Bad Actors Work Well Outside of Hollywood
Author: Michael Osterman on April 17, 2014 - 10:19 PM
messaging wire osterman michael
Criminals and other bad actors are rapidly evolving their online identity fraud techniques to move quickly and commit their crimes. More hackers and bad actors are attacking enterprises than ever before, fueling a sense of urgency around finding timely solutions to reduce risk for online services, credit card processors, e-commerce merchants and consumers. Consequences include:

· Cybercriminals signing up for new accounts using fraudulent information including bogus user names, email addresses, and domains. This access readies attacks against online service providers and can quickly damage a trusted brand’s reputation

· Bad Actors hijack legitimate registered customer accounts using valid customer login and password data. All for unlawful purposes such as sending high volumes of spam to distribute malicious software or phishing scams designed to defraud consumers of financial information by masquerading as a trustworthy entity.

The Dangers of the Heartbleed Virus are Pervasive
Author: John Duckgeischel on April 13, 2014 - 10:16 PM
messaging wire malware
The latest warnings from both Cisco and Juniper indicate that the Heartbleed virus may be more dangerous than first thought, as it may also be capable of jeopardizing networking infrastructure. Heartbleed allows hackers to get access to data without being detected. Cisco announced on Thursday that its investigation of router sand video conferencing components will continue as it check for vulnerabilities that may be exploited by the virus. Juniper issued a similar message on the company’s service website on Friday. Even with due diligence both Cisco and Juniper warned that it may take time to determine if their data has compromised.
Do You Archive Content From Mobile Devices?
Author: Michael Osterman on April 10, 2014 - 11:29 PM
messaging wire osterman michael
One of the most important shifts in corporate work over the past several years has been the adoption of mobile devices in the workplace and the impact this has had on how employees do their jobs. Consider:

· Our research found that 33% of the typical information worker’s time is spent doing work on a mobile device.

· We also found that 42% of work-related content is accessed via mobile devices, while 31% of content is created on mobile devices.

· A growing number of users have deployed mobile applications and cloud-based storage repositories that house corporate content without any sort of IT oversight.

Despite the rapid growth in the proportion of work that is now being accessed and created on mobile devices, our research found that only 50% of the work generated on a mobile device is actually ever archived to a central corporate location so that it is accessible for eDiscovery, regulatory compliance or other purposes.

Bing’s Future Foretold by Cortana
Author: John Duckgeischel on April 7, 2014 - 9:43 PM
messaging wire microsoft

Cortana, Microsoft’s alternative to Apple’s Siri, impressed the crowds at Microsoft Build developer conference last week. Cortana performed almost flawlessly during a keynote session answering questions, scheduling tasks and demonstrated machine learning as it provided contextual suggestions.   Cortana gets smarter as she gets acquainted with a user, using the “Powered by Bing” technology.  "Powered by Bing, Cortana is the only digital assistant that gets to know you, builds a relationship that you can trust, and gets better over time by asking questions based on your behavior and checking in with you before she assumes you're interested in something," blogged Microsoft Corporate VP Joe Belfiore.

messaging wire engineers discussing messaging wire
Reader's Comments
Messaging Wire Columns

messaging wire