Secure your mobile phone: 6 top tips to protect your device and data

Heart pounds, palms sweat…that moment when you realise your mobile phone is missing

Mobile device losses and crime stats

It was recently reported[i] that UK government employees lost or had their mobile devices stolen at least 2,004 times in the 12-month period from 1 June 2018 – 1 June 2019. Another study[ii] reported that across Transport for London’s (TfL) network, more than 26,000 electronic devices went missing between April 2017 and April 2018. The devices included mobile phones, tablets, laptops and even drones!

These figures dwarf in comparison to findings revealed by Direct Line Home Insurance[iii]. Its analysis discovered that over 67,000 mobile phones were stolen across the UK in a 12-month period, equating to 183 mobiles phones taken every single day. This figure is based on the number of mobile phones reported stolen to the police. Although a surprising statistic it is unlikely to be a true reflection of the scale of mobile phone crime as a large portion of thefts go unreported. In some more sinister cases, thieves do not intend to sell on the device because the information stored on it is far more valuable.

Keeping your phone secure

With mobile phones being so fundamental to our daily lives it should be a given that steps are taken to safeguard not only the device but the personal and sensitive information contained upon it. Here are our top tips to safeguard your mobile device:

1. Lock your home screen

Set secure passwords (not 1234!) and enable finger print biometrics if you have it. Locking your home screen not only keeps private information private, it also protects from unwanted eyes skimming through your phone.

2. Don’t store sensitive data on your device

But if you must store sensitive data on your device, make sure it is encrypted. Data is worth a lot to thieves, especially given the amount of further information that can be glean from a phone – so protect it.

3. Use secure messaging apps

Consumer grade apps are not suitable for business communications, a fact that WhatsApp themselves make abundantly clear in their terms of service. Keep confidential messages secure by using an app with significantly enhanced security built in.

4. Exercise caution with public USB cables and ports

Even better, only use your own USB cable in public ports and buy a portable battery. It’s not just about caution, they come in very handy if you don’t have a charging socket available.

5. Update your phone software

Software updates are more than about front-end features and functionality. They often include critical patches to security holes, so it’s important to apply updates regularly.

6. Set up remote wipe

If your phone is lost or stolen, you’ll be able to wipe all of its data remotely – and therefore keep it out of the hands of cyber criminals. You can often also use remote wipe to find your phone’s location.

For more guidance take a look at our blog based on the key Secure Communications Principles defined by the National Cyber Security Centre (NCSC).

[i] https://www.bbc.co.uk/news/technology-51572578

[ii] https://www.railway-technology.com/news/tfl-lost-devices-risk/

[iii] Direct Line analysis

Continuity Planning – When face-to-face conversations are just not possible

Continuity planning is a key part of every business, and security should be an important part of that. After all if disaster strikes, the last thing you want is to attract a cyberattack from opportunists.  Strategies should be in place that enable people to continue to work and communicate, ideally, using systems that are already familiar.

Widespread flexible working practices means that for many organisations, people can simply work from home for a few days, or even a few weeks, should the need arise.  However, for some, the work they do relies on face to face conversations.  This can be due to personal nature of the conversations they have such as in the healthcare profession where doctor/patient confidentiality is an issue, or in the legal profession where sensitive negotiations need to take place face to face, or because of the security/covert nature of the work.   In all these cases, when a conversation with someone in the same room simply isn’t possible, it is critical that people have a reliable and secure means of communication to carry on business as usual.

If and when disaster strikes, staff need the most appropriate tools for the job, even if using their own devices.  While routinely allowing staff to use their own devices for reasons of convenience is good for productivity and continuity, the use of unmanaged devices also opens up the business to a whole range of security risks and unsafe or unregulated working practices.  A prime example is the use of consumer grade apps for business use, which is insecure and does not comply with GDPR regulations, as we explain here: https://www.armourcomms.com/2020/02/06/using-consumer-apps-for-business-use-is-illegal/?cat-slug=10

Here are five immediate benefits of using a specialist app to ensure that confidential conversations stay that way.

Five Benefits of Enterprise Grade Secure Communications

Protect all sensitive data – including metadata – It’s about more than just encryption. Enterprise-grade apps have a lot more sophisticated security features than simply encrypting your messages. Meta-data (details of who you called, where you made the call, how long you talked, for example) is also protected, and remains under your complete control (either on your premises or in our secure cloud).

Secure collaboration and increased productivity- Voice, Video, Conference, Attachments, Group Messaging. All the elements that enable you and your colleagues to collaborate productivity, knowing that your sensitive corporate information is fully secured

Limit the life of time sensitive information – with Message Burn messages, documents, videos can all be timed to self-delete (burn) after a set time. This is set by the sender and can be a set time after the message has been sent, or after it has been read.

Optional Audit Trail – For regulated industries, conversations can be audited, so even when using their own devices, staff are still compliant for business operations.

Fast One-click Provisioning – Users are able to download the app from the appropriate app store, and then approved by IT/Security with just one click.  The app can be decommissioned equally as fast should a device be lost or compromised, or a staff member leave the organisation.

Armour has a range of solutions designed to meet most use cases.  These include CPA/NATO/NCSC certified apps, a choice of 128 or 256 bit encryption, with or without audit capabilities that run on most off the shelf smartphones, and Win 10/MacOS desktops.

For more information on Armour Mobile, SigNet by Armour, or Medicomms by Armour contact us today.

Armour showcases secure mobile app solution at Rewired 2020

Consigning the pager to history: 21st century communications for modern healthcare

Frontline healthcare staff work in highly pressurised environments where time delays can be critical, if not fatal. Valuing employees means providing them with the right tools to get the job done.

The rise of smartphone usage has resulted in increasing numbers of healthcare professionals informally introducing this technology to the workplace. It is easy to understand how this situation has arisen. Effective communication is essential; it increases efficiency, builds team relationships and enhances collaboration. BUT, when employees seek workarounds to systems, it’s a clear indication that existing systems aren’t working.

Outdated modes of communication

To understand how smartphones have crept into common use within healthcare environments, it’s important to understand what models of communication currently exist. 1960s technology, such as pagers and faxes, are the status quo within many healthcare settings. The NHS still uses approximately 130,000 pagers, at an annual cost of £6.6 million[i]. More than one in 10 of the world’s pagers are currently used by the NHS. Most mobile phone companies have phased out support for pagers, leaving only one provider in the UK. This means a single device can cost up to £400.

The pagers used in the NHS today are mostly one-way communication devices that can receive short messages but cannot send replies. In order to call back, the recipient must use a mobile phone or find a landline. The recipient is unaware who is contacting them, the reasons why, or the level of urgency. This can interrupt work, waste time, make the prioritisation of tasks difficult. Additionally, the evidence trail of communications is limited.

Pagers only facilitate one to one communication, whereas messaging apps facilitate group interaction. This is particularly useful for collaborating colleagues who are frequently dispersed across a vast hospital campus. A survey[ii] of 60 trusts conducted by the British Medical Journal found that 91.9% of doctors surveyed reported using some form of external instant messaging (IM) app at work. More importantly 83.3% had sent or received an instant message containing patient identifiable data (PID).

Patient safety at the expense of patient confidentiality?

In many instances, IM is simply replacing the informal conversations that occur within working teams. With teams spread across multiple wards it’s not always possible to communicate face to face. The speed of IM allows colleagues to quickly check in on whether an x-ray or blood test has taken place. These speedy communications are invaluable in time pressurised settings.

The problem arises when IM apps encroach on the existing formal communication systems where record keeping and an audited paper trail are deemed essential. The introduction of the EU’s General Data Protection Regulation (GDPR) in May 2018 raises legal and practical implications to the sharing of personal data. Organisations have taken great strides towards understanding their responsibility towards safeguarding data. However, too often the security of mobile communications is overlooked when auditing risks.

Consumer grade apps are not designed for the sharing and safeguarding of PID. The lack of security, transparency and auditability are hugely problematic. However, there is no disguising the fact that IM apps are in use because quick access to essential information at the point of care can make a huge difference to patient outcomes. If technology is not benefitting patient care or clinician workloads, then it raises the question of what purpose is it serving?

A realtime solution for realtime conversations

Within the healthcare sector, efficient modes of communication are not only vital but could be the differentiator in patient outcomes. The availability, portability and connectivity of smartphones provide healthcare professionals with access to health-related content any time and any place. There is huge potential for mobile devices to enhance healthcare delivery without compromising patient privacy or safety.

Armour provides a secure converged communication solution that addresses the unique needs of the health care sector. Security is baked in, not bolted on, ensuring secure internal communications without compromising the user experience. Within a single app, ‘Medicomms by Armour’ o­ffers secure IM, secure video consultations and time limited patient aftercare communications. Beneficially, it also provides secure capture of patient information that can be directly applied to the correct electronic patient record.

Communications without compromising security

‘Medicomms by Armour’ mobile app provides the same level of usability as consumer-grade apps, but with significantly enhanced security. Delivering a secure, efficient and multi-functional replacement for pagers.

Healthcare providers can harness the power of technology to benefit both patients and clinicians. A secure converged application like ‘Medicomms by Armour’ not only provides a fully auditable, transparent and GDPR compliant solution. It saves money by replacing antiquated paging systems that no longer meet the needs of 21st century healthcare setting.

Visit Armour Comms at Digital Health Rewired 2020 at stand F2 to understand how our secure mobile app is transforming communications within healthcare.

[i] https://www.gov.uk/government/news/health-and-social-care-secretary-bans-pagers-from-the-nhs

[ii] https://blogs.bmj.com/technology/2017/11/16/whatsapp-in-the-nhs-framing-the-problem/

Armour Comms participates in Shadowing Women in Technology programme

Over the past week, the female employees of Armour Comms hosted three female students from the Shadowing Women in Technology (SWIT) programme at University College London (UCL). Dr Andy Lilly (CTO) introduced Armour to UCL’s students in an evening presentation that included highlighting the many ways that one’s mobile phone data can be hacked and misused. For the visiting students, the aim was to show them what goes on inside an entrepreneurial start-up developing leading-edge security products; to facilitate this, the students circulated between female employees, observing how their different roles in Marketing, Pre-Sales and Development all contribute to Armour’s day-to-day operation.

Andy (Armour’s CTO) was clear that: “At Armour we respect and value staff diversity and inclusivity, so alongside strong links with universities we want to encourage women to study STEM (Science, Technology, Engineering and Mathematics) topics and to pursue rewarding careers in technology.”

A 2017 study by PwC (involving over 2,000 A-Level and university students) found that only 27% of females would consider a career in technology, compared to 61% of males. A lack of female role models was one of several factors that meant only a meagre 3% of the women said a career in technology would be their first choice. Sadly, the students noted that they, too, were very much in a minority in their own courses.

Andreea (Pre-Sales Engineer), one of the Armour hosts, explained: “While I am a member of the development team at Armour, I also support the Sales team in the technical aspects of their job. I gave the students an overview of the software and tools that I use, including the advantages and disadvantages of different operating systems. I described my experience with meeting customers, feeding back their requirements and contributing to internal meetings and technical documentation. Discussing my various training opportunities, led to interesting conversations about professional development.”

Isabelle (Software Developer), said: “I demonstrated how I contribute to different projects and development processes; from software design and testing, to sprint ceremonies for managing current and future planning. I showed how we needed to interact and collaborate across different departments, working to define expectations, implement and test solutions. I highlighted how our supportive office culture optimises our progression, both as teams working to meet shared goals, and our individual growth in continuing to develop skills and knowledge, keeping up to date with advancements in technology.”

Kayleigh (Marketing) described her role: “We felt it was important for the students to see how marketing – everything from event organisation to design of brochures – fitted into the wider company structure of a technical business. Each student asked plenty of thoughtful questions throughout the day and it was refreshing to see their enthusiasm for daily tasks that we tend to take for granted. I hope this experience demystifies the office environment and encourages them to pursue a career in a technology field.”

Andy was delighted with the students’ engagement, and their wide-ranging questions: “Our team was asked about their backgrounds (from apprenticeships to postgraduates), and what had motivated them to enter this industry, Armour itself and their particular roles. The students enjoyed actively participating in our day-to-day meetings, experiencing technology demonstrations and real-life applications of our development processes. They appreciated the openness of our office atmosphere and asked frank questions about what sort of challenges were encountered when first starting here. We hope all the students gained a lot of useful information and have a better idea of the broad range of career opportunities in technology companies.”

Andreea, Kayleigh and Isabelle concluded: “We hope this experience will ultimately enable them to make an informed decision when they choose a career, and also de-bunked some of the myths and clichés about being a woman in tech, and showed them the importance of having passion for the area that you work in.”

Using consumer apps for business use is illegal

As we’ve commented before , the use of consumer grade messaging apps has spread its insidious tentacles throughout the working environment and it’s easy to see why. Effective communication is essential to getting the job done. With instant messaging, teams can communicate quickly and in real-time, without the delay of waiting for an email response. Geographically dispersed teams can communicate efficiently and remain engaged, improving effectiveness and productivity.

However, is a consumer grade app such as WhatsApp suitable for business communications?

GDPR compliance and liability

WhatsApp was primarily designed for personal use; a fact they make abundantly clear in their terms of service :

Legal And Acceptable Use. You must access and use our Services only for legal, authorized, and acceptable purposes. You will not use (or assist others in using) our Services in ways that: (a) […] (f) involve any non-personal use of our Services unless otherwise authorized by us.

After downloading WhatsApp users are presented with a popup that asks “WhatsApp Would Like to Access Your Contacts”. It goes on to explain, “Upload your contacts onto WhatsApp’s servers to help you quickly get in touch with your friends and help us provide a better experience”.

Agreeing to this means that all phone contacts are now accessible in WhatsApp, irrespective of whether they are business or personal contacts. The problem with this is your contacts haven’t given consent for a third party to process their data. This could be a breach of GDPR  but who is liable?

The tricky business of data consent

Before using WhatsApp, all clients must “Agree & Continue” to accept the Terms of Service. Only once consent is given can users access the service. However, WhatsApp has been explicit in its terms that the app is only for your personal use and has sought the consent of the user for accessing contacts… so, when it comes to GDPR it’s not WhatsApp that needs to be concerned about data consent, it’s the user!

In most instances, it appears that individuals choosing to use WhatsApp for any business communications are in contravention of the terms of service. This limits WhatsApp’s liability in terms of GDPR as they have abdicated all responsibility to the user for seeking the consent of their contacts.

Be safe, or risk being sorry

Since the introduction of GDPR, organisations have taken great strides in understanding their responsibility towards safeguarding data. However, too often the security of mobile communications is overlooked when auditing such risks. It’s easy to do, just ask the owner of Amazon, Jeff Bezos, who was recently allegedly hacked via WhatsApp. Compromising the security of the wealthiest man in the world is no small undertaking.

What this episode, and the many others before it, highlight are that consumer grade apps are not designed for business use. WhatsApp doesn’t hide this fact, it’s written in the Terms of Service, but when did a user ever read those before clicking the ‘Accept’ button?

It’s time for organisations to stop side tracking the issue and provide their employees with the right tools to get the job done. The benefit is not only greater efficiency and productivity within your workforce but secure communications that don’t expose your business to cyber threats. A thought that has probably crossed Jeff Bezos’ mind quite a lot recently.

Armour’s solutions for secure communications work on everyday smartphones, tablets and Windows 10 desktops. With the same usability as consumer-grade apps, but with significantly enhanced security it could be the answer to your security needs.

Read how others have benefited:

Links to Sparten Case study and QuoStar Case study.

Contact us today to discuss a solution.

Huawei, Attack Trees and $5 Wrenches

It’s always a pleasure to see a blog written by Dr Ian Levy (NCSC Technical Director) given the approachable, down-to-earth manner in which he discusses key topics of national security. His latest post covers the DCMS supply chain review for the UK’s future (5G) telecoms networks.

Depending on your preferred flavour of paranoia / news source, it may seem like this decision throws away our last bastions of privacy in the UK and condemns us to a future of (Chinese) state surveillance and espionage. However, one might want to consider this in a broader context, for example: the ongoing “bitter trade battle” between the US and China; growing recognition of the issues around China’s domination of computer manufacturing (so can you trust what’s been baked into the chips inside your laptop?); and balanced against the majority of western youth who think putting embarrassing pictures on Instagram is a good idea (quickly dispelled when they learn that recruiting managers know how to search one’s social media timeline…)

Levy has already addressed the underlying principles for assessing the security of the UK’s future networks but in his latest blog he highlights key points, such as which parts of a 5G system are most critical to protect, the different types of risk (with an example of an attack tree”), how to address particular attack vectors, and the difficulty of managing risk in such a complicated environment, while reminding us all that a $5 wrench can be an effective password hacking tool.

Huawei is an easy target for criticism due to the belief that the Chinese state can influence the company to hide espionage or denial-of-service features within its products, as well as subverting the marketplace through heavily subsidised pricing. However, remember that other manufacturers could introduce risks through poor security ‘hygiene’ (whether this be at a protocol level, such as SS7, or in something as simple – but lethal – as hardcoding ‘backdoor’ admin passwords into switches.

If you’d like some further views on 5G security and its potential impacts, Brookings are informative and highlight just how many aspects of our future, digitally-connected life might be affected if 5G was attacked or simply failed, ranging from our internet-connected fridges failing to automatically re-stock our milk, to our entire 5G-connected autonomous vehicle transport system coming to a crashing halt (with correspondingly huge numbers of human casualties)…

At Armour, the concept of securing one’s communications is key to our business and to our beliefs, whether that be protecting one’s personal privacy or securing government secrets. Using end-to-end encryption and authentication helps to overcome some of the potential hazards of untrusted (or to use the buzzword “zero-trust”) networks. Many of the possible risks being raised around 5G are present right now, whether you’re a CEO using your mobile to discuss sensitive trade deals while roaming on a foreign country’s phone network… or an NHS patient worrying about which of your personal data just got Whatsapp’d between the nurses treating you in a UK hospital…

For more information contact us here.

How secure are your mobile communications? Top tips from the NCSC (part of GCHQ)

In a world where it seems acceptable for the US President to routinely use an unsecured mobile phone vulnerable to monitoring by foreign intelligence services we should all be thankful that the UK’s National Cyber Security Centre (NCSC) continues to work to “make the UK the safest place in the world to live and work online”.

According to the Centre for the Protection of National Infrastructure (CPNI), the UK is a high priority espionage target . Cyber espionage may use any form of cyber attack to steal classified, sensitive data or intellectual property to gain an advantage over a commercial competitor, company, government or nation state, but equally almost any individual (whether of high net worth, or having some knowledge or role of importance) may be a cyber espionage target. In order to achieve success, a cyber-criminal will attempt to identify and then exploit any perceived weakness within your protective security measures and mobile communications are a key area of risk, especially as they are increasingly used as an authentication mechanism for all sorts of logins and financial transactions.

When looking at securing mobile communications, be it voice, video or messaging services, it is important for any solution to deliver 3 key outcomes; confidentiality, integrity and authentication, i.e.

  • keeping your communications private and protected from prying eyes / ears;
  • making sure that those communications haven’t been tampered with; and
  • ensuring that the communications are actually coming from the person you think.

 

While you might think selecting any mobile app that mentions the word “encryption” in its description will solve the first point, not only is this frequently not the case, but security and privacy have much broader considerations, even including where you’re holding your conversations (for a humorous yet worrying example, talking loudly about business on a train . The rapid increase in cases of fake audio (and now fake video) for fraud shows the dangers of compromising integrity or authentication… and we haven’t even got to the insecurity of carrier networks or how everyone is installing audio and video bugshelpful assistants’ everywhere!

So, please go take a read through the advice from those savvy people at the NCSC on the key Secure Communication Principles for all your organisation’s important communications.

As you might expect, Armour’s products are designed to meet these secure communications principles from the ground up, and over the coming weeks we will be highlighting some of the details behind the principles and how you can apply them.

Sparten deploys Armour Mobile to strengthen intelligence led approach

“Armour Mobile enables teams at Sparten working on complex, multi-jurisdictional projects to communicate effectively and securely. Armour helps us to provide the infrastructure we need so that our people can operate at their best, and therefore provide an excellent service to our customers.”

Harry Abdy-Collins, Partner and Investigations Lead at Sparten Group.

Founded on the stoic principles of Wisdom, Honour, Integrity, Practical Intelligence and Excellence, Sparten provides discrete intelligence-led, unconflicted advice to high net worth families, corporates and their advisors.  In keeping with its own guiding principles, Sparten aims to provide the infrastructure to its employees and third party firms to ensure that they can operate to the very best levels.  To do this, Sparten uses a number of tools for secure communications, however, for secure, encrypted conference calls there was only one solution that provides the ease of use, coupled with the range of features and security options required; Armour Mobile.

Business Drivers

Sparten works with a wide range of advisors and third party firms across diverse geographies and jurisdictions on complex projects.  Teams from many partner organisations may be working on multiple different projects with Sparten and secure communications is an important process discipline and enabler.

As Partner and Investigations Head at Sparten Harry Abdy-Collins explains; “Operating in a safe environment that we can control is essential for Sparten and our clients. Regardless of threat or situation, Armour provides us with confidence and communications continuity.”

The Solution

Sparten has deployed Armour Mobile on iOS, Android and Windows Desktop for employees, its professional advisors and their clients. The new secure QR provisioning option makes setting up a new user extremely quick and easy and the Windows Desktop version enables project administrators to set up and manage calls within groups.

Enhanced security features

Armour Mobile has a number of features that are particularly valuable to Sparten. These include:

Secure Conference Calls

While there are other products on the market that can provide secure one-to-one communications, Armour Mobile provides a secure platform for conference calls for both voice and video.  Uniquely, the Armour app isolates the microphone, ensuring that no other app on the phone can listen in or eavesdrop. Even if the phone has been bugged, communications via Armour remain protected and private.

White Listing and Groups

Armour Mobile allows white lists and groups, and sharing of contact details, in a controlled way across communities. This means that Sparten is able to set up groups for each project, ensuring that are no slip-ups when sharing confidential information.  This is particularly quick and easy for administrators to do using Armour Desktop

MessageBurn or Audit Trail

Armour provides various options for storing or deleting old messages.  Some operatives at Sparten prefer to burn messages once they have been read or after a certain time. Others from a legal background often prefer to keep a record of who sent what to whom and when, so that they have an audit trail.  With Armour Mobile, Sparten is able to offer both options to users.

In Summary

Harry Abdy-Collins commented; “Armour Comms is very aware of the needs of its users, and the product continues to develop and evolve.  There are new features within the product that we find extremely useful. The support is also excellent, we are able to speak to technical people who are able to make things happen fast when we need them to.

“In short, Armour Mobile provides the comfort of seriously secure communications, with the flexibility of consumer grade products, that enables our staff, associates and clients to have confidence in our communications and deliver the very best outcomes possible for the client.”

Cyber criminals use deepfake audio on phone call to extort €200k

Cyber Crime

Just when you thought the cost of overseas calls was decreasing…..

As if battling cybercrime wasn’t hard enough, criminals have now weaponised artificial intelligence in the form of deepfake audio. In a recent example, the Chief Executive Officer (CEO) of a UK subsidiary energy company was tricked into wiring €200,000 to a Hungarian supplier on the instructions of who the CEO believed to be the Chief Exec of the German parent company. In reality, the conversation took place with an artificial intelligence (AI) equipped criminal gang using deepfake software to mimic the German Chief Exec. The software was able to perfectly impersonate the voice, including tone, punctuation and German accent, completely fooling the CEO. The call was accompanied by an email, supposedly from the Chief Exec, reiterating the payment instructions. As everything appeared in order, the funds were transferred to Hungary, however, were soon moved on to Mexico and various other locations, with law enforcement still looking for suspects.

Who do you think you’re talking to?

Although this incident reads like the plot line of a Mission Impossible film, it is unfortunately not an isolated case. Since the fraudulent incident in March this year, other deepfake voice frauds cases have come to light. This social engineering attack could be a sign of things to come. Although we have seen deepfakes imitate celebrities and public figures in video format, it’s an endeavour that still takes several hours of footage to achieve. Being able to fake voices convincingly takes fewer recordings to produce and with greater computing power will become easier to create. It begs the question can voice recognition be relied on as an accurate form of identity verification?

Do you know who I am?

In the future, deepfake audio fraud is likely to be highly exploited in criminal activity. As the technology continues to evolve, it will become increasingly more difficult to distinguish real audio from fake. If you want to ensure authentication of identity you need to use a seriously secure mobile comms service.

Armour Mobile uses MIKEY-SAKKE identity-based encryption protocol to secure multimedia services. It provides secure voice and video calls, voice and video conference calls, one-to-one and group messaging and file attachments. The solution ensures that the parties exchanging calls and data are the parties they claim to be!  Most importantly Armour Mobile protects not only the content of communications, but also the associated meta-data. This means no-one even knows you are having a conversation, let alone what that conversation is about.

Imitation – not always the sincerest form of flattery

Deepfakes might have arrived but there are tools to identify the real from the fake. Armour mobile helps prevent fraudulent activity by enabling secure collaboration between trusted colleagues. Communications are conducted within a closed user group and only those added to the system can call and message others. So, when discussing commercially sensitive information such as corporate intellectual property, financial transactions, and customer details, you will know exactly who you are speaking with.

With deepfake ransomware among experts’ list of cyber fears for 2020, it’s time to armour up.

Contact us today for more details.