Teams | Collaboration | Customer Service | Project Management

Secure messaging apps: why, what, and how

Secure messaging apps have always been highly valued among their consumers – but the security ladder keeps going higher and higher. The technology is advancing at a high speed, and organizations are trying to ensure the strictest security standards for messaging apps their employees use. Namely, ever since the abrupt switch to a remote work environment in 2020, companies are seeing a rise in cybersecurity breaches.

What Is A Community Forum And How Can It Help Your Business?

If you’ve ever found a solution online to an obscure tech problem you’ve had, then it’s very likely that you’ve interacted with an online community forum. Community forums allow people to connect and discuss shared interests. Especially now, where many people’s days are spent online, community forums represent a space of connection for many.

Zendesk Tutorial: Analyze your business rules with rule analysis

It's no question that business rules are the heart and soul of an efficient Zendesk instance. However, managing your business rules can be extremely difficult, especially in a more complex use-case. Have no fear, for those on Support Enterprise, rule analysis can take the guesswork out of business rule management.

Why you should use historical data to automate inquiries

In fact, according to Gartner, by 2022 70% of all customer interactions will involve emerging tools like chatbots, machine learning, and mobile messaging, up from 15% from 2018. Customer service automation has proven to reduce agent frustration and turnover, increase customer satisfaction and improve customer loyalty. Automation does not come without any challenges, however.

Securing XML implementations across the web

In December 2020, we blogged about security issues in Go’s encoding/xml with critical impact on several Go-based SAML implementations. Coordinating the disclosure around those issues was no small feat; we spent months emailing the Go security team, reviewing code, testing and retesting exploits, coming up with workarounds, implementing a validation library, and finally reaching out to SAML library maintainers and 20 different companies downstream.