Skip to main content

The last several weeks have highlighted the growing importance of addressing the security of team collaboration applications.

According to Metrigy’s Workplace Collaboration: 2021-22 global study of 476 organizations, almost 68% have deployed team apps, while more than 57% of participants view team apps as a hub for work—integrating data and applications into contextual workspaces. Compared to email, team applications provide significant and measurable improvements in productivity and responsiveness. It’s no wonder that almost 54% of companies now use, or plan to use, team collaboration apps to support business-to-business and business-to-consumer collaboration.

The last several weeks have seen numerous high-profile team collaboration security concerns. As collaboration security vendor Safeguard Cyber noted in a recent blog post, hackers compromised EA Games’ Slack instance using a combination of a stolen cookie and a social engineering attack to reset a password. Slack isn’t alone as a potential vector of attack as security researchers at the security firm Tenable also discovered a potential zero-day vulnerability in Microsoft Teams that could have allowed an attacker to compromise user accounts. These types of software vulnerabilities aren’t new—vendors routinely issue patches for discovered and reported security flaws—but they do underscore the need for those responsible for collaboration security to ensure that they’re taking a proactive approach to vulnerability awareness and protection, and patch management.

Read the rest of this post on NoJitter.com