Technology Support

Call Us: (852) 2851 8002 | Report a Problem

4B Harvest Building | 29-35 Wing Kut Street | Central | Hong Kong - MAP

Remote Support“Remote
  • Home
  • IT Support Services
  • Success Stories
  • Simple IT Tips
    • Ransom-ware
    • Stay Protected with Reliable Backups
    • Network Cabling – do it properly
    • Cable or Wi-Fi?
    • On-screen text too big (or too small)!
    • Technical Tips for using Powerpoint
    • Upside-down screen!
    • Know Your Laptop
    • TLAs – Three Letter Acronyms
    • Help, my disk is dying!
    • Tidy your inbox!
    • Electronic Order Signing
  • News
  • About Us
    • Welcome to Technology Support Ltd.
    • Our Team
    • Careers
  • Contact Us
    • eNews & Updates
    • Privacy Policy
    • Useful Resources
    • Report a Problem
You are here: Home / General / Cybercriminals Are Now Targeting Business Collaboration Tools

August 1, 2025 By Richard Carrey

Cybercriminals Are Now Targeting Business Collaboration Tools

Collaboration Tools Have Changed How We Work

Five years ago, most businesses relied on emails, phone calls, and in-person meetings to communicate. Fast forward to today, and tools such as Microsoft Teams, Slack, and Zoom have completely changed the way we work.

Whether it’s real-time messaging, video calls, or file sharing, these tools have made it easier than ever for teams to collaborate. Even people who had never touched a collaboration tool before are now using them like pros.

But as businesses have embraced these tools, so have cybercriminals, and they see them as a new way to break into company networks.

The Tools Themselves Are Safe – Hackers Exploit Your Familiarity

Let’s get one thing clear: Microsoft Teams, Slack, Zoom, and other collaboration tools are safe. The companies behind them invest heavily in security.

The problem isn’t the software itself but how hackers manipulate people into giving them access. Cybercriminals know you trust these tools and use that trust against you.

Here’s how they do it.

Phishing Attacks: Tricking You With Familiarity

Phishing is one of the most common ways hackers take advantage of collaboration tools.

Imagine this:

  • You receive an email saying a coworker has shared a file with you.
  • You recognize the name, so you click the link.
  • A login page appears. It looks exactly like the Microsoft Teams, Slack, or Google Drive login page.
  • You enter your username and password.

That’s it. You’ve just handed your login credentials to a hacker.

Now they can:

  • Log in to your account.
  • Send messages or files as if they were you.
  • Target your coworkers, pretending to be you.

Because the email came from someone you know, and the login page looked real, you didn’t think twice. That’s what makes phishing so dangerous.

Weak Passwords: An Easy Way In

Not everyone in your company has the same level of cybersecurity awareness. Some people still use easy-to-guess passwords such as their child’s name, pet’s name, or birthdate, information that’s often publicly available on Facebook or LinkedIn.

Even though most collaboration tools force complex passwords, that doesn’t stop password reuse.

Here’s why that’s a problem:

  • Hackers steal login credentials from data breaches on other websites.
  • If an employee reuses the same password for their business email (e.g., jane@yourbusiness.com), hackers will try it on Microsoft Teams, Slack, or your company’s email system.
  • If it works, they now have access to your workplace.

It’s not just about having a strong password; it’s about using a unique password for every system.

Supply Chain Attacks: When the Hack Comes From Outside Your Business

Your business doesn’t have to be the one that gets hacked. It could be a supplier, partner, or contractor.

For example:

  • You and your supplier share a spreadsheet via Google Drive.
  • One day, you get an email from them with a link to the spreadsheet.
  • You trust them, so you click the link.
  • But the email wasn’t actually from your supplier; it was from a hacker who gained access to their account.

The hacker now has a way into your business, using your supplier’s identity.

Because businesses collaborate across multiple platforms, these attacks can spread from one company to another like a chain reaction.

Oversharing and Open Access: Leaving the Door Unlocked

We’ve all done it: quickly sharing a file with someone by sending them a link. But here’s where things go wrong:

  • Many people don’t set an expiry date for shared links.
  • Some links give anyone with the link full access, including the ability to edit files.
  • If you share an entire folder, all files inside it may be visible, even ones that should remain private.

That means old employees, external contractors, or even hackers who come across the link might still have access to company data long after they should.

How to Protect Your Business

Cybercriminals rely on human error, but there are steps you can take to stop them from gaining access to your collaboration tools.

1. Employee Awareness Training

Most attacks start with a simple mistake: clicking the wrong link, entering a password on a fake page, or using a weak password.

Regular cybersecurity training can:

  • Teach employees how to spot phishing attacks.
  • Show them how to check if a shared link is legitimate.
  • Encourage them to use strong, unique passwords for each system.

2. Always Verify Suspicious Links

If you receive an email or message about a shared file, don’t click the link right away. Instead:

  1. Contact the sender through another method (e.g., call them or send a separate email).
  2. Ask if they actually sent the link.
  3. If you weren’t expecting the file, assume it could be a phishing attempt.

3. Adopt Two-Factor Authentication (2FA)

Even if a hacker steals a password, they still can’t get in if 2FA is enabled.

Two-factor authentication requires a second form of verification, such as a text message code or an authentication app, making it much harder for attackers to access your account.

4. Audit Who Has Access to What

Regularly review:

  1. Who has access to shared files and folders.
  2. Whether old employees, external contractors, or third-party vendors still have access.
  3. If shared links have expiry dates or open-access settings.

Keeping access tightly controlled reduces the risk of unauthorized users getting in.

Need Help Securing Your Collaboration Tools?

Microsoft Teams, Slack, and Zoom are fantastic for working together, but they also open new security risks if not managed properly.

If you’re not sure how to:

  1. Train your team to avoid phishing attacks.
  2. Set up strong passwords and 2FA across your business.
  3. Audit access controls to lock down sensitive data.

That’s where we come in.

We help businesses like yours secure collaboration tools, prevent cyberattacks, and stay protected.

Let’s talk. Contact us today at +852 2851 8002 or richard@tecsupp.com to make sure your business stays one step ahead of cybercriminals.

Filed Under: General

eNews & Updates

Technology Support Ltd. - eNews & Updates

Receive IT tips, news and updates sent to your email.
Sign up now!

Testimonials

Trustworthy Hosting

I wanted to let you know that we hold Alan [of Technology Support] in high regard for the work that he does for us. In particular, I consider him amongst the most trustworthy individuals that we have involved in our business (which is extraordinary considering that he isn’t actually an employee). He is always thinking first & foremost of the company’s position regarding risk & security, particularly in regards to staffing issues. View Full →

Garry Hope, Chief Operating Officer, IP Global

Technology Support
5
2015-08-01T22:58:59+08:00

Garry Hope, Chief Operating Officer, IP Global

I wanted to let you know that we hold Alan [of Technology Support] in high regard for the work that he does for us. In particular, I consider him amongst the most trustworthy individuals that we have involved in our business (which is extraordinary considering that he isn’t actually an employee). He is always thinking first & foremost of the company’s position regarding risk & security, particularly in regards to staffing issues. View Full →
https://www.tecsupp.com/testimonials/trustworthy-hosting

Reliable staff & cost-effective

Technology Support have been supplying us with similar services to that of an in-house IT Department. Since we do not have IT personnel stationed in Hong Kong, we have found them to be an invaluable substitute. Their knowledgeable and reliable staff have been cost-effectively supporting the growing Carmichael Fisher office since we first opened for business. View Full →

Peter Udall General Manager, Carmichael Fisher, Hong Kong.

Technology Support
5
2015-08-01T23:03:00+08:00

Peter Udall General Manager, Carmichael Fisher, Hong Kong.

Technology Support have been supplying us with similar services to that of an in-house IT Department. Since we do not have IT personnel stationed in Hong Kong, we have found them to be an invaluable substitute. Their knowledgeable and reliable staff have been cost-effectively supporting the growing Carmichael Fisher office since we first opened for business. View Full →
https://www.tecsupp.com/testimonials/reliable-staff-cost-effective

Does it so perfectly

As a small business owner it’s imperative that our IT systems ensure our business is accessible globally, 24/7, to all possible clients – real and potential; to the team who travel to perform our business across Asia; and, to the support staff who run the operations and admin here in Hong Kong. Thanks to Technology Support and the exemplary services of your whole team we can focus on what really matters in our business – professionally meeting the needs of our clients. View Full →

MJ Jennings, Director, Active Communication Limited.

Technology Support
5
2015-08-01T23:05:46+08:00

MJ Jennings, Director, Active Communication Limited.

As a small business owner it’s imperative that our IT systems ensure our business is accessible globally, 24/7, to all possible clients – real and potential; to the team who travel to perform our business across Asia; and, to the support staff who run the operations and admin here in Hong Kong. Thanks to Technology Support and the exemplary services of your whole team we can focus on what really matters in our business – professionally meeting the needs of our clients. View Full →
https://www.tecsupp.com/testimonials/does-it-so-perfectly

Having a firm willing and able to take ‘the IT issue’ away has allowed us to get on with the day job

St. James’s Place expanded to Asia in June 2014 and it quickly became clear that Tech Support had the attitude and ability that we were looking for.

Since then, we’ve partnered with Richard who’s build an Asia-wide one-stop shop for us. Procurement, set up, maintenance and even large projects (such as migrating our servers from Malaysia to Hong Kong) can be handled with ease and from an end-user perspective simply with a call to Richard or one of the team.

Having a firm willing and able to take ‘the IT issue’ away has allowed us to get on with the day job. On-site staff are professional and proficient whilst phoning the telephone support line to raise a query is always a pleasure. I look forward to continuing to work with the team as we grow here in Asia.


Marianne Davis

Chief Financial Officer - Asia

St. James’s Place (Hong Kong) Limited

Technology Support
5
2016-04-15T17:05:29+08:00

Marianne Davis

Chief Financial Officer - Asia

St. James’s Place (Hong Kong) Limited

St. James’s Place expanded to Asia in June 2014 and it quickly became clear that Tech Support had the attitude and ability that we were looking for. Since then, we’ve partnered with Richard who’s build an Asia-wide one-stop shop for us. Procurement, set up, maintenance and even large projects (such as migrating our servers from Malaysia to Hong Kong) can be handled with ease and from an end-user perspective simply with a call to Richard or one of the team. Having a firm willing and able to take ‘the IT issue’ away has allowed us to get on with the day job. On-site staff are professional and proficient whilst phoning the telephone support line to raise a query is always a pleasure. I look forward to continuing to work with the team as we grow here in Asia.
https://www.tecsupp.com/testimonials/having-a-firm-willing-and-able-to-take-the-it-issue-away-has-allowed-us-to-get-on-with-the-day-job
4
Technology Support

Technology Support Ltd.

4B Harvest Building
29-35 Wing Kut Street
Central . Hong Kong - MAP

Tel: (852) 2851 8002

Support Partners

Singapore


Shanghai

Hear What They Say…

Many of our customers have been with us for more than 10 years.

Click here to hear what they have to say and please feel free to contact some of our existing customers for testimonials.
  • Home
  • IT Support Services
  • Success Stories
  • Simple IT Tips
  • News
  • About Us
  • Contact Us

© 2025 - Technology Support Ltd. - Powered by Dagadu Media