Armour Comms participates in Shadowing Women in Technology programme

Over the past week, the female employees of Armour Comms hosted three female students from the Shadowing Women in Technology (SWIT) programme at University College London (UCL). Dr Andy Lilly (CTO) introduced Armour to UCL’s students in an evening presentation that included highlighting the many ways that one’s mobile phone data can be hacked and misused. For the visiting students, the aim was to show them what goes on inside an entrepreneurial start-up developing leading-edge security products; to facilitate this, the students circulated between female employees, observing how their different roles in Marketing, Pre-Sales and Development all contribute to Armour’s day-to-day operation.

Andy (Armour’s CTO) was clear that: “At Armour we respect and value staff diversity and inclusivity, so alongside strong links with universities we want to encourage women to study STEM (Science, Technology, Engineering and Mathematics) topics and to pursue rewarding careers in technology.”

A 2017 study by PwC (involving over 2,000 A-Level and university students) found that only 27% of females would consider a career in technology, compared to 61% of males. A lack of female role models was one of several factors that meant only a meagre 3% of the women said a career in technology would be their first choice. Sadly, the students noted that they, too, were very much in a minority in their own courses.

Andreea (Pre-Sales Engineer), one of the Armour hosts, explained: “While I am a member of the development team at Armour, I also support the Sales team in the technical aspects of their job. I gave the students an overview of the software and tools that I use, including the advantages and disadvantages of different operating systems. I described my experience with meeting customers, feeding back their requirements and contributing to internal meetings and technical documentation. Discussing my various training opportunities, led to interesting conversations about professional development.”

Isabelle (Software Developer), said: “I demonstrated how I contribute to different projects and development processes; from software design and testing, to sprint ceremonies for managing current and future planning. I showed how we needed to interact and collaborate across different departments, working to define expectations, implement and test solutions. I highlighted how our supportive office culture optimises our progression, both as teams working to meet shared goals, and our individual growth in continuing to develop skills and knowledge, keeping up to date with advancements in technology.”

Kayleigh (Marketing) described her role: “We felt it was important for the students to see how marketing – everything from event organisation to design of brochures – fitted into the wider company structure of a technical business. Each student asked plenty of thoughtful questions throughout the day and it was refreshing to see their enthusiasm for daily tasks that we tend to take for granted. I hope this experience demystifies the office environment and encourages them to pursue a career in a technology field.”

Andy was delighted with the students’ engagement, and their wide-ranging questions: “Our team was asked about their backgrounds (from apprenticeships to postgraduates), and what had motivated them to enter this industry, Armour itself and their particular roles. The students enjoyed actively participating in our day-to-day meetings, experiencing technology demonstrations and real-life applications of our development processes. They appreciated the openness of our office atmosphere and asked frank questions about what sort of challenges were encountered when first starting here. We hope all the students gained a lot of useful information and have a better idea of the broad range of career opportunities in technology companies.”

Andreea, Kayleigh and Isabelle concluded: “We hope this experience will ultimately enable them to make an informed decision when they choose a career, and also de-bunked some of the myths and clichés about being a woman in tech, and showed them the importance of having passion for the area that you work in.”

Armour Comms attracts £2m first round of investment from BOOST&Co

Mobile comms security company set for dramatic expansion with new funding, as its revenues double year on year 

London, 12 February 2020: Armour Comms, the leading provider of specialist, secure communications solutions, has successfully closed its first round of outside investment of £2million from external investors, BOOST&Co. The new investment comes at the end of Armour’s most successful year to date, with year-on-year revenue growth having more than doubled. Planned expansion in 2020 means the company are looking to hire up to 20 new people across the business. Several people have already been appointed, in product development and sales.

“Armour Communications is a fantastic example of a small business that has carved out a space for itself in the secure technology sector and is competing with established brands,” says Kim Martin, the BOOST&Co principal who led the deal. “The business is recognised for the quality of its offer and the experience of a management team that are thought leaders within their industry.”

David Holman, Director at Armour Comms said: “Attracting external investors is testament to the amazing achievements of Armour Comms, and everyone that works with us. The investment from BOOST&Co will enable us to fast-track innovative new developments to our family of products and bring them to market. This additional investment also means that we can move ahead with our plans to recruit new people in a variety of positions across the Armour team and we are looking to significantly increase our market presence.”

As well as increasing revenue by 100% in 2019, Armour signed up several significant new partners.  During the year, Armour collaborated on a next generation high grade encryption and remote access solution, that is in use with the Australian government.

In 2019 Armour extended its product range by launching SigNet by Armour, which provides secure voice, video, messaging, group chat, file attachments and MessageBurn (timed messages) with AES-256 bit encryption. SigNet by Armour, which is an alternative solution to its government-approved Armour Mobile secure communications systems, solves new user requirements, provides the same ease of use as consumer grade apps, and is available for Android and iOS devices and for use with Windows 10 and Mac OSX desktops.

SigNet by Armour is available as a Software as a Service (SaaS) product hosted on Armour’s secure cloud, or as an on-premises installation, and uses a peer-to-peer key management system. It uses the double ratchet algorithm with prekeys and 3-DH key management to provide confidentiality, integrity, authentication, participant consistency, destination validation, forward secrecy, backward secrecy (aka future secrecy), causality preservation, message unlinkability, message repudiation, participation repudiation, and asynchronicity.

Using consumer apps for business use is illegal

As we’ve commented before , the use of consumer grade messaging apps has spread its insidious tentacles throughout the working environment and it’s easy to see why. Effective communication is essential to getting the job done. With instant messaging, teams can communicate quickly and in real-time, without the delay of waiting for an email response. Geographically dispersed teams can communicate efficiently and remain engaged, improving effectiveness and productivity.

However, is a consumer grade app such as WhatsApp suitable for business communications?

GDPR compliance and liability

WhatsApp was primarily designed for personal use; a fact they make abundantly clear in their terms of service :

Legal And Acceptable Use. You must access and use our Services only for legal, authorized, and acceptable purposes. You will not use (or assist others in using) our Services in ways that: (a) […] (f) involve any non-personal use of our Services unless otherwise authorized by us.

After downloading WhatsApp users are presented with a popup that asks “WhatsApp Would Like to Access Your Contacts”. It goes on to explain, “Upload your contacts onto WhatsApp’s servers to help you quickly get in touch with your friends and help us provide a better experience”.

Agreeing to this means that all phone contacts are now accessible in WhatsApp, irrespective of whether they are business or personal contacts. The problem with this is your contacts haven’t given consent for a third party to process their data. This could be a breach of GDPR  but who is liable?

The tricky business of data consent

Before using WhatsApp, all clients must “Agree & Continue” to accept the Terms of Service. Only once consent is given can users access the service. However, WhatsApp has been explicit in its terms that the app is only for your personal use and has sought the consent of the user for accessing contacts… so, when it comes to GDPR it’s not WhatsApp that needs to be concerned about data consent, it’s the user!

In most instances, it appears that individuals choosing to use WhatsApp for any business communications are in contravention of the terms of service. This limits WhatsApp’s liability in terms of GDPR as they have abdicated all responsibility to the user for seeking the consent of their contacts.

Be safe, or risk being sorry

Since the introduction of GDPR, organisations have taken great strides in understanding their responsibility towards safeguarding data. However, too often the security of mobile communications is overlooked when auditing such risks. It’s easy to do, just ask the owner of Amazon, Jeff Bezos, who was recently allegedly hacked via WhatsApp. Compromising the security of the wealthiest man in the world is no small undertaking.

What this episode, and the many others before it, highlight are that consumer grade apps are not designed for business use. WhatsApp doesn’t hide this fact, it’s written in the Terms of Service, but when did a user ever read those before clicking the ‘Accept’ button?

It’s time for organisations to stop side tracking the issue and provide their employees with the right tools to get the job done. The benefit is not only greater efficiency and productivity within your workforce but secure communications that don’t expose your business to cyber threats. A thought that has probably crossed Jeff Bezos’ mind quite a lot recently.

Armour’s solutions for secure communications work on everyday smartphones, tablets and Windows 10 desktops. With the same usability as consumer-grade apps, but with significantly enhanced security it could be the answer to your security needs.

Read how others have benefited:

Links to Sparten Case study and QuoStar Case study.

Contact us today to discuss a solution.

Huawei, Attack Trees and $5 Wrenches

It’s always a pleasure to see a blog written by Dr Ian Levy (NCSC Technical Director) given the approachable, down-to-earth manner in which he discusses key topics of national security. His latest post covers the DCMS supply chain review for the UK’s future (5G) telecoms networks.

Depending on your preferred flavour of paranoia / news source, it may seem like this decision throws away our last bastions of privacy in the UK and condemns us to a future of (Chinese) state surveillance and espionage. However, one might want to consider this in a broader context, for example: the ongoing “bitter trade battle” between the US and China; growing recognition of the issues around China’s domination of computer manufacturing (so can you trust what’s been baked into the chips inside your laptop?); and balanced against the majority of western youth who think putting embarrassing pictures on Instagram is a good idea (quickly dispelled when they learn that recruiting managers know how to search one’s social media timeline…)

Levy has already addressed the underlying principles for assessing the security of the UK’s future networks but in his latest blog he highlights key points, such as which parts of a 5G system are most critical to protect, the different types of risk (with an example of an attack tree”), how to address particular attack vectors, and the difficulty of managing risk in such a complicated environment, while reminding us all that a $5 wrench can be an effective password hacking tool.

Huawei is an easy target for criticism due to the belief that the Chinese state can influence the company to hide espionage or denial-of-service features within its products, as well as subverting the marketplace through heavily subsidised pricing. However, remember that other manufacturers could introduce risks through poor security ‘hygiene’ (whether this be at a protocol level, such as SS7, or in something as simple – but lethal – as hardcoding ‘backdoor’ admin passwords into switches.

If you’d like some further views on 5G security and its potential impacts, Brookings are informative and highlight just how many aspects of our future, digitally-connected life might be affected if 5G was attacked or simply failed, ranging from our internet-connected fridges failing to automatically re-stock our milk, to our entire 5G-connected autonomous vehicle transport system coming to a crashing halt (with correspondingly huge numbers of human casualties)…

At Armour, the concept of securing one’s communications is key to our business and to our beliefs, whether that be protecting one’s personal privacy or securing government secrets. Using end-to-end encryption and authentication helps to overcome some of the potential hazards of untrusted (or to use the buzzword “zero-trust”) networks. Many of the possible risks being raised around 5G are present right now, whether you’re a CEO using your mobile to discuss sensitive trade deals while roaming on a foreign country’s phone network… or an NHS patient worrying about which of your personal data just got Whatsapp’d between the nurses treating you in a UK hospital…

For more information contact us here.

How secure are your mobile communications? Top tips from the NCSC (part of GCHQ)

In a world where it seems acceptable for the US President to routinely use an unsecured mobile phone vulnerable to monitoring by foreign intelligence services we should all be thankful that the UK’s National Cyber Security Centre (NCSC) continues to work to “make the UK the safest place in the world to live and work online”.

According to the Centre for the Protection of National Infrastructure (CPNI), the UK is a high priority espionage target . Cyber espionage may use any form of cyber attack to steal classified, sensitive data or intellectual property to gain an advantage over a commercial competitor, company, government or nation state, but equally almost any individual (whether of high net worth, or having some knowledge or role of importance) may be a cyber espionage target. In order to achieve success, a cyber-criminal will attempt to identify and then exploit any perceived weakness within your protective security measures and mobile communications are a key area of risk, especially as they are increasingly used as an authentication mechanism for all sorts of logins and financial transactions.

When looking at securing mobile communications, be it voice, video or messaging services, it is important for any solution to deliver 3 key outcomes; confidentiality, integrity and authentication, i.e.

  • keeping your communications private and protected from prying eyes / ears;
  • making sure that those communications haven’t been tampered with; and
  • ensuring that the communications are actually coming from the person you think.

 

While you might think selecting any mobile app that mentions the word “encryption” in its description will solve the first point, not only is this frequently not the case, but security and privacy have much broader considerations, even including where you’re holding your conversations (for a humorous yet worrying example, talking loudly about business on a train . The rapid increase in cases of fake audio (and now fake video) for fraud shows the dangers of compromising integrity or authentication… and we haven’t even got to the insecurity of carrier networks or how everyone is installing audio and video bugshelpful assistants’ everywhere!

So, please go take a read through the advice from those savvy people at the NCSC on the key Secure Communication Principles for all your organisation’s important communications.

As you might expect, Armour’s products are designed to meet these secure communications principles from the ground up, and over the coming weeks we will be highlighting some of the details behind the principles and how you can apply them.

Sparten deploys Armour Mobile to strengthen intelligence led approach

“Armour Mobile enables teams at Sparten working on complex, multi-jurisdictional projects to communicate effectively and securely. Armour helps us to provide the infrastructure we need so that our people can operate at their best, and therefore provide an excellent service to our customers.”

Harry Abdy-Collins, Partner and Investigations Lead at Sparten Group.

Founded on the stoic principles of Wisdom, Honour, Integrity, Practical Intelligence and Excellence, Sparten provides discrete intelligence-led, unconflicted advice to high net worth families, corporates and their advisors.  In keeping with its own guiding principles, Sparten aims to provide the infrastructure to its employees and third party firms to ensure that they can operate to the very best levels.  To do this, Sparten uses a number of tools for secure communications, however, for secure, encrypted conference calls there was only one solution that provides the ease of use, coupled with the range of features and security options required; Armour Mobile.

Business Drivers

Sparten works with a wide range of advisors and third party firms across diverse geographies and jurisdictions on complex projects.  Teams from many partner organisations may be working on multiple different projects with Sparten and secure communications is an important process discipline and enabler.

As Partner and Investigations Head at Sparten Harry Abdy-Collins explains; “Operating in a safe environment that we can control is essential for Sparten and our clients. Regardless of threat or situation, Armour provides us with confidence and communications continuity.”

The Solution

Sparten has deployed Armour Mobile on iOS, Android and Windows Desktop for employees, its professional advisors and their clients. The new secure QR provisioning option makes setting up a new user extremely quick and easy and the Windows Desktop version enables project administrators to set up and manage calls within groups.

Enhanced security features

Armour Mobile has a number of features that are particularly valuable to Sparten. These include:

Secure Conference Calls

While there are other products on the market that can provide secure one-to-one communications, Armour Mobile provides a secure platform for conference calls for both voice and video.  Uniquely, the Armour app isolates the microphone, ensuring that no other app on the phone can listen in or eavesdrop. Even if the phone has been bugged, communications via Armour remain protected and private.

White Listing and Groups

Armour Mobile allows white lists and groups, and sharing of contact details, in a controlled way across communities. This means that Sparten is able to set up groups for each project, ensuring that are no slip-ups when sharing confidential information.  This is particularly quick and easy for administrators to do using Armour Desktop

MessageBurn or Audit Trail

Armour provides various options for storing or deleting old messages.  Some operatives at Sparten prefer to burn messages once they have been read or after a certain time. Others from a legal background often prefer to keep a record of who sent what to whom and when, so that they have an audit trail.  With Armour Mobile, Sparten is able to offer both options to users.

In Summary

Harry Abdy-Collins commented; “Armour Comms is very aware of the needs of its users, and the product continues to develop and evolve.  There are new features within the product that we find extremely useful. The support is also excellent, we are able to speak to technical people who are able to make things happen fast when we need them to.

“In short, Armour Mobile provides the comfort of seriously secure communications, with the flexibility of consumer grade products, that enables our staff, associates and clients to have confidence in our communications and deliver the very best outcomes possible for the client.”

Cyber criminals use deepfake audio on phone call to extort €200k

Cyber Crime

Just when you thought the cost of overseas calls was decreasing…..

As if battling cybercrime wasn’t hard enough, criminals have now weaponised artificial intelligence in the form of deepfake audio. In a recent example, the Chief Executive Officer (CEO) of a UK subsidiary energy company was tricked into wiring €200,000 to a Hungarian supplier on the instructions of who the CEO believed to be the Chief Exec of the German parent company. In reality, the conversation took place with an artificial intelligence (AI) equipped criminal gang using deepfake software to mimic the German Chief Exec. The software was able to perfectly impersonate the voice, including tone, punctuation and German accent, completely fooling the CEO. The call was accompanied by an email, supposedly from the Chief Exec, reiterating the payment instructions. As everything appeared in order, the funds were transferred to Hungary, however, were soon moved on to Mexico and various other locations, with law enforcement still looking for suspects.

Who do you think you’re talking to?

Although this incident reads like the plot line of a Mission Impossible film, it is unfortunately not an isolated case. Since the fraudulent incident in March this year, other deepfake voice frauds cases have come to light. This social engineering attack could be a sign of things to come. Although we have seen deepfakes imitate celebrities and public figures in video format, it’s an endeavour that still takes several hours of footage to achieve. Being able to fake voices convincingly takes fewer recordings to produce and with greater computing power will become easier to create. It begs the question can voice recognition be relied on as an accurate form of identity verification?

Do you know who I am?

In the future, deepfake audio fraud is likely to be highly exploited in criminal activity. As the technology continues to evolve, it will become increasingly more difficult to distinguish real audio from fake. If you want to ensure authentication of identity you need to use a seriously secure mobile comms service.

Armour Mobile uses MIKEY-SAKKE identity-based encryption protocol to secure multimedia services. It provides secure voice and video calls, voice and video conference calls, one-to-one and group messaging and file attachments. The solution ensures that the parties exchanging calls and data are the parties they claim to be!  Most importantly Armour Mobile protects not only the content of communications, but also the associated meta-data. This means no-one even knows you are having a conversation, let alone what that conversation is about.

Imitation – not always the sincerest form of flattery

Deepfakes might have arrived but there are tools to identify the real from the fake. Armour mobile helps prevent fraudulent activity by enabling secure collaboration between trusted colleagues. Communications are conducted within a closed user group and only those added to the system can call and message others. So, when discussing commercially sensitive information such as corporate intellectual property, financial transactions, and customer details, you will know exactly who you are speaking with.

With deepfake ransomware among experts’ list of cyber fears for 2020, it’s time to armour up.

Contact us today for more details.

Time to choose your favourites!

Someone recently asked me how to add favourites in Armour Mobile.  It reminded me that actually, not everyone does use consumer apps, so to ensure that anyone and everyone really can get to grips with Armour Mobile, we’ve developed a library of video clip tutorials to help our users get the most out of the product. The videos guide users through the various tasks and features in the latest version of Armour Mobile for both iOS and Android platforms. 

Each clip runs for between 30 seconds and a minute, so it doesn’t take long to get your users trained up.   Topics include:

  • Message Burn
  • Conference Calls
  • Group Messaging
  • File and Photo Attachments
  • Settings and Biometrics
  • Activation via Deep Link
  • Activation with QR with Password
  • Activation with QR without Password
  • Importing Contacts and Final Setup
  • Ringtones
  • Adding Favourite Contacts
  •  

Contact your account manager today to get links to the videos for iOS and/or Android and see for yourself how easy to use Armour Mobile can be.

Armed Services Covenant – we’ve signed!

Armed Forces Covenant Logo

Armour Comms recently signed up for the Armed Services Covenant (www.armedforcescovenant.gov.uk) and it was one of the easiest decisions, as a company, we’ve ever made.  The covenant is a pledge that together all those that have signed it, acknowledge and understand that those who serve and have served in the armed forces, should be treated with fairness and respect in the communities, economy and society that they serve, sometimes with their lives.

Those that have signed the covenant, which include government, the individual services (RAF, Army, Navy), businesses of all sizes, charities, communities and cadet forces aim to go out of their way to help and support serving and retired personnel and their families.  It is something that we are happy to do, in fact, we are proud to treat all of our staff with as much flexibility and compassion as we can.  As a SME, it’s an obvious way for us to retain good, talented people.

Armed forces veterans have a lot of skills that are highly transferable to civilian life, particularly for a company like Armour.  Early next year we will be actively looking to recruit and ex-servicemen and women are strongly urged to apply.

We have two roles in particular that could suit a veteran.  A pre-sales role where technology knowledge and the ability to explain how our products work to potential customers would suit someone with a good level of presentations skills and confidence.  We will also be looking for people to install our technology at client sites, which will require customer service skills and technical and practical skills.

If you are looking ahead to 2020 for your next challenge, why not contact us now?

sales@armourcomms.com