Secure Communications Architecture and Platform for NATO – Designed for, and used in, military environments

Widely used across the UK and other European countries, in defence, military and national security organisations, Armour works closely with the UK’s National Cyber Security Centre (NCSC) and has an enviable track record of delivering easy-to-use secure communications for use in the most challenging of higher assurance mission critical environments.

The Armour Secure Communications Platform protects communications within military environments, following Secure by Design and Secure by Default principles. It provides the capability for a federated, cross domain architecture for secure communications – voice, instant messaging and video conferencing – enabling interoperability across all NATO organisations. Flexible, easy-to-use and with a familiar user experience, Armour® is approved for use at, NATO RESTRICTED (and UNCLASSIFIED), UK OFFICIAL-SENSITIVE and (through our defence partnerships) at higher assurance levels.

The Armour Secure Communications Platform is ideally suited for NATO to support  multi-domain operations and ensure secure, reliable, resilient and efficient collaboration across NATO Alliance members. Armour provides the option for on-premises, standalone, sovereign installations, that can be securely federated as required to facilitate secure interoperability.

On-Premises and NCSC Advanced Mobile Solutions Architecture

Armour has developed its solutions in line with the NCSC’s Advanced Mobile Solutions (AMS) architecture to deliver more secure solutions that are as easy and convenient to use as commercial/consumer mass-adoption apps. This enables organisations to set up a secure communications platform with high user adoption.

How Defence and Military organisations are using the Armour Secure Communications Platform

Whatever your sensitive communications requirements, Armour has a secure proven solution.

  • Mission critical, sensitive data scenarios
  • Secure communications up to higher assurance levels
  • Mitigate foreign carrier and network risk
  • Use over satellite if required
  • Customer-defined phone identities (no requirement to use actual phone numbers)
  • Robust security for organisations working collaboratively on projects, research and military operations
  • Secure collaboration with friendly forces, local contacts, and for training
  • Audit facilities for all communications and associated files
  • Central management of applications and security settings
  • Full user lifecycle management, from provisioning to service/data revocation
  • Data Sovereignty – control your own data at all times
  • Bring-Your-Own-Device (BYOD) – Separate personal and business data
  • Out-of-Band Communications during a crisis
  • Supports low-cost, burner phones for total anonymity
  • Secure interoperability between NATO capabilities, organisations and military groups

 

Award-winning Armour Comms solution

Armour has won multiple industry awards over a number of years, a testament to our commitment to providing innovative, useable and sustainable solutions to meet the ever evolving threat landscape.

  • Multi-domain, multi-organisation structure with strictly siloed security means that Armour can augment and broaden secure communications and collaboration capabilities.
  • Collaboration for a range of classification levels, can be provided via Armour’s Secure Cloud extending to include desktops, workstations and unified comms systems (such as office phone systems and third-party meeting systems).
  • Alternatively, the Armour installation can be hosted and managed on-premises to give the organisation total data sovereignty to meet higher assurance needs.
  • Different Armour Mobile installations can be ‘Federated’ to allow collaboration between their users
  • User Communities in any installation can be segregated or allow-listed to permit collaboration, and to control communication between Federated instances.
  • Suppliers and contractors can be added and removed as needed, and only allow-listed to collaborate with specific teams or projects.

 

Link: Read our new NATO white paper to see how Armour Comms can help your organisation to meet your secure mobile communications requirements.

 

10th Anniversary for Armour Comms

We’re delighted to announce that 12 January 2025 saw the 10th anniversary of the founding of Armour Communications. In that time the technological and threat landscape has changed considerably.  Our product set has grown from a single solution to provide robustly secure voice, video conferencing and instant messaging capabilities for high assurance industries such as military, defence and central government, to a comprehensive platform for secure collaboration that is used by a much broader client base including enterprise, financial services, and the wider public sector, both in the UK and internationally.

The solution of choice for higher assurance, and beyond

Armour Mobile is now used extensively throughout the MOD for a wide range of different use cases, and is the solution of choice for a number of multi-national systems integrators that work closely with Armour to deliver solutions to defence organisations around the world.

A growing network of alliance partners

Our work with chosen alliance partners including systems integrators, cyber security solutions partners, and managed service provides (MSPs), means we are able to address specific industries and geographies. As a result, Armour is used in many international markets, spanning a wide range of security-conscious industry sectors.

Packaged solutions to meet different requirements

The Armour Secure Communications Platform is now available in a range of flexible packages to suit most deployment requirements from a fully managed, turnkey solution; to hosted/self-managed; and full on-premises installations.  Each of the three packages, can be tailored to meet specific needs.

Armour Cloud

A fully managed SaaS solution for standard deployments for SMB/SME sized organisations, with one simple affordable price. Armour Cloud™ is aimed at organisations looking to replace the use of consumer apps, improve security of mobile communications mitigating deepfake and impostor-based cyber threats, retain control of corporate data including data sovereignty, and for improved security, GDPR and regulatory reasons.

Armour Cloud is also ideal for organisations looking for an out-of-band communications channel with which to handle incidents or to protect sensitive C-suite communications.

Armour Cloud+

A SaaS solution for SMB/SME sized organisations to manage their own users for standard deployments.  The package includes secure recording, archiving and audit of voice and instant messaging conversations, with interoperability by extending the reach of mobile secure communications to enterprise unified communications systems which include desk phones and IP soft phones.

Armour Cloud+ is ideal for any regulated organisation needing auditability including responding to Freedom of Information requests.

Secure video conferencing can be added as an optional extra.

Armour Enterprise

A solution that supports the robust requirements of higher assurance and SME/Enterprise organisations that need complete control over all aspects of their secure communications. Armour Enterprise™ is provided as either an on-premises implementation or via a number of SaaS options. Secure interoperability with enterprise unified communications including desk and IP soft phones, secure video conferencing and secure archive and audit are also included within the packaged price.

Multi-award winning products

The multi award-winning Armour Secure Communications Platform now incorporates secure video conferencing, file attachments, and comprehensive interoperability via any number of integrations and bridges to other technologies. Secure archive and audit are now also available – a hugely complex piece of engineering to support the compliance requirements of regulated industries such as financial services, health and legal, and, those that need to comply with Freedom of Information requests, such as local authorities, NHS, blue light services and organisations providing critical national infrastructure.

Standards-based quality  

We’ve worked with the UK’s NCSC and other technical authorities to ensure that the Armour Secure Comms Platform is developed based on security industry standards and that it meets the NCSC’s 7 Principles of Secure Communication and is Secure by Design and Default.  With a range of deployment options including secure hosted cloud and on-premises, it can provide data sovereignty – something which mass adoption services such as Microsoft Teams cannot even for government customers.  Armour® holds ISO 27001 and Cyber Essentials+ certifications and Armour Mobile™ is approved for use at OFFICIAL-SENSITIVE, NATO RESTRICTED and higher assurance levels.

Rising to the challenge

As we start back to work after the New Year, we reflect with optimism on what the next 10 years may bring.  With the rise of AI and impersonation-based attacks now a stark reality, our aim remains the continued development of standards-based secure communications solutions, that are every bit as easy to use as consumer-grade apps but with robust security to thwart the ever changing attack vectors that we now see on a day to day basis.

For more information about how Armour Comms can help your organisation to safeguard privacy of messaging, voice and video communications, read our Securing Communications Channels Buyer’s Guide, or contact us today sales@armourcomms.com

Scottish Government bans WhatsApp – what can they replace it with?

As the Scottish Government hits global headlines for its announcement of a ban on the use of the consumer messaging app WhatsApp for official business, we ask, what next? What should they be using for secure communications?

The Scottish government is not the first to take such measures, the French government made a similar ban on the use of WhatsApp, Signal and Telegram by ministers and their teams, as have NatWest Bank, and several years ago now, the German company Continental AG

This latest ban will be applied to all Scottish government devices and takes effect from Spring 2025. This was announced in the wake of an external review of the use of messaging apps after it was revealed by the COVID enquiry that huge swathes of messages that took place during the pandemic had been deleted by ministers (as discussed in our previous blog: Scottish Covid inquiry finds that Nicola Sturgeon appears to have deleted ALL her WhatsApp messages.)

Deputy first minister Kate Forbes said “Government business should happen on government systems which are secure, searchable and allow the appropriate sharing of information, in line with our statutory duties.”

While the use of Teams will still be allowed in Scotland, in revelations earlier this year by Computer Weekly, Microsoft admitted that it cannot guarantee the sovereignty of UK data hosted on its hyperscale public cloud infrastructure.  In the detailed article Computer Weekly explains that under Part 3 of the Data Protection Act (DPA) 2018, law enforcement data must be kept within the UK, as must all public sector data under the G-Cloud 14 framework regulations.

With all this in mind, what should organisations be doing to protect sensitive their communications?

NCSC approved alternative to consumer apps

As we have stated many times before, there is really no excuse for the use of consumer apps by those in public office when there is an NCSC approved alternative that is every bit as engaging and easy to use.  Not only do consumer apps, such as WhatsApp and many others, lack enterprise-grade security features, such as identity-based authentication (which tackles the issues of impersonation-based attacks/spoofs/AI deepfakes, etc.), but as we are reminded yet again, such apps lack any central management of messages and conversations, and therefore do not protect the public record.

Award-winning Armour secure communications

The Armour® Secure Communications Platform (multiple recipient of the SC Awards Best Communications Security Solution) provides an alternative to consumer grade applications. The platform brings together a quick-to-deploy, easy-to-use solution that can be used on both mobile devices and desktops, with enterprise security features not provided by mass-adoption collaboration products or free-to-use consumer apps. It protects data throughout its lifecycle, providing all elements of mobile communications/collaboration including voice, instant messaging, and video conferencing, encrypting data both at-rest and over-the-air.

Suitable for higher assurance video conferencing

Security conscious organisations such as government departments, law enforcement,  military, defence contractors and public sector bodies all need products designed with their specific requirements in mind. The Armour Secure Communications platform is built to give organisations control of where they deploy and where their data resides, with both secure hosted and on-premises options available.  It addresses issues such as GDPR and industry-specific regulations including DPA 2018 Part 3 as cloud-based providers often cannot satisfy sovereign needs.

Armour Recall™ captures, retains and archives data to ensure organisations keep control of their data and can review at a later date to prove compliance and as a matter of public record.

Armour Unity™ delivers secure conferencing in an easy-to-use app for mobile use and is available in several configurations to ensure the level of security matches the sensitivity of the conversation.

Strict security measures within Armour give the organisation total control over data. For example, constraining message retention, Message Burn (automatically deleting messages after a set time), controlling features like forwarding/sharing data, erasing all data in the event of device (or user) compromise.

Users and call groups are centrally managed, people can only join and use the app by invitation. Identity-based authentication (using NCSC’s MIKEY-SAKKE protocol) means that users can be confident when using the platform that they are communicating with who they think they are.  In this way Armour addresses the issue of identity-spoofing and ghost-callers, including AI-generated deepfakes.

 

For more information about what your organisation should be looking for when considering a secure communications solution read our Buyer’s Guide: https://www.armourcomms.com/2023/06/29/securing-communications-channels-a-buyers-guide/

 

 

 

Chinese state-sponsored attack on US telecoms giants has ramifications for us all

FBI and CISA officials are recommending the use of encrypted applications for instant messaging, texts and voice calls. However, consumer applications like WhatsApp and Signal do NOT mitigate the full nature of this threat vector and certainly do not protect metadata, including user location.

A federated, sovereign, cross domain architecture for secure communications – voice, instant messaging and video conferencing – can protect against these threats. Such a solution can provide interoperability across organisations, from low to high classifications and assurance levels, and must be supported by recognised security accreditations, delivering the security necessary to mitigate against the growing cyber risks and threats in this area, while delivering consumer app ease of use.

Touted as the biggest, most blatant cyber-espionage attack in history, PRC (People’s Republic of China) is behind the hacking of some of the world’s largest telcos.  While the US is hitting the headlines, The Register has reported that other countries such as Afghanistan, Brazil, Eswatini, India, Indonesia, Malaysia, Pakistan, the Philippines, South Africa, Taiwan, Thailand, and Vietnam have all been targeted. And it’s not just telcos, other target industry sectors include: technology, consulting, chemical and transportation industries, government agencies, and non-profit organizations (NGOs) in the US, the Asia-Pacific region, the Middle East, and South Africa.

The FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have issued recommendations that citizens use encrypted apps to protect the privacy of their communications.

While this is highly concerning news for governments, public sector organisations, organisations supporting critical national infrastructure (CNI), journalists, law enforcement and anyone with a sensitive job role, it is also worrisome for everyone, at every level. Indeed, in the NCSC’s recently published Annual Review, NCSC CEO Richard Horne states: “We face enduring threats from hostile states and cyber criminals looking to exploit our dependency on the technology that now underpins all aspects of modern life.

Advice from NCSC over 5 years ago is even more pertinent now: “Consider options for secure or alternative communications in event of a sensitive incident, or where normal channels are unavailable due to network/email/phone system outage.”

The Salt Typhoon attack is using multiple activities to cause a range of issues including:

Intercepting and eavesdropping communications

Salt Typhoon is using its presence on telecom provider networks to intercept calls and messages of targeted individuals, which include government officials and politicians, amongst others. This means that communications involving sensitive topics or national security could be falling into the hands of an unfriendly regime.  Any product that uses end to end encryption can mitigate this particular risk, including Armour Mobile. However, UK military and defence organisations have been discouraging the use of consumer grade apps for messaging for a number of years now and have already implemented more secure comms mechanisms. A key reason for using dedicated secure systems is that there is a lot more to securing communications than just encryption (as we explain in our blog: If there’s more to security than encryption – what else do you need?)

Accessing and mining metadata

The attacker has stolen large amounts of call detail records (metadata), for example, caller and receiver phone numbers, call duration, call type and phone location. So, even if the detail of the conversation/communication cannot be read (when using end to end encryption), adversaries can glean a lot of valuable intelligence just from knowing who is speaking to whom, when and where. For example, knowing the location of a journalist or activist in a rogue state can quite literally be a matter of life and death for those individuals.

The fact that social media companies sell their members’ metadata to advertisers demonstrates just how valuable it is, even for the ordinary citizen (and clearly, even more valuable if it is a politician or public official).

Whilst it’s not possible to stop metadata from being generated, steps can be taken to control access to it. Armour Comms securely manages communications in the cloud ensuring metadata is minimised and protected. In addition to private SaaS deployment, we also offer an on-premises solution for those who want complete control, allowing customers to store metadata on their own servers. Our solutions not only protect the content of communications, but also consider the broader aspects of securing your data and privacy. Consumer apps such as WhatsApp, and even Signal, do not protect metadata to the same degree.

For more information about the value of metadata read our blog: What does your smart phone say about you?

 

Secure comms when handling a major security incident

NCSC advises that a key step for preparing communications strategy as part of incident response is to set up an alternative communications channel, i.e. one that does not rely on the organisation’s usual channels, since these may have been compromised in the attack. NIST SP800.61 also recommends having multiple back up communications solutions in place.

Both NIST and the Digital Operational Resilience Act (DORA) suggest that incident response groups with key contacts/structures are pre-defined and set up in advance, so that communications can begin immediately on the secure channel once an incident occurs. Groups can be internal and external to an organisation, typically including suppliers, law enforcement, internal groups, employees, key stakeholders and the SOC team, etc.

Armour provides a standalone, independently or in-house hosted secure communications platform that is as engaging and easy to use as a consumer-grade app. Armour can ensure that your employees have a solution that keeps data secure, while providing the capability to communicate effectively throughout a major incident.  The Armour secure comms platform delivers:

  • Data protection using UK Government and NATO approved tools, Secure by Design/Secure by Default
  • One easy-to-implement solution that enables multi-domain integration of communications amongst trusted third parties and stakeholders
  • Instant, remote and mobile secure collaboration

 

Trusted federated communications

Federated, controlled communication between separate instances of the Armour secure comms platform ensures that different organisations, departments, and locations can communicate securely. Data is held within an organisation’s own servers, or in a secure cloud, providing a highly secure, scalable architecture for low to high assurance environments.

Armour Bridge and Armour Connect provide interoperability with third party messaging and voice systems.

 

For more information about how Armour Comms can help your organisation to safeguard privacy of messaging, voice and video communications, read our Securing Communications Channels Buyer’s Guide, or contact us today sales@armourcomms.com

Secure Communications – the cornerstone of C4ISR

A blog by our CTO Dr Andy Lilly as part of techUK’s Defence Technology Week

Use of mobile phones has transformed communication, a crucial element of C4ISR.  However, for all the impressive technology in such a tiny device, it opens up military/defence organisations to a range of potential attack vectors including:  IMSI catchers, fake basestations, AI/deepfake impersonation attacks, as well as unsanctioned consumer apps on BYOD devices, any of which could result in leakage of time/mission critical data.

Attacks using old technology still highly effective

Fake base stations and IMSI catchers are an old attack vector, but still in use today and catching out the unwary. This is where mobile phones are ‘fooled’ into locking on to the strongest antenna signal from a fake basestation which then negotiates reduced encryption standards that are easily cracked.

A recent investigation indicated that enemy forces are using this very method via transportable antenna (fake basestations launched via drones) to access data sent by devices, and in some cases to erase information held on phones. As long ago as 2017 soldiers were reporting ‘strange things’ happening to their phones such as contacts disappearing. Indeed, troops and those travelling in ‘unfriendly regimes’ should beware of posting content online, even to restricted profiles visible only to friends, because such posts can easily be accessed by uninvited third parties.

In early March the BBC reported that a European government admitted to a hack of a military meeting where officers discussed use of long-range missiles, and their possible targets. https://www.bbc.co.uk/news/world-europe-68457087.  The hack was helped in part by the fact that the participants were not using a secure communications channel.

AI generated impersonation-based attacks an increasing threat

The growth of artificial intelligence (AI) generated deepfakes for impersonation-based attacks is becoming more prevalent.  Video calls are becoming so believable that in February a finance worker in a multinational company was duped into paying out $25 million after a video call with a deepfake chief financial officer.   Not only was the CFO on the call a deepfake, so were all the other participants, all of whom were known to the finance worker.

Identity-based encryption – know who you are communicating with

One way that military organisations, or any other organisation for that matter, can protect against these threats is to use a secure communications platform that utilises identity-based encryption. Protocols such as the NCSC’s MIKEY-SAKKE ensure that people can be confident that they are communicating with who they think they are and not an impostor, however clever their fakery.

As these recent attacks demonstrate all too vividly, organisations of every shape and size in both public and commercial sectors need to take the cyber security of their communications seriously.  This means banning the use of unsanctioned shadow IT for business purposes. A built-for-purpose, Secure by Design (SbD) secure comms platform can provide an engaging user experience to rival any consumer app, plus the ability to manage and control the organisation’s data centrally.

Protect data sovereignty

Whether deployed on-premises (on in-house servers), or as a secure hosted solution, an enterprise-grade secure comms platform that covers voice calls, instant messaging and video conferencing ensures data sovereignty. This is where data stays on sovereign soil, something that some tech giants can’t guarantee, even for UK Government users. It also ensures data separation, no mixing of data, be that of different classifications of data, or business and personal, even on BYOD devices.

In short, a secure communications platform can protect military and other sensitive communications even in hostile conditions. Users and their data are managed centrally, meaning users can be confident that they are communicating with who they think they are, and not an adversary.

High Street bank bans consumer messaging channels from company devices

NatWest Group takes shadow IT seriously and has blocked employees from using WhatsApp, Facebook Messenger and Skype for business communications.

 

The BBC has reported that NatWest Group has blocked messaging services WhatsApp, Facebook Messenger and Skype on company devices in the UK to stop staff using them to communicate with each other.  While the company had previously stated that staff should only use official communications channels to discuss business, it has now gone one step further and removed access to the apps on corporate devices, which implies there was still a high level of staff misuse of such “shadow IT” to share sensitive data.

Financial institutions face $2.8bn in fines

This is in direct response to the growing pressure from industry regulators to stamp out the use of unsanctioned channels, where banks in the US have been handed fines worth more than $2.8bn (£2.2bn) during the past few years over record-keeping rules – where workers’ historical messages could not be retrieved from some messaging services. Our previous blog More banks fined total of $81million for record keeping contraventions gives more detail.

Concerns over the use of unofficial communications channels in public life have been growing with calls for UK MPs and civil servants to stop using consumer apps for very similar reasons, in that there is no oversight of business nor official discussions. The topic of MPs mysteriously (and conveniently) ‘losing’ messages is discussed in our blog: More instances of Ministers’ disappearing messages!

WhatsApp makes it easier to defraud citizens

The use of consumer apps such as WhatsApp has seeped into business, meaning that boundaries have become blurred. People are now unsurprised to be contacted for ‘work purposes’ via a consumer app; however, this practice makes it much easier for criminals to defraud people. Scams where victims are defrauded out of thousands of pounds are receiving increased media coverage on consumer interest programmes. For example, a recently introduced feature of WhatsApp that allows screen sharing is now being used by criminals to manipulate people into moving cash from one account to another, resulting in their money being stolen.  The BBC has covered the story across a range of media channels: ‘WhatsApp screen sharing scam lost me £20,000’

Business communications culture needs to shift

In short, business culture needs to change. Important business contacts and customers should not be contacted via unmanaged and untrusted consumer chat apps. Using such casual methods of communication fosters a lax approach to security.  And while their use might be convenient, they are certainly not safe or secure, as these recent stories clearly demonstrate.

Organisations do not need to use unmanaged, ungovernable communications channels, as there are alternatives that provide enterprise features and suitable security for handling business conversations.

Enterprise communication platforms that authenticate users are hard to spoof

Such apps, like Armour Mobile, which uses identity-based encryption, enable people to be confident that they are communicating with who they think they are communicating with. This stops imposters, scammers and criminals from spoofing their way into business conversations.

The rise of AI and deepfakes is another trend that is increasing rapidly which is being exacerbated by mass-adoption messaging and collaboration apps that have very little in the way of user authentication and security.

Our on-demand webinar shows examples of just how convincing these deepfakes can be, and gives some advice as to what organisations can do to mitigate the threat:  LINK to Webinar

To read more about what you should be looking for in a Secure Communications Platform read our buyer’s guide: https://www.armourcomms.com/2023/06/29/securing-communications-channels-a-buyers-guide/

 

 

 

 

Armour Comms solutions now available on G-Cloud 14

The full range of the Armour Secure Communications Platform can now be ordered via the latest version of the Government’s procurement framework

Visit us on Stand 29B, SDSC UK, 19 – 20 November, Telford International Centre

London, UK, 11th November 2024Armour® Comms’ solutions have been accepted on to the G-Cloud 14 procurement framework.  Buying services through the framework is faster and more cost effective than entering into individual procurement contracts. All public sector organisations, including agencies and arm’s length bodies, can use the Contract Award Service through G-Cloud 14 to purchase Armour Comms solutions.

Armour packages that can now be procured online include:

Armour Cloud™ – A fully managed SaaS solution for standard deployments for SMB/SME sized organisations, with one simple affordable price. Armour Cloud is aimed at organisations looking to replace the use of consumer apps, improve security of mobile communications mitigating deepfake and impostor-based cyber threats, retain control of corporate data including data sovereignty, and for improved security, GDPR and regulatory reasons.

Armour Cloud is also ideal for organisations looking for an out-of-band communications channel with which to handle incidents or to protect sensitive C-suite communications.

Armour Enterprise™ – Configured to provide a solution that supports the robust requirements of higher assurance and SME/Enterprise organisations that need complete control over all aspects of their secure communications. Armour Enterprise is provided as either an on-premises implementation or via a number of SaaS options. Secure interoperability with enterprise unified communications (UC) including desk and IP soft phones, secure video conferencing and secure archive and audit are also included within the packaged price.

Armour Recall™ – Archiving and Audit solution providing the ability to record and playback messages, audio or video calls subject to strict security processes – essential for regulated industries.

  • All transmitted media (text, attachments, audio) are archived.
  • Tightly managed authorisation for audit access.
  • Individual encryption keys limits access.
  • All access to audit files is audited.

 

Armour Unity™ – enterprise secure conferencing and collaboration solution that is easy and intuitive to use.

  • Strong authentication – be sure who is on the call (helps to mitigate the risk of AI-generated deepfake fraud)
  • Video, documents and chat all remain protected within the Armour ecosystem

 

 Armour Connect™ – provides interoperability options extending the reach of mobile secure communications to the desk phone in the enterprise including integration with SIP, PBX, and other UC installations. 

Armour Bridge™ – a cross-domain gateway that provides interoperability with third party messaging systems. This allows Armour Mobile and Armour Unity users to exchange messages across security boundaries and/or levels, with colleagues that are not able to use the Armour platform. Armour Bridge benefits include:

  • Controlled access to and from third party messaging systems
  • Extends value of existing messaging apps
  • Delivers audit compliance, e.g. for Public Records

 

David Holman, co-founder and director of Armour Comms commented; “This is the widest ever range of Armour solutions to be made available via the G-Cloud framework. This is testament to the growing requirements to protect everyday business conversations from increasing threat levels and Armour’s continued growth and development in providing quick-to-deploy, easy-to-use solutions that help to mitigate the risks from eavesdropping and impersonation-based attacks as well as criminal and nation state sponsored cyber attacks .”

Armour will be exhibiting at SDSC UK, 19 – 20 November, Telford International Centre SDSC UK.  To find out more, visit Armour on Stand 29B, or contact us on: sales@armourcomms.com .

Increased threat levels for arson, assassination and sabotage -Are your emergency communications ready?

During a cyber incident, your usual communications channels may not be available. You may need to establish alternative ways to keep in touch with staff, stakeholders and customers, using phone lines, messaging apps or social media platforms – NCSC

In the past couple of weeks, UK intelligence and security organisations have been raising threat levels. The National Protective Security Authority (NPSA) has updated its threat picture regarding the likelihood of Russian state sabotage, and issued guidance on how to counter the risk of sabotage to UK interests and national security. At about the same time, NCSC has issued guidance on effective communications in a cyber incident. And, the Economist published an article entitled: Vladimir Putin’s spies are plotting global chaos, citing named sources from both MI5 and MI6. It states that the number of incidents in Europe has grown dramatically, listing examples in Germany, France, UK, Poland, America, Africa and the Middle East.

Obviously, we are all aware of the on-going war in Ukraine, and we’ve heard about the allegations of Russian tampering with the last US election. However, the threat is increasing and now coming demonstrably closer to home.

Prepare with incident management and response

One way that organisations can protect themselves is to prepare for such threats with incident management and response policies and processes, set up and tested in advance. Threats include physical sabotage, which might be particularly targeted at organisations providing critical national infrastructure (CNI; which the EU NIS2 has widened beyond government and public administration, critical infrastructure, finance, telecommunications, to include sectors such as postal and delivery, food production/distribution, chemicals production/distribution, high-tech manufacturing, hospitals, diagnostic laboratories, medical device manufacturers, pharmaceutical companies, and other life sciences organisations). But the threats also include cyber attacks on almost any type of business for the purposes of extortion, disruption and general mischief making.

Communication with external third parties is crucial to protect corporate reputation

Secure communication with key stakeholders is one area that many organisations overlook in the panic to deal with a serious incident. Indeed, it is one of the first points that NCSC makes in its guidance document for effective communications in a cyber incident (referred to above) and goes on to state that “…effective communication to staff, stakeholders, customers and the media is crucial for shaping how an organisation is perceived.”

NCSC advises that a key step for preparing communications strategy as part of incident response is to set up an alternative communications channel, i.e. one that does not rely on the organisation’s usual channels, since these may have been compromised in the attack.

Both NIST and the Digital Operational Resilience Act (DORA) suggest that incident response groups with key contacts/structures are pre-defined and set up before an incident occurs, so that communications can begin immediately on the secure channel. Groups can be internal and external, typically including suppliers, law enforcement, internal groups, employees, key stakeholders and the SOC team, etc.

If your organisation relies on mass-adoption infrastructure for critical communications, it is difficult to communicate with external parties without trusted, secure federated groups already in place. Indeed, NIST SP800.61 recommends having multiple back up communications solutions in place.

Our previous blog In the midst of a cyber attack, who you gonna call? And how? explains the challenges in more detail.

How do current systems stack up?

Think for a moment about how your organisation communicates currently?  You probably use mass-adoption desktop platforms that include messaging and collaboration tools, which are often the basis for an entire enterprise technology infrastructure with many critical dependencies. For example, if your main systems were attacked so that your Active Directory or Identity and Access Management systems were no longer working, how would the business operate?  What would be the ramifications for your employees trying to do their jobs and communicate with colleagues?

An organisation using a compromised service doesn’t need to be the subject of the attack, they can become collateral damage despite not being a target, simply by relying on the service and not having a secure alternative.

Ensuring you have the right infrastructure components for effective incident management and response is key

For all organisations it is crucial to have a back-up communications channel (often referred to as out-of-band) that can be used to marshal a response to any attack or major incident, and organise recovery processes.

A standalone, independently or in-house hosted secure communications platform that is as engaging and easy to use as a consumer-grade app can ensure that employees have a solution that keeps data secure, while providing the capability to communicate effectively.  Such platforms deliver:

  • Data protection using UK Government and NATO approved tools, Secure by Design/Secure by Default
  • One easy-to-implement solution that enables multi-domain integration of communications amongst trusted third parties and stakeholders
  • Instant, remote and mobile secure collaboration

What is an ‘out-of-band’ communications channel?

An out-of-band communications channel is one that does not rely on the standard enterprise infrastructure: It is a system that can operate completely on its own as a standalone solution, i.e. it doesn’t rely on email, Microsoft Office/365, or other mainstream systems. An out-of-band communications platform can work when other systems are compromised and its standalone nature protects it from the attackers.

NCSC Exercise in a Box – testing resilience

NCSC’s online tool Exercise in a Box is aimed at organisations of all sizes, in all sectors, and shows how to test resilience to a cyber attack. The free-to-use tool provides a range of exercises that give organisations a safe environment in which to practice how they would respond to a cyber attack.  As they develop their internal processes, they can repeat the exercises to see how their cyber resilience stance has improved.

How Armour can help

Armour provides a single platform for communicating securely even on BYOD devices, keeping control of the data without the requirement for an MDM. It enables secure calls (audio and video), video conferencing, and secure instant messaging with document exchange, using personal, off-the-shelf smartphones and desktops. This allows trusted colleagues to share and discuss sensitive information, protected from eavesdroppers, even in the event of a cyber attack.

Armour can also provide a secure archive/audit capability, as required by regulated industries and public sector bodies where a record of material conversations/communications including voice/messages/video are a legal imperative, and may be required for FoI responses.  Recording the incident response maybe needed for internal review, criminal proceeding against the hackers and for use to review and refine response to incidents by an organisation in the future to further improve incident management processes.

Users/call groups are centrally managed, and people can only join and use the app by invitation. Identity-based authentication (using NCSC’s MIKEY-SAKKE secure social media protocol) means that users can be confident when using the platform that they are communicating with who they think they are.  Armour addresses the issue of identity-spoofing and ghost-callers, particularly useful when video conferencing.

With the Armour Comms platform, organisations are able to create internal and external user groups and integrate them into business continuity processes, ideal for when communications with distinct groups of stakeholders is imperative. In addition to pre-defined call groups, new people can quickly be provisioned onto the service via secure QR codes and downloading the app from the appropriate app store.

Armour can be deployed as a cloud or on-premises installation which preserves data sovereignty by giving full control as to where data resides, as well as providing the independence from third party solutions required to provide an ‘out-of-band’ emergency communications channel.

And, of course, Armour can also be deployed for day-to-day, sensitive communications (with built-in audit compliance), if your business needs to protect its C-suite users, frequent overseas travellers, etc.

Secure Communications Buyer’s Guide

For more comprehensive information about what you should be looking for in an ‘out-of-band’ secure communications platform, download our Buyer’s Guide: https://www.armourcomms.com/2023/06/29/securing-communications-channels-a-buyers-guide/

Armour Comms announces new industry-leading Secure Video Conferencing solution for higher assurance and enterprise use

Armour Unity enables security-conscious organisations to combat AI-generated deepfake and impersonation-based attacks

Visit us on Stand 29B, SDSC UK, 19 – 20 November, Telford International Centre,

 

London, UK, 16 October 2024Armour® Comms has announced that Armour Unity™, its secure video conferencing and collaboration solution is now shipping. Armour Unity extends the Armour secure communications platform to provide an industry-first, secure, enterprise-level mobile video conferencing and in-app messaging for iOS and Android devices. In common with Armour Mobile™, Armour Unity uses the National Cyber Security Centre’s (NCSC) MIKEY-SAKKE protocol to provide identity-based encryption and authentication, and is designed to support the NCSC Advanced Mobile solution architecture.  This means that users can be confident that everyone else on a call is who they claim to be, mitigating the risk of uninvited ‘guests’ joining a call and deepfake, impersonation-based attacks.

 

David Holman, Director at Armour Comms, explained: “Mass-use consumer applications are simply not secure enough for most sensitive communications.  This is because there is no control over communications data, you don’t know where it is stored, who might have access to it or how they might use your data. The rise of impersonation and deepfake attacks on organisations is growing, causing issues for organisations’ processes and governance around sharing sensitive data, and the potential for fraudulent transactions.  In addition, Microsoft has recently admitted that it cannot guarantee data sovereignty for its UK government/public sector customers.

 

“Armour Unity solves these problems by providing organisations with complete control over their secure communications platform including where sensitive data is stored. Central administration controls all aspects of security settings as well as users.  Only those that are invited to join the platform and provisioned can subsequently then join a call, keeping all users’ and the organisation’s data secure.”

 

Armour Unity highlights

Collaborate

  • Make predefined and on-the-fly video conference calls
  • Same robust protection even across different organisational boundaries
  • Only invited attendees already on Armour may join
  • Set up reminders and alerts

 

Message

  • All transmitted media (text, attachments, audio) is handled securely within the Armour platform
  • Share screens, documents, and chat/text with confidence
  • Message Burn means chat/text can be set to delete at a predefined time by the sender

 

Share

  • MIKEY-SAKKE identity-based encryption means participants can be certain who else is on the conference
  • Users can be segregated into secure, centrally managed Communities
  • Conferences can be set up within or across different user groups according to your security stance

 

Commercial Benefits of a Secure Communications Platform

The Armour secure communications platform can be used throughout the organisation and across the entire supply chain to provide:

  • Flexible secure communications for mobile workers
  • Multi-domain connectivity into existing communications environment maximises investment and security
  • Secure group messaging and collaboration functionality to support cross-organisational, and cross-domain teamwork
  • Secure virtual meeting environment wherever employees are located, reducing commute expenses, saving time, helping towards lower carbon emissions
  • Protection against intercept and therefore potential loss of valuable commercial information including contract and bid investment/industrial secrets

To find out more about Armour Unity visit us on Stand 29B, SDSC UK, 19 – 20 November, Telford International Centre, or contact us on: sales@armourcomms.com .