
There are always new attempts by governments to systematically monitor Internet users for no reason. However, mass surveillance is not only unsuitable for fighting crime, it is also completely incompatible with democratic principles and poses a considerable threat to data security.
Read moreThe term “shadow IT” refers to software and hardware used by employees without their company’s knowledge or approval. One reason for the rise of shadow IT is the increasing number of cloud services, “software as a service” solutions, and messenger apps targeted at consumers. Employees have a plethora of easy-to-use options at their fingertips, and they already know how to use many of them from personal experience. If a process doesn’t run smoothly and no assistance from the IT department is available, employees are tempted to address the problem by resorting to their own tools.
With the end of the EU–US and Swiss–US Privacy Shield agreements in 2020, the transfer of personal data from Switzerland and the European Union to the US has lost an important legal basis. A year later, many companies are still unsure to which extent their data on US servers is adequately protected from third-party access. Find out which regulations apply for data transmission to the US right now and which measures help you to reach privacy-compliant communication in your company.
Instant messaging has become an important part of business communications. Excellent availability, unmatched ease of use, and short response times are just a few of its numerous benefits. There is, however, one major challenge for companies: choosing the right service.