Is Teams Safe? Top Ten Teams Threats Explained

Is Teams Safe? Top Ten Teams Threats Explained

Microsoft Teams is the fastest growing app in Microsoft’s history and in lockdown, almost all of us are using it. But is it safe?

The app itself is secured by Microsoft, how it is used is your problem!

Learn about the top ten threats from Microsoft Teams, decide your policies for Teams use and how to enforce them.

Uncontrolled access could risk data loss, malware infection and Teams can be used by hackers to gain access to your systems or spread ransomware.

This webinar will discuss the growth of Teams and the Top Ten Threats to your business and how to address them, such as:

  • Guests can be added by Team admins and see internal confidential data
  • Teams can be used on unmanaged devices and risk data loss
  • Guest users can upload files that contain malware
  • Teams controls should be integrated with the rest of your security policies

About the Author

Nigel Hawthorn

Nigel Hawthorn

EMEA Cloud & Privacy Spokesperson, McAfee

From working with an Apple distributor in 1980, Nigel has over 30 years experience of computers, security, networking and mobility. He has a strong technical background, with roles in pre-sales and post-sales support and product management before technology marketing. His international knowledge started in 1987 and he has presented at security, privacy, e-commerce and networking conferences in over 50 countries.

He has written the book "GDPR: An action Guide for IT" and speaks and writes regularly on data protection regulations and user privacy. He has also contributed to a number of computing books on network protocols and security, written many articles and lived in California for a number of years before relocating back to the UK as he was missing the rain!

His experience has mirrored many of the most innovative areas of computing; Apple & IBM PCs in the 1980s, storage & networking in the 1990s, Internet performance & web security in the 2000s and mobility & cloud enablement in the 2010s.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.