Built-in versus bolt-on – why security should never be an after thought

Key and Keyhole

We are all looking to do more, be more productive, efficient and organised. With a plethora of unified communication solutions promising to boost productivity by using time in a smarter way, it’s easy to see how these applications are appealing. But are they secure?

Not all applications are created equally

We often hear of high profile security breaches and the resulting financial and reputational issues they cause. This alone should be motivation for product creators to implement adequate security controls into their solutions. However, speed to market and functionality improvements can often take precedence over security.

When purchasing a new car, we take for granted that safety features have been built in, we don’t ask whether we need to retrofit seatbelts and air bags. Car manufacturers have reinvented the way cars are designed, with passenger safety at the heart of the critical thinking design process. The net result is a product that is secure by design with features that work in unison.

Education not blame

Too often employees are cited as the ‘weakest link’ and are blamed for being the cause of security incidents. In reality, these incidents are often caused by users just trying to get their work done, but in the face of complex and poorly designed applications, they are being put in the position of understanding and making complex security decisions beyond their realm of expertise. Secure communications should be just that, secure by default. Security should be there without the user having to think about it, they are not the experts and we should not expect them to make decisions like one.

For example, a secure messaging application might be required to block pasting text out of the app and perhaps even pasting in. However, from a usability point of view, if the message is a phone number or email address, the user probably wants to be able to paste that across into their dialler or email app, rather than having to retype it. Security and usability have to be carefully balanced.

Businesses need to ensure their employees have the right tools required to carry out the job. If users need to have conversations where the content must remain confidential, then organisations need to provide the appropriate solution that enables this transparently. Which means by default removing burden from the user and ensuring that information is not put at risk.

The way forward

It’s time to stop apportioning blame and seeking to ‘fix the user’ but instead design technology to fit the business process and how people behave, rather than asking employees to adjust themselves.

Users shouldn’t have to be security experts and bear the burden of using solutions where security has been bolted on as an after thought. Employees should take security seriously and be an educated user – but they shouldn’t need cyber security credentials to do their day job.

Choosing a secure communications solution such as an Armour product is a positive way to address this issue. Armour Mobile solutions are cost-effective, easy to use with technology that is always designed to be government-grade level secure – proven assurance to our customers that we take security seriously.

It’s time for the tech industry as a whole to step up and start thinking about the needs of the user and not hiding behind ‘user error’.

Andy Lilly of Armour Comms appointed Chair of Technical Standards Committee at Secure Chorus

Secure Chorus Logo

Armour welcomes NCSC to Secure Chorus

London, UK, 30 April, 2018, Dr Andy Lilly, CTO of Armour Communications, has been elected as Chairperson of the Secure Chorus Technical Standards Committee.  Armour Comms are a founding member of Secure Chorus, which recently welcomed the UK’s National Cyber Security Centre (NCSC) into the organisation. Secure Chorus serves as a platform for public-private sector collaboration in developing a security baseline for secure multimedia communications: this is a key strand in the UK’s digital economy strategy, “to make the UK the safest place to live and do business online”, as regularly espoused by Matt Hancock, Secretary of State for Digital, Culture, Culture and Sport (DCMS).

Dr Lilly commented: “In addition to the UK government’s requirement to protect OFFICIAL and OFFICIAL SENSITIVE communications, it is key that the resulting multimedia systems provide interoperability between different vendor systems, to support the creation of pan-government and pan-enterprise collaboration capabilities. The definition of suitable forward-looking technical standards is critical to enabling this interoperability and promoting the growth of the associated networks and services both across the UK and internationally.”

Armour has had a key role in Secure Chorus since the group’s formation, working to define and develop the underlying security technologies into products such as Armour Mobile, demonstrating how communications applications can be created that combine the ease-of-use of social media apps while providing the security and seat-of-trust needed by government, defence, finance, healthcare and enterprises who need to protect and control their mobile communications on off-the-shelf, commercial smartphones, tablets and desktops.

About the National Cyber Security Centre

• The UK Government is fully committed to defending against digital threats and set up the National Cyber Security Centre last year through the five-year National Cyber Security Strategy, supported through £1.9 billion transformative investment.

• The NCSC provides a single, central body for cyber security at a national level and is the UK’s technical authority on cyber. It manages national cyber security incidents, carries out real-time threat analysis and provides tailored sectoral advice.

• GCHQ is the parent body for the Centre, meaning that it can draw on the organisation’s world-class skills and sensitive capabilities.

About Secure Chorus Ltd

• Secure Chorus is a not-for-profit, membership organisation, serving as a platform for public-private collaboration and development of common standards and capabilities for secure communication for the global digital economy.

For more information visit www.securechorus.org and follow the company on LinkedIn and Twitter.

  

Armour Communications and Metro Communications agree partnership

Metro Communications Logo

London, 24 April 2018: Armour Communications and Metro Communications have joined forces to help businesses and VIPs keep their calls, messages and data private and confidential.

Armour Mobile enables secure collaboration between trusted colleagues when discussing commercially sensitive information such as corporate deals, intellectual property matters, financial transactions, customer negotiations or for VIP’s the details of their day to day lives.

Armour Mobile prevents mobile communications including voice, messaging, file transfers, video or even conferencing from being intercepted by illicit or unwarranted surveillance, keeping both conversations and associated data private. Importantly, Armour Mobile can provide this not just in a local environment, but also for the corporate traveller keeping communications secure even when using untrusted networks, anywhere in the world.

David Holman, a director at Armour Communications commented; “Armour Comms is committed to working with our partners to  deliver secure mobile communications on every day devices to businesses and high profile individuals. Metro Communications brings a solid track record of dealing with corporate executives and high profile individuals and doing so in a discerning, confidential and trusted manner. We are delighted to partner with Metro Communications and look forward to delivering our  secure mobile solutions to Metro Communications customers.”

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS 140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

Peter Matthews, CEO of Metro Communications, said: “We’re delighted to be working with Armour Communications to provide a world-class service to our customers – businesses and high-profile individuals. Organised criminals, lone-wolf hackers and state-sponsored organisations are accessing private phone calls, messages and data sent from mobile phones. This is a very real threat, and it will only increase. Armour Mobile has been certified by the National Cyber Security Centre (NCSC) and approved by NATO. This powerful, user-friendly app removes many security concerns for businesses and VIPs, giving them complete peace of mind.”

Metro Communications provides only the highest quality telecommunications and IT solutions to people and businesses. Metro customers who pass strict security checks can now use Armour Mobile to keep their communications as they should be – secure and confidential.

British companies at RSA to showcase UK leadership in cyber security

SAN FRANCISCO, California, April 17, 2018 – Five British cyber security companies will showcase their ground-breaking products and services to the US market at the RSA Conference in San Francisco on April 16-20, 2018.

The companies will demonstrate their innovative solutions in a broad range of cyber security requirements – such as the protection of critical assets and infrastructure, prevention and detection of cybercrime, as well as their commitment to cutting-edge research – at the UK Pavilion and through a series of ancillary events, with the support of the UK’s Department for International Trade (DIT). The companies look to develop close partnerships and forge lasting relationships that will support the US cyber security sector in its aims of securing the safety of the nation.

  • Armour Communications will show a new Message Burn capability for Armour Mobile, which gives users the ability to set a burn time for particularly sensitive messages.
  • Bob’s Business will demonstrate its specialty in developing and delivering information security awareness campaigns.
  • iProov will demonstrate its new HTML5, no-app mobile web solution, which won the Best of Show Award at Finovate Europe.
  • Garrison will showcase its unique Silicon Assured Video Isolation technology, which provides a game-changing platform for secure remote browsing.
  • MetaCompliance will showcase its platform, which has the highest-quality cyber security and compliance e-learning content available on the market.

 

DIT will also partner with British Secure Mobile Gateway company Wandera to host a night focused on UK cyber excellence. The evening will feature Jane Frankland, a UK cyber security expert and author of the book IN Security, about why women in cyber security should be the standard and not the exception. She will remark on her 20+ years in the industry and host an exclusive book signing.

The UK’s cyber security industry, worth $31 billion and growing at a rate of 10% per year, is respected across the globe for its expertise, breadth of capabilities, and world-class advice, products and services.

Last month, DIT’s Secretary of State Dr. Liam Fox launched a new Cyber Security Export Strategy to promote the UK’s world-leading expertise and to strengthen defense capabilities in the UK and allied countries. Composed of approximately 800 innovative companies, the UK cyber sector currently exports $2.1 billion worth of technology and services per year, a number anticipated to grow in line with the overall global spend on cyber security products, expected to exceed $1 trillion by 2021. This new cyber security export strategy supports the ongoing work of the 2016 National Cyber Security Strategy, which invested in the cyber security industry to ensure the UK is secure, resilient to cyber threats, prosperous, and confident in the digital world.

Andrew Whittaker, Her Majesty’s Consul General to San Francisco, said:

“The UK government’s commitment to cyber security is clear. Our world-leading National Cyber Security Centre is now 18 months old and doing excellent work as the authoritative voice on information security in the UK, and the recently published Cyber Security Export strategy will help support British firms in overseas markets. The government’s $2.7 billion investment in its National Cyber Security Strategy will ensure that the UK continues to lead the development of cyber security capability across the world, and the five companies at RSA next week are fantastic exemplars of British excellence in this field.“

CallKit – the good, the bad and the ugly

CallKit integrates VoIP services with other call-related apps on the Apple device, using the same native interface, making it easier for users as they use the same dialer for all calls.  However, it’s not plain sailing and CallKit does have its limitations.  Here’s our take on it…

The Good

CallKit provides a more typical Apple interface, which is great for the user experience and provides anonymity when receiving secure calls, particularly when in a public place, because all calls look the same.  It provides integration features with other types of incoming call, which means that Armour users are able to prioritise their secure calls over a standard call, and so avoid interruptions.

The Bad

Calls made with CallKit appear in the regular iOS call log, which used to be synced to iCloud.  The sync to iCloud may be turned off, but can you rely on users to remember to do that? Importantly, this means that meta data for secure calls also appears on the standard phone log – which is far from ideal.  To identify the incoming caller, their information would need to be in the Apple push, which may mean that it requires access to the secure contacts database, which could result in call details being stored outside of the secure database, all of which would contravene a CPA certified solution.  And, all of which could give away valuable metadata to an attacker.

CallKit provides the user with an incoming call interface on the lock screen, however, if your secure comms app is held behind a secure login, it may not initiate for the incoming call.

The Ugly

The user interface is limited to Apple’s standard phone app, which means that additional functionality (i.e. buttons for messaging, video and conferencing controls) can’t easily be displayed.  CallKit also has limited ability to deal with video calls, for example, video needs to be enabled at both ends for the call to take place (whereas Armour Mobile will allow one-way video calls, since this better fits with the security and usability requirements of our customers).

Users may require the ability to disable CallKit.

Our overall take on CallKit is that while it can cause more problems than it solves, it does solve some specific issues in specialist use cases, and for this reason we will be including CallKit in an upcoming version of Armour Mobile, so that our clients have the choice.

In the midst of a Cyber Attack who you gonna call – and how?

Who you gonna call

Don’t rely on the very IP channel that has just been hacked, because your adversaries will be monitoring it!

If (when!) your organisation succumbs to a cyber-attack, the first thing you need to think about, when assessing the situation and putting together a plan for recovery and future mitigation, is exactly how you are going to communicate.  Whether it is the IT department discussing the technicalities, or communicating with senior managers and the board to keep them abreast of events, the last thing you should do is use the very platform that has just been compromised, ie, your corporate network.

In layman’s terms, if your email has been hacked, sending an email to your friends asking for help is nonsensical – your email alerts the hackers to the fact you’ve detected their presence.  And, you can’t tell if any of the responses are genuinely from your friends or from the hackers messing with you.

It is very common when hackers have compromised a system for them to watch carefully for the responses from any IT resources that are tasked with countering their attack. Typically this includes watching and subverting any communications channels that IT may be using.  It’s not unusual for hackers to send spoof messages to try and assess just how well the IT team understands the nature of the attack, to capture new passwords or other changes to security, and prevent key messages from being delivered.

During the initial investigation phase of a cyber attack it is difficult to know what systems have been compromised, so it is best not to rely on any of them, if possible.

By protecting the communications of the IT and digital forensics team, you are blocking a very useful source of information from being intercepted or modified by the hackers. In addition, by using a secure communications platform, such as Armour Mobile, and having the secure comms hosted by a third party, you are further isolating the IT team’s comms from the potentially compromised systems that they are trying to recover.

For third party ‘blue teams’ brought in to handle such hacking situations it makes perfect sense for them to bring their own secure comms solution with them – and this is a question that you should be asking any would-be supplier when tendering for such services.

Armour is now working with a number of organisations that can provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance, to incident management and response, and technical security research.

When it’s sent, it’s out there, right? – Wrong!

Message Burn

With Message Burn you get to choose how long your messages last. 

When you send a sensitive message how can you be sure that only the intended recipient sees it, and that it is not lying around on a phone somewhere for others to find at a later date?

While for the majority of chitchat on consumer-grade messaging apps it really doesn’t matter, when you are sending more sensitive, work-related communications, who sees it and what happens after that can literally be a matter of life and death in some cases (for example, a journalist in an unfriendly regime meeting an interviewee, or in the case of covert ops).

With a facility like Message Burn, users can limit the life of their sensitive data at rest.  Users can set a time for their message to dissolve, disappear or as the name implies, ‘burn’. This can be either a future date and time, or an amount of time after the message has been read by the recipient. While some other enterprise apps allow one or the other, Armour Mobile provides the flexibility of both options for the user via an intuitive interface.  The ‘burn’ time can be set for each individual message.  So, for example, a user may send several low sensitivity messages without any burn time, and then one highly sensitive message regarding, say, a meeting time/venue, or a sensitive contact name, with a very short burn time.

The burn time can be applied to messages, and their attachments (which can be pictures and/or files), for one-to-one messages and to group chats. To ensure that messages to important users aren’t accidentally sent without appropriate ‘burn’ protection, you can also define default message destruction settings for any user or group, so that accidentally pressing the send button never results in sensitive data hanging around for any longer than it should – incidentally, this meets one of the key requirements for GDPR, should that be a concern for your organisation.

Message Burn will be incorporated into Armour Mobile in the next major release.  For more details contact us now: sales@armourcomms.com

 

Armour Communications announces the release of Armour Desktop for Windows 10

Government certified secure mobile communications app continues to lead market with expanded functionality

London, 15 February 2018: Armour Communications, a leading provider of specialist, secure communications solutions, has today announced the general availability of Armour Desktop.  Armour Desktop extends the secure mobile communications capabilities of Armour Mobile via a Windows 10 softphone and is fully interoperable with Armour Mobile.

David Holman, a director of Armour Communications said: “At Armour we are committed to extending our range of secure communications solutions that enable trusted colleagues to collaborate safe in the knowledge that their mobile conversations and associated metadata is secure. Our new Armour Desktop which runs on Windows 10 enables staff both inside and outside of the organisation to communicate within a secure and private environment, while taking advantage of the reduced costs and increased flexibility of Voice over IP communications.”

A government certified solution, Armour Mobile can be downloaded from the app stores and used on company-issued or staff owned devices (BYOD). It is easily deployed and centrally managed either on the Armour secure cloud, or as a full on-premises installation, giving a completely secured and controlled solution.

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

For more information or to download Armour Desktop click here

Armour Communications included in Gartner’s Market Guide for Secure Instant Communications

London, 13 February 2018: Armour Communications, a leading provider of specialist, secure communications solutions, has announced that it has been included in Gartner’s Market Guide for Secure Instant Communications[i]. The 2017 Market Guide defines secure instant communications solutions as those that “protect the confidentiality and integrity of voice, text and video communications sent over mobile and wireless networks, while also providing archiving functionality.” Armour Communications is listed alongside other Representative Vendors that offer security instant communications.

David Holman, a director of Armour Communications said: “We are delighted to be included in Gartner’s Market Guide for Secure Instant Communications. We believe that, with regulatory compliance and the increased number of privacy-invading mobile apps now prevalent, security and risk managers are looking for solutions that enable secure communications and archiving for voice and text in order to protect important and confidential information.

“To us, what is apparent from the Market Guide is that organisations should not rely upon consumer apps to protect their communications. We feel that, while they may provide some security capabilities, they are inadequate to ensure proper enterprise-level security. We believe that features such as an administrator account, integration with directory services, archiving, monitoring and encryption certifications are all essential to manage secure communications across an enterprise.”

Gartner states in the Market Guide that “Security leaders in organizations that have a real need for protecting instant communications will discover that the total cost of purchasing and implementing an enterprise-grade solution is not as high as having to make a consumer solution work in specific enterprise scenarios.”

Armour Mobile is a government certified solution and can be downloaded from the app stores and used on company-issued or staff owned devices (BYOD). It is easily deployed and centrally managed either on the Armour secure cloud, or as a full on-premises installation, giving enterprises high security, control and privacy for their corporate data.

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

[1] Gartner, ‘Market Guide for Secure Instant Communications’, Dionisio Zumerle, Gregg Pessin, 18 December 2017, ID: G00314063.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.