that Unix-inspired PC operating systems like GNU/Linux have used to stay safe after all these years.

Eventually, new communications protocols will have to be developed from scratch. That being said, radical reapplications of existing systems might very well be the technique that allows businesses to continue to communicate until something completely new is in place.

Categories: Cybersecurity
Tags: Data security, security, workforce

About Philip Piletic

My primary focus is a fusion of technology, small business, and marketing. I'm a writer, marketing consultant and guest author at several authority websites. In love with startups, the latest tech trends and helping others get their ideas off the ground. You can find me on LinkedIn.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

12 Data Quality Metrics That ACTUALLY Matter

March 30, 2023 By Barr Moses

How to Build Microservices with Node.js

March 30, 2023 By Annie Qureshi

How to Validate OpenAI GPT Model Performance with Text Summarization (Part 1)

March 29, 2023 By mark

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 12 Data Quality Metrics That ACTUALLY Matter
  • How to Build Microservices with Node.js
  • How to Validate OpenAI GPT Model Performance with Text Summarization (Part 1)
  • What is Enterprise Application Integration (EAI), and How Should Your Company Approach It?
  • 5 Best Data Engineering Projects & Ideas for Beginners

Search

Tags

AI Amazon analysis analytics application applications Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto Data design development digital engineer environment experience future Google+ government Group health information learning machine learning market mobile news public research security services share skills social social media software strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!