Evolving customer communications

OpenText Information Management

Targeted customer communications are a powerful way to increase engagement and build brand loyalty. Products Customer Experience ccm digital transformation Customer Experience Management notifications personalized communications assured delivery end-to-end CCM design to delivery

What is CCM (Customer Communication Management)?

OpenText Information Management

Organizations need to have seamless and constant communication with their customers while also gaining insights into their needs. Customer Experience Services ccm customer communication management


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

European Police Hack Encrypted Communication System

Data Breach Today

Cracking of EncroChat's Network Leads to Hundreds of Arrests in Organized Crime Crackdown European police gained access to messages sent via an encrypted cellular network, leading to the arrest of hundreds of alleged organized crime members, according to Europol

Nuance Communications Breach Affected 45,000 Patients

Data Breach Today

Former Employee Allegedly Accessed Personal Data From Several Nuance Clients Speech recognition software vendor Nuance Communications says an unauthorized third party accessed one of its medical transcription platforms, exposing records for 45,000 people.

Secure communications in a post-PSTN world

OpenText Information Management

Secure File Exchange If … The post Secure communications in a post-PSTN world appeared first on OpenText Blogs. part 1, we discussed how British Telecom was phasing out the PSTN and ISDN networks that many businesses depend on, not by 2025, but with rolling deadlines across the country.

Data Advances Communication Service Provider Innovations


Sarit Bose , Head of AI, Analytics and Data solutions for Communication, Media and Technology at Cognizant , a Reltio partner, was interviewed by Kate Tickner , our Senior Director of Alliances in Europe.

New Emergency Communications Plan Released by CISA

Dark Reading

The Cybersecurity and Infrastructure Security Agency's latest version of the National Emergency Communications Plan comes after a two-year process to improve the cybersecurity and flexibility of the nation's emergency communications

A secret weapon for effective workplace communication


Enterprise success in the digital economy is dependent in large part on the ability of employees to collaborate and communicate effectively. Digital Transformation Technology, Media & Entertainment, Telecommunications Workplace collaboration collaboration platforms communication Email phone remote workers Slack textIncreasingly, this means using digital tools to work with colleagues, customers, and business partners located remotely.

Cracking Down on Criminals' Use of Encrypted Communications

Data Breach Today

An analysis of a crackdown on criminals' use of encrypted communications leads the latest edition of the ISMG Security Report. Also: a preview of ISMG's Healthcare Security and Legal & Compliance summits, including expert insights on vendor risk management

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Security Affairs

Communication is key in intelligence activities. On the one hand, it is essential to transfer to a number of recipients the knowledge coming from information acquisition and analysis (“intelligence communication”); on the other hand, it is crucial to understand and control the communication connected with the activities carried out (“communication intelligence”). To communicate means to share information with others by speaking, writing or using other signals.

Avoiding the Perils of Electronic Communications

Dark Reading

That's why an agile communications strategy is so important Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage.

iPhone Apps Surreptitiously Communicated with Unknown Servers

Schneier on Security

Long news article ( alternate source ) on iPhone privacy, specifically the enormous amount of data your apps are collecting without your knowledge. A lot of this happens in the middle of the night, when you're probably not otherwise using your phone: IPhone apps I discovered tracking me by passing information to third parties ­ just while I was asleep ­ include Microsoft OneDrive, Intuit's Mint, Nike, Spotify, The Washington Post and IBM's the Weather Channel.

Fax & Omnichannel Communications Learn Path at Enterprise World

OpenText Information Management

The Fax & Omnichannel Communications Learn Path delivers practical training, tools … The post Fax & Omnichannel Communications Learn Path at Enterprise World appeared first on OpenText Blogs. Business Network Enterprise World Fax Enterprise World 2019 fax Fax & Omnichannel Communications Learn Path learn path learn paths RightFax

Whitepaper: The Impact of Emoji in Workplace Communication via RICOH

IG Guru

The post Whitepaper: The Impact of Emoji in Workplace Communication via RICOH appeared first on IG GURU. Check out this very informative whitepaper by Matt Mahon @ Ricoh eDiscovery.

DARPA Wants Research into Resilient Anonymous Communications

Schneier on Security

DARPA is funding research into resilient anonymous communications systems. anonymity darpa resilience

BlackWater, a malware that uses Cloudflare Workers for C2 Communication

Security Affairs

The post BlackWater, a malware that uses Cloudflare Workers for C2 Communication appeared first on Security Affairs. Crooks continue to abuse the interest in Coronavirus outbreak, now experts found a new backdoor called BlackWater that pretends to provide information about COVID-19. Experts found a new backdoor malware called BlackWater that pretends to provide information about the COVID-19 outbreak while abusing Cloudflare Workers as an interface to the C2 server.

Consolidating customer communications platforms at NAV with OpenText Exstream

OpenText Information Management

Every year the Norwegian Labour and Welfare Administration (NAV) sends out more than 20 million items of communication to over 3 million citizens in Norway. Providing value for money, consistent service and clear … The post Consolidating customer communications platforms at NAV with OpenText Exstream appeared first on OpenText Blogs.

Poor Communications Slowing DevOps Shift

Dark Reading

Existing functional silos are standing in the way of building a DevOps culture

Telenor boosts customer communications with OpenText

OpenText Information Management

Proposals and agreements are critical … The post Telenor boosts customer communications with OpenText appeared first on OpenText Blogs. Customer Experience Management Customer Communications Management (CCM) customer experience management customer story EMEA Exstream OpenText Elite OpenText ExstreamBrand consistency has a huge impact on brand awareness, which helps to drive understanding and loyalty among customers.

Ignite your career with multimedia communication skills


Career Digital Transformation Robotics Workplace adaptability AI automation communications skills IT career IT jobs multimedia podcasts videoIn a workplace where automation and artificial intelligence (AI) increasingly are taking over tasks traditionally performed by humans, it is imperative that employees build “competencies in areas that machines will be unlikely to tackle effectively,” as the World Economic Forum advises.

Deliver even more effective multichannel communications with Exstream 16.3

OpenText Information Management

Many people, of all ages, still like to get printed bills as a visual reminder to pay their various accounts, or to keep as … The post Deliver even more effective multichannel communications with Exstream 16.3 Customer Experience Management Customer Communications Customer Communications Management (CCM) Customer Experience customer experience management OpenText Exstream

CIA Network Exposed Through Insecure Communications System

Schneier on Security

Interesting story of a CIA intelligence network in China that was exposed partly because of a computer-security failure: Although they used some of the same coding, the interim system and the main covert communication platform used in China at this time were supposed to be clearly separated. But the CIA's interim system contained a technical error: It connected back architecturally to the CIA's main covert communications platform.

NTT Communications Data Breach Affects Customers, Threatens Supply Chain


Attackers managed to compromise NTT Communication’s Active Directory server and a construction information management server. Breach Active Directory breach customer notifications cyberattack data breach Japan NTT Communications server compromise supply chain

3 Steps to Overcoming Communication Barriers

Perficient Data & Analytics

Using these three tips will help ensure your communication quality is at peak performance. Key Questions for Effective Communication. To ensure you are communicating to your full potential, make sure your team has a firm “yes” to these questions. Companies seeking to evolve and transform need to have tools for effective communication. Communication skills are valuable to teams, especially as they take on digital transformation.

Building secure communication resiliency at the desktop

OpenText Information Management

That means no access to … The post Building secure communication resiliency at the desktop appeared first on OpenText Blogs. The unprecedented events of 2020 have shown many organizations the cracks in their infrastructure. Faced with the sudden reality of remote work environments, organizations that have traditionally relied upon fax machines to securely exchange documents are now faced with a serious problem: fax machines are in offices where employees aren’t.

Invisible Pixel Patterns Can Communicate Data Covertly

Dark Reading

University researchers show that changing the brightness of monitor pixels can communicate data from air-gapped systems in a way not visible to human eyes

7 Tips For Communicating With the Board

Dark Reading

The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk

ICS-CERT warns of several flaws in the GE Communicator software

Security Affairs

ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs. ICS-CERT is warning of five flaws affecting the GE Communicator software, including privilege escalation issues and hardcoded credentials. GE Communicator is a is a user-friendly software for programming and monitoring supported metering devices. GE addressed the vulnerabilities with the release of GE Communicator 4.0.517.

Getting Over the Security-to-Business Communication Gap in DevSecOps

Dark Reading

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff

New Miori botnet has a unique protocol for C2 communication

Security Affairs

A new variant of the implements a unique protocol to communicate with Command and Control infrastructure. A new variant of the Miori botnet uses a unique protocol to communicate with C&C infrastructure, it implements a protection mechanism to access the login panel. Previous Miori variants used to communicate with the C2 server with a binary-based protocol with a login prompt displayed to anyone that knew its IP address.

Communication, Cloud & Finance Apps Most Vulnerable to Insider Threat

Dark Reading

Businesses say customer data, financial data, and intellectual property are the types of data most vulnerable to insider attacks

The importance of computer identity in network communications: how to protect it and prevent its theft

Security Affairs

The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing on online communications. The confidentiality of information in internet communications.

Platinum APT and leverages steganography to hide C2 communications

Security Affairs

The Platinum cyber espionage group uses steganographic technique to hide communications with the Command and Control Servers (C&C). Experts from Kaspersky have linked the Platinum APT group with cyber attacks involving an elaborate, and new steganographic technique used to hide communications with C2 servers. The post Platinum APT and leverages steganography to hide C2 communications appeared first on Security Affairs.

Fédérale Assurance implements customer communications strategy with OpenText

OpenText Information Management

Each year, Belgian insurer Fédérale Assurance produces up to 10 million pages of customer communications relating to its financial investment products and insurance offerings, including car, home and life insurance. Customer Experience Management CRM Customer communication management customers experience management document composition document production Documentum Exstream timetomarket

Getting Customer Communications Right in Times of Coronavirus

HL Chronicle of Data Protection

With all of the cancellations, postponements, and alternative arrangements that are required as a result of this global crisis, plus the special desire of all retail, travel, and other consumer-facing businesses to stay in touch with their customers, many organisations face the critical challenge of getting to grips with the legal rules that apply to those unsolicited communications and interactions. Across the world, large retail stores and small businesses alike are shutting their doors.

Learn Anywhere: Effective communication in any learning environment

Jamf on EdTech

Communication is among the most important aspect of education and is also the biggest challenge in remote learning environments. Jamf School developed a unique feature in the Jamf School Teacher app called Remote Class to increase student engagement and confidence in any environment

Why Satellite Communication Eavesdropping Will Remain A Problem

Dark Reading

Oxford PhD candidate James Pavur shows that SATCOM security has still made no progress since previous Black Hat disclosures, and discusses the physical and economic limitations that slow make it unlikely to improve anytime soon

Communication, collaboration leadership fuels digital transformation

Information Management Resources

When staff from different sectors know how to communicate and collaborate across traditional divisions, the result is a much smoother digital transformation process. Digital transformation Data strategy Data management

European Commission Adopts Communication on Brexit Readiness

Hunton Privacy

On July 9, 2020, the European Commission (the “Commission”) adopted a Communication to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions entitled: “Getting ready for changes – Communication on readiness at the end of the transition period between the European Union and the United Kingdom” (the “ Communication ”).

Yet Another FBI Proposal for Insecure Communications

Schneier on Security

Deputy Attorney General Rosenstein has given talks where he proposes that tech companies decrease their communications and device security for the benefit of the FBI. I simply maintain that companies should retain the capability to provide the government unencrypted copies of communications and data stored on devices, when a court orders them to do so.