Crisis Communications: How to Handle Breach Response

Data Breach Today

The latest edition of the ISMG Security Report features an analysis of why transparent communication in the aftermath of a data breach pays off. Also featured: Mastercard on digital identity issues; building a more diverse and inclusive cybersecurity workforce

Evolving customer communications

OpenText Information Management

Targeted customer communications are a powerful way to increase engagement and build brand loyalty. Products Customer Experience ccm digital transformation Customer Experience Management notifications personalized communications assured delivery end-to-end CCM design to delivery


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Microsoft to Buy Nuance Communications for $19.7 Billion

Data Breach Today

on Monday announced it will acquire cloud-based speech technology and artificial intelligence vendor Nuance Communications in an all-cash transaction valued at $19.7 Deal Part of Effort to Provide Industry-Specific Cloud Offerings Microsoft Corp.

European Police Hack Encrypted Communication System

Data Breach Today

Cracking of EncroChat's Network Leads to Hundreds of Arrests in Organized Crime Crackdown European police gained access to messages sent via an encrypted cellular network, leading to the arrest of hundreds of alleged organized crime members, according to Europol

What is CCM (Customer Communication Management)?

OpenText Information Management

Organizations need to have seamless and constant communication with their customers while also gaining insights into their needs. Customer Experience Services ccm customer communication management

ToxicEye RAT exploits Telegram communications to steal data from victims

Security Affairs

The post ToxicEye RAT exploits Telegram communications to steal data from victims appeared first on Security Affairs. ToxicEye is a new Remote Access Trojan (RAT) that exploits the Telegram service as part of it command and control infrastructure.

Nuance Communications Breach Affected 45,000 Patients

Data Breach Today

Former Employee Allegedly Accessed Personal Data From Several Nuance Clients Speech recognition software vendor Nuance Communications says an unauthorized third party accessed one of its medical transcription platforms, exposing records for 45,000 people.

Avoiding the Perils of Electronic Communications

Dark Reading

That's why an agile communications strategy is so important Twitter, Slack, etc., have become undeniably important for business today, but they can cause a lot of damage.

Secure communications in a post-PSTN world

OpenText Information Management

Secure File Exchange If … The post Secure communications in a post-PSTN world appeared first on OpenText Blogs. part 1, we discussed how British Telecom was phasing out the PSTN and ISDN networks that many businesses depend on, not by 2025, but with rolling deadlines across the country.

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Security Affairs

Communication is key in intelligence activities. Watchful intelligence operators have been long communicating – in strategic documents – the possible outbreak of a pandemic. To communicate means to share information with others by speaking, writing or using other signals.

New Emergency Communications Plan Released by CISA

Dark Reading

The Cybersecurity and Infrastructure Security Agency's latest version of the National Emergency Communications Plan comes after a two-year process to improve the cybersecurity and flexibility of the nation's emergency communications

A secret weapon for effective workplace communication


Enterprise success in the digital economy is dependent in large part on the ability of employees to collaborate and communicate effectively. Digital Transformation Technology, Media & Entertainment, Telecommunications Workplace collaboration collaboration platforms communication Email phone remote workers Slack textIncreasingly, this means using digital tools to work with colleagues, customers, and business partners located remotely.

NTT Communications Data Breach Affects Customers, Threatens Supply Chain


Attackers managed to compromise NTT Communication’s Active Directory server and a construction information management server. Breach Active Directory breach customer notifications cyberattack data breach Japan NTT Communications server compromise supply chain

BlackWater, a malware that uses Cloudflare Workers for C2 Communication

Security Affairs

The post BlackWater, a malware that uses Cloudflare Workers for C2 Communication appeared first on Security Affairs. Crooks continue to abuse the interest in Coronavirus outbreak, now experts found a new backdoor called BlackWater that pretends to provide information about COVID-19.

Cracking Down on Criminals' Use of Encrypted Communications

Data Breach Today

An analysis of a crackdown on criminals' use of encrypted communications leads the latest edition of the ISMG Security Report. Also: a preview of ISMG's Healthcare Security and Legal & Compliance summits, including expert insights on vendor risk management

Nearly Half of All Malware Is Concealed in TLS-Encrypted Communications

Dark Reading

Forty-six percent of all malware uses the cryptographic protocol to evade detection, communicate with attacker-controlled servers, and to exfiltrate data, new study shows

Data Advances Communication Service Provider Innovations


Sarit Bose , Head of AI, Analytics and Data solutions for Communication, Media and Technology at Cognizant , a Reltio partner, was interviewed by Kate Tickner , our Senior Director of Alliances in Europe.

Invisible Pixel Patterns Can Communicate Data Covertly

Dark Reading

University researchers show that changing the brightness of monitor pixels can communicate data from air-gapped systems in a way not visible to human eyes

Building secure communication resiliency at the desktop

OpenText Information Management

That means no access to … The post Building secure communication resiliency at the desktop appeared first on OpenText Blogs. The unprecedented events of 2020 have shown many organizations the cracks in their infrastructure.

iPhone Apps Surreptitiously Communicated with Unknown Servers

Schneier on Security

Long news article ( alternate source ) on iPhone privacy, specifically the enormous amount of data your apps are collecting without your knowledge. A lot of this happens in the middle of the night, when you're probably not otherwise using your phone: IPhone apps I discovered tracking me by passing information to third parties ­ just while I was asleep ­ include Microsoft OneDrive, Intuit's Mint, Nike, Spotify, The Washington Post and IBM's the Weather Channel.

AppConfig spotlight: communicate, meet and collaborate with Jamf Marketplace partners


Having the right tools can make a huge impact on everyone's success — especially in the modern, mobile workforce era

DARPA Wants Research into Resilient Anonymous Communications

Schneier on Security

DARPA is funding research into resilient anonymous communications systems. anonymity darpa resilience

Fax & Omnichannel Communications Learn Path at Enterprise World

OpenText Information Management

The Fax & Omnichannel Communications Learn Path delivers practical training, tools … The post Fax & Omnichannel Communications Learn Path at Enterprise World appeared first on OpenText Blogs. Business Network Enterprise World Fax Enterprise World 2019 fax Fax & Omnichannel Communications Learn Path learn path learn paths RightFax

Poor Communications Slowing DevOps Shift

Dark Reading

Existing functional silos are standing in the way of building a DevOps culture

Consolidating customer communications platforms at NAV with OpenText Exstream

OpenText Information Management

Every year the Norwegian Labour and Welfare Administration (NAV) sends out more than 20 million items of communication to over 3 million citizens in Norway. Providing value for money, consistent service and clear … The post Consolidating customer communications platforms at NAV with OpenText Exstream appeared first on OpenText Blogs.

Ignite your career with multimedia communication skills


Career Digital Transformation Robotics Workplace adaptability AI automation communications skills IT career IT jobs multimedia podcasts videoIn a workplace where automation and artificial intelligence (AI) increasingly are taking over tasks traditionally performed by humans, it is imperative that employees build “competencies in areas that machines will be unlikely to tackle effectively,” as the World Economic Forum advises.

Telenor boosts customer communications with OpenText

OpenText Information Management

Proposals and agreements are critical … The post Telenor boosts customer communications with OpenText appeared first on OpenText Blogs. Customer Experience Management Customer Communications Management (CCM) customer experience management customer story EMEA Exstream OpenText Elite OpenText ExstreamBrand consistency has a huge impact on brand awareness, which helps to drive understanding and loyalty among customers.

CIA Network Exposed Through Insecure Communications System

Schneier on Security

Interesting story of a CIA intelligence network in China that was exposed partly because of a computer-security failure: Although they used some of the same coding, the interim system and the main covert communication platform used in China at this time were supposed to be clearly separated. But the CIA's interim system contained a technical error: It connected back architecturally to the CIA's main covert communications platform.

Case Law Summary: Can You Use Slack for Business Communications If You Can’t Produce Slack Messages in Discovery?

Hanzo Learning Center

Which comes first: the business communication platform or the ability to preserve, collect, and produce communications from that platform during ediscovery? Which comes first: the chicken or the egg? Oh, sorry, wrong question.

Deliver even more effective multichannel communications with Exstream 16.3

OpenText Information Management

Many people, of all ages, still like to get printed bills as a visual reminder to pay their various accounts, or to keep as … The post Deliver even more effective multichannel communications with Exstream 16.3 Customer Experience Management Customer Communications Customer Communications Management (CCM) Customer Experience customer experience management OpenText Exstream

Whitepaper: The Impact of Emoji in Workplace Communication via RICOH

IG Guru

The post Whitepaper: The Impact of Emoji in Workplace Communication via RICOH appeared first on IG GURU. Check out this very informative whitepaper by Matt Mahon @ Ricoh eDiscovery.

When Bank Communication is Indistinguishable from Phishing Attacks

Troy Hunt

Ok, that final one might be a bit of a stretch , but the fact remains that people have high expectations of how banks should communicate to ensure that they themselves don't come across as phishers: Just a good old phish. So no, you can't trust banks to communicate in ways that don't appear suspicious. You know how banks really, really want to avoid their customers falling victim to phishing scams?

Belgian Constitutional Court Annuls Data Retention Framework for Electronic Communications Data

Hunton Privacy

On April 22, 2021, the Belgian Constitutional Court annulled (in French) the framework set forth by the Law of 29 May 2016 (the “Law”) requiring telecommunications providers to retain electronic communications data in bulk.

7 Tips For Communicating With the Board

Dark Reading

The key? Rather than getting bogged down in the technical details, focus on how a security program is addressing business risk

3 Steps to Overcoming Communication Barriers

Perficient Data & Analytics

Using these three tips will help ensure your communication quality is at peak performance. Key Questions for Effective Communication. To ensure you are communicating to your full potential, make sure your team has a firm “yes” to these questions. Companies seeking to evolve and transform need to have tools for effective communication. Communication skills are valuable to teams, especially as they take on digital transformation.

Trial Court Examines Stored Communications Act Applicability to Offline Mobile Phone

DLA Piper Privacy Matters

The Electronic Communications Privacy Act (ECPA) is a law noted for its complexity, and the second portion of it, the Stored Communications Act (SCA) is no exception. At its core, the SCA applies to communications that are in “electronic storage.”

6 Different Communication Channels Used To Deliver Optimum Customer Experience


To ensure better customer service, businesses should have mastered choosing different communication channels that can. The post 6 Different Communication Channels Used To Deliver Optimum Customer Experience first appeared on Cllax - Top of IT.

How you communicate with your customers has changed for good

OpenText Information Management

The last 6 months have changed the way we all communicate – with friends, with family, with colleagues. The recent global pandemic has accelerated digital … The post How you communicate with your customers has changed for good appeared first on OpenText Blogs.

European Commission Adopts Communication on Brexit Readiness

Hunton Privacy

The Communication aims to help national authorities, businesses and citizens prepare for the end of the Brexit transition period on December 31, 2020, including with respect to cross-border exchanges of personal data between the EU and the UK.

Getting Over the Security-to-Business Communication Gap in DevSecOps

Dark Reading

Application security in a DevOps world takes more than great teamwork among security, developers, and operations staff