Advice from NCSC – Using Secure Messaging, Voice & Collaboration Apps

NCSC recently published a blog containing some great advice about using secure messaging, voice and collaboration apps. https://www.ncsc.gov.uk/blog-post/using-secure-messaging-voice-and-collaboration-apps.  

As the world of work has morphed into one of hybrid working where many people now work partly from home, partly from the office, and often other locations while travelling, so people have adopted messaging and collaboration apps for business use.

However, as many headlines in the press have highlighted, consumer-grade apps are simply not designed nor suitable for business use.  Apart from the fact that none of these apps address the rigours of data privacy legislation such as GDPR, there are some serious security concerns around the wholesale selling or distribution of users’ data and meta-data by the multi-national organisations that own many of the consumer apps.

Here are just some of the issues:

  • User details can be sold to third parties

 

  • Even with end-to-end encryption meta-data can be hacked and compromised

 

  • Your location and who you are talking to can be visible

 

  • There is no management of users – anyone that finds your mobile number could contact you

 

  • User identities are easily spoofed – you can’t be sure who you are in contact with

 

  • Data privacy regulations, like GDPR (and others) are flouted

NCSC spells out exactly what organisations should look for when procuring a secure messaging and collaboration solution that is suitable for business use, and in our White Paper we outline exactly how Armour Mobile meets and exceeds those requirements.

To download your copy, please complete this form:

Unity by Armour Secure Conferencing an SC Awards Finalist

We are delighted to announce that Unity by Armour has been shortlisted for an SC Award for Best Communications Security Solution.

Unity is the third Armour product to be a finalist, and it is the 5th year in a row that we have been shortlisted.  Armour Mobile won the award for Best Mobile Security Solution in 2019 and SigNet and Armour Mobile were Highly Commended in the same category in 2021.

 

Enterprise Conferencing that’s more secure and easier to use

Unity by Armour® delivers secure conferencing in an easy-to-use app for mobile and desktop use, with enterprise security features not provided by free-to-use consumer products including a choice of cloud or on-premises installation to ensure data sovereignty. Unity is available in several configurations to ensure the level of security matches the sensitivity of the conversation. Unity combats the issue of ghost callers that may eavesdrop on sensitive conversations by highlighting to all users whether a participant has joined the call via an app, or securely via a browser –browser options often increase vulnerabilities.

Unity extends the Armour ecosystem by working in conjunction with Armour Mobile to provide pre-defined or on-the-fly secure video conferencing, screen sharing and integration with secure chat groups and interconnectivity with trusted unified communications systems.

Unity delivers picture-in-picture and multiple screens, and offers a familiar video conferencing interface, making it easy and intuitive to use.

If your organisation needs a conferencing tool with enterprise capabilities and security credentials to match, call us today to find out more

Tel: +44(0)20 36 37 38 01

Protecting Sensitive Comms on BYOD Devices without resorting to MDM

Managing corporate data on Bring Your Own Devices (BYOD) has been a thorny issue for years. Businesses and employees alike appreciate the convenience of people using their own devices, and in fact, the organisation probably doesn’t have much choice in the matter without taking draconian measures. However, protecting sensitive information that finds its way onto unmanaged devices can open organisations up to risk of industrial espionage and even threaten national security, quite apart from more mundane, but nevertheless serious data protection regulatory issues (GDPR being the most obvious).

 

Athletes advised to use burner phones for security reasons

To add to those threats, if people travel abroad they may find their devices compromised by lapses in local security. A recent case in point was athletes and teams taking part in the Winter Olympics in China. Many governments advised people to take burner phones and hire laptops once there, rather than risk their own devices becoming compromised. Full story here: https://www.bbc.co.uk/news/world-asia-china-60034013

Burner phones create additional security issues

This raises an important point, that of the additional complexity posed by the use of burner phones.  Typically they are bought in country, used and disposed of prior to return. These phones, usually Android, for cost reasons, should be considered unsafe because their provenance cannot be certain. Using apps on such phones can create undue risk and uncertainty as they may have been ‘jailbroken’ (modified to remove restrictions imposed by the manufacturer, to allow the installation of unauthorised software) or contain potentially malicious apps from local carriers or distributors.

 

Managing BYOD without MDM

True BYOD devices that are owned by the employee create a different challenge. Employees do not like the fact that their employer might wish to take control of their personal device with a Mobile Device Management (MDM) solution, and so have the ability to restrict the use of the capability of the device e.g. disable the camera. However, the concerns around corporate data being held on a device that is not owned or controlled by the business must still be addressed – something that Armour can do without the need for a full MDM solution.

 

How Armour helps

Armour Mobile and SigNet by Armour provide a mobile comms solution that completely isolates the communications and any associated data, metadata or files (attachments such as documents, images, video clips). All data is encrypted and secured within the app protecting contacts, messages and attachments from malware on the device or if the device is lost or stolen. The ultimate goal is to minimise the organisation’s risk by reducing the residual data held on the device. Armour’s products are Secure By Design, for example technology in the app requires sole use of the microphone ensuring rogue apps are not ‘listening’ in to voice or video calls.

In addition, before the app can be used, the Armour software checks to see if the device has been jailbroken, if so, the user will not be able to use the Armour app.

Armour provides its own viewers for certain types of attachments, so as not to share information with the operating system or third-party viewers, and preventing the user from sharing the attachment (and its sensitive information) outside of the Armour app, thus avoiding the potential for data leakage.

To avoid the use of the public internet and untrusted, insecure networks, the Armour apps can be installed in a variety of ways. Depending on the specific use case requirements this can include via SD card or via a completely closed VPN network (using additional technology from Armour technology partners).

Armour Mobile and SigNet also include many security features within the app to protect against data leakage.  This includes the Message Burn and Disappearing Messages features, where the sender of a message can set it to automatically delete at a set time, either after it has been read, or after it has been sent.  This feature can be deployed as a standard setting across chat groups or communities of users.

In the coming months we will deliver the capability to remote wipe any data held within the Armour app on devices that have been lost, stolen or otherwise compromised and in addition will have the ability to centrally control the length of time messages are available to be accessed on phones.

For more information about how Armour can help you to ensure secure communications even when using BYOD devices, contact us today: sales@armourcomms.com

Armour achieves Cyber Essentials Plus

Cyber Essentials Plus 

As a cyber security vendor, and an advocate for a Secure by Design approach to developing products and services, we believe that validation by independent third parties is an important process, and one that generates many benefits, not just for ourselves but our customers too.  We are committed to continually improving our internal processes to ensure that they are of the highest quality and stand up to external scrutiny.  We are therefore delighted to announce that we have now achieved Cyber Essentials Plus certification for our whole organisation.

Cyber Essentials is a government backed scheme that helps organisations to protect themselves from a whole range of cyber attacks. There are two levels of certification:

Cyber Essentials, which is a self assessment framework (which we’ve held since 2017)

Cyber Essentials Plus, the higher level of certification which includes additional external technical verification.

More details here: https://www.ncsc.gov.uk/cyberessentials/overview.

We undertook this extra level of certification to provide additional peace of mind to our customers that our internal standards of cyber security comply with industry best practice. In submitting to a thorough and rigorous external verification, we also received feedback, which is a highly valuable part of the process.

Cyber Essentials Plus (CE+) certification is completed annually, and as such, demonstrates our continual commitment to ensure our processes are constantly evolving and improving.  CE+ complements our ISO27001 certification – a proven methodology for ensuring processes are security focused – achieved in March 2021.

Secure by Default is in our DNA

At Armour, Secure by Design and Secure by Default principles are in our very DNA.  We’ve been working with the NCSC for many years to ensure that our products conform to the appropriate industry standards, and are designed with the end user in mind. If a security product isn’t easy to use, then it isn’t a security product (because the end user will simply find something that is easy to use instead).

Cyber Essentials Plus is the latest milestone in our mission to demonstrate that we practice what we preach – our internal processes have been validated as cyber secure. This focus on external certification fosters a cyber-aware environment for our employees so that they are able to deliver great products that are Secure by Design, directly address the real-world challenges of secure communications, and that people enjoy using.

For more about Secure by Default, Secure by Design and the NCSC’s Principles Based Assurance read our blog: The Future of Technical Assurance

The Future of NCSC Technical Assurance

ncsc assurance

The NCSC has now unveiled its vision for the future of assuring high technology products including secure communications systems such as Armour Mobile.  In its recently published white paper NCSC has announced its Principles Based Assurance (PBA).

In a fast-moving, more connected world, assurance needs to cope with the ever-evolving landscape of threats and technologies.  The NCSC has developed a methodology that is more flexible and agile than the previous stance – which focused on specific product versions mitigating each defined threat by a defined means.

Principles Based Assurance enables a very practical approach that aims to set the basic tenets, by stipulating the outcomes – the ‘what’ – and then leave the ‘how’ to be devised by the vendors and suppliers who have expertise in their particular niche.  A pertinent example of this cited in the white paper is that ‘technology cannot silently default to operate insecurely’ – something we’ve seen time and again with consumer-grade communications apps.  By leaving the ‘how’ to the vendor community, the NCSC fosters innovation, a key point highlighted in the UK’s Integrated Review of Security, Defence, Development and Foreign Policy 2021.  It discusses the ambition of equipping our armed forces with cutting-edge cyber capability, which Armour Comms is already involved with through our work with the MOD.

The phrase ‘Secure by Default’ is central to this thinking, where security is designed into the product, without compromising the user experience.  Secure by Default is about taking a holistic approach to solving security problems at their root rather than treating the symptoms – this approach is embedded in every aspect of Armour’s development and service delivery.

Assurance in context

The new Principles aim to provide an assurance framework that takes account of the threats and risks that a given technology is looking to mitigate.  For example, Armour Mobile can be hosted within the Armour secure cloud, or can be delivered as an on-premises solution giving the end-user organisation total control over every aspect of the deployment and usage.  The decision would be made based on the customer’s level of risk appetite.

The principles will cover three key areas:

  • Product design and functionality principles – describing the features a product needs to implement
  • Product development principles – describing how a product should be designed, implemented and tested
  • Through-life principles – describing the security measures that need to happen beyond development

 

The Secure by Default principles as prescribed by NCSC are:

  • security should be built into products from the beginning, it can’t be added in later
  • security should be added to treat the root cause of a problem, not its symptoms
  • security is never a goal in and of itself, it is a process – and it must continue throughout the lifetime of the product
  • security should never compromise usability – products need to be secure enough, then maximise usability
  • security should not require extensive configuration to work, and should just work reliably where implemented
  • security should constantly evolve to meet and defeat the latest threats – new security features should take longer to defeat than they take to build
  • security through obscurity should be avoided
  • security should not require specific technical understanding or non-obvious behaviour from the user.

 

Secure by Default is in our DNA

We’ve been working with NCSC for many years, indeed, our products were CPA certified while that scheme was applicable.  The Secure by Default principle is one that we’ve subscribed to since the early days of developing our Armour Mobile products (based on NCSC’s MIKEY-SAKKE key management) and our SigNet products (using alternative, leading edge cryptography).  With this in mind, we’ve achieved ISO27001 certification – a proven methodology for ensuring processes are security focused.  As well as a security-first approach to ensure that our products meet the requirements of our customers, they are also designed with the end user in mind, since usability is important to ensuring user engagement.  Feedback from our users is that people enjoy using the Armour secure collaboration products and find many more use cases for it than we originally imagined.

 

For more information about how Armour Comms can help your organisation to adopt a more secure approach to communications and collaborative working, contact us today

JPMorgan fined $200m for mis-use of WhatsApp

JPMorgan Securities has agreed to pay $200 million in fines over issues related to employees’ ‘widespread’ use of unapproved communications methods like WhatsApp.  Two US regulators, the Securities and Exchange Commission and the Commodity Futures Trading Commission, found that employees had been discussing business matters outside of approved channels.  More details here: https://www.cnbc.com/2021/12/17/jpmorgan-agrees-to-125-million-fine-for-letting-employees-use-whatsapp-to-evade-regulators.html

$200m is a heavy price for any organisation to pay, not to mention the reputational damage.  In addition, those individuals who get caught using non-approved methods of communication, could stand to lose their jobs as well.

Traders losing their jobs

This is the latest in a series of high profile cases where communicating via social media apps (such as WhatsApp) has resulted in senior personnel losing their jobs.  In October 2021, Morgan Stanley’s most senior commodities traders departed after the firm discovered they had been using WhatsApp and had failed to supervise the use of communications within the commodities team. Whilst no wrong-doing has been found, it reflects Wall Street’s continued clampdown on communications channels that it cannot monitor.  Federal law requires financial firms to keep meticulous records of electronic messages between brokers and clients so regulators can make sure those firms aren’t skirting anti-fraud or antitrust laws.

Armour has the answer

Armour provides an alternative to WhatsApp that is every bit as convenient and easy to use.  Armour Mobile has many additional security features (there’s more to security than simply end-to-end encryption – although that is important), such as:

  • centrally managed communities – so users know that they are communicating with genuine, authenticated contacts – dramatically reducing the chance of deep fake scams;
  • no requirement to use a personal cell phone number – any unique identifier can be used, safeguarding staff against having to divulge their personal numbers to colleagues;
  • enterprise fast and secure provisioning for new users via one-time use QR codes.

As well as these superior security features, and broad functionality that covers voice, video, messaging, group chat and conferencing, Armour Mobile also has Archive and Audit capabilities making it compliant with industry regulations and GDPR.

Recall by Armour – Archive and Audit capabilities

Armour Mobile and Armour Desktop support an additional module of the Armour product range that provides audit capability enabling its secure communications (messages, attachments and audio) to be captured in their entirety within the centralised audit system, allowing retrospective analysis of all conversations.  Each entry within the audit system is stored in its original, fully encrypted form, protecting it as securely as when it was transmitted over-the-air.  The decrypted content can only be retrieved when an auditor with sufficient privileges has access to the Recall audit tools, to the audit records, and has been given access to the key material relating to the specific user to be audited, allowing the auditor to perform the necessary decryption tasks.

Here are the key points:

  • With an on-premises installation, the Armour system can be set up to support a centralised audit record that will enable the details of every message, attachment and audio call to be securely stored for later review.
  • All transmitted media (text, attachments and audio) are archived in the audit database.
  • Authorised access to audit records requires an auditor to request the encryption keys for a specific user from an administrator who has sufficient rights to provide these keys.
  • All access to audit files are themselves audited to provide a full history of events.
  • In order to review calls, auditors require access to a special set of Armour Recall audit tools.

 

For more information about how Armour Comms can help your organisation avoid the risk of crippling fines and reputational damage by using an enterprise secure communications system that includes archiving sensitive conversations.

Contact us today: sales@armourcomms.com

Five Gold Rings – The Hidden Gems within Armour Mobile

In these days when there is an app for just about everything, we’ve all grown used to downloading new software.  We expect to be able to use the app in question immediately for whatever it was that we first wanted it for.  But how often do we look at the detail, or explore what else the software can do?

Some geeky types do, but most of us just want to get on with our day, and we may well be missing out on some cool features that would save us time.

So, our geeky types have got together to provide edited highlights of the best ‘hidden gems’ within Armour Mobile and SigNet by Armour that could make your day a bit easier.

Contact Management Features

Armour Mobile includes several features to help with contact and list management.  Whether you want to set up a group for a one-off chat, set up a project group for on-going calls, or share contact details with a group, here are a couple of tips that will save you time.

A quick way to share contacts – using the paperclip

You can share contacts via message chat or by selecting export contacts and sharing as a message (if you still have the original contacts file stored within Armour Mobile).

While in the Message facility for both 1-to-1 and group chats it is possible to quickly send either individual contact details or a file of contact details to everyone in the chat session. Simply click on the paperclip icon at the bottom left-hand corner of the screen and select ‘Send Contact File’ or ‘Share Contacts’. If you select ‘Share Contacts’ you are presented with your contacts list from which you can select one or more contacts.  There are a couple of options, here.  You can either click on each entry you wish to share, or click on the box in the top right hand corner to select all contacts, you can then deselect people from the list (sometimes this will be quicker depending on how many contacts you wish to share).

When you have selected the contacts click on ‘Share’ at the bottom right-hand corner of the screen.  Once ‘Share’ has been clicked a new entry is shown in your message timeline, which summarises how many contacts your are sharing (good to check it is actually the number that you are expecting). Then click ‘Send’ to share with everyone in the conversation.

Export contacts to import later – for a new device or to set up a specific sub-group

You can export contacts as a file that can then be imported later on. This is useful for a new device or to set up a new group for a specific call, or an ongoing project.

A file of contacts can be created by selecting the ‘Settings’ option and then selecting ‘Contacts’ and from there selecting ‘Export Contacts’.  Your entire Contacts List is then displayed and you can use the buttons down the right hand side of the screen to select those entries you wish to include in the file (alternatively, click the box in the top right hand corner to select everyone, and then deselect any that you do not want). Choose the default option ‘Save to device’ and click on ‘Export’ in the top right-hand corner of the screen.

To protect all the sensitive details held in the Contacts file it’s essential to enter a high quality password to protect the file. Enter a password and then enter it again to confirm, then click on OK. The file is now saved with the name being the current date and time, for example: 2021-12-07-16-34.

Message Burn in Group Chat

As well as setting the Message Burn feature to delete messages after a set period of time for chats with individuals, it can also be used for group chats too, which saves time and is more secure.

In a group chat, at the bottom left-hand corner of the screen, just above where you type in new messages there is a small calendar+clock icon with the text ‘Message Burn: Never’. Click on the text to allow messages for the entire group to be deleted after a configurable period of time. This could be a number of days, hours or minutes.  Message Burn can be timed from when the message was read, or when the message was sent, and it can be applied to a single message or to all messages sent to the group.

‘Scan text’ facility in iOS 15

For those using an iOS 15 device, briefly touch the cursor in the text entry field and this will then display the text ‘Scan Text’. Touch this text and then the camera is triggered to enable you to use Optical Character Recognition (OCR) to scan text into a message.  This is a native feature of iOS 15 which we’ve included within Armour Mobile to provide a convenient and fast means of inputting text into a message.

Note to Self feature in SigNet

SigNet by Armour, our alternative product line to Armour Mobile, has a Note to Self feature which gets rave reviews from those that use it.  If you’ve woken up in the middle of the night with a brainwave, or think of something while in a meeting, send a note to yourself with SigNet. Simply go to the ‘Chats’ section – select from the bottom of the screen, and click on the ‘Note to Self’ option.  From here you can send yourself a message, either in text, as a recording or a photo. The note will also appear on any connected devices, including your Windows desktop.

Time to make cybersecurity personal

It’s been a tough 18 months for everyone, and as things start to get back to some semblance of normal in the UK at least, many people are enjoying a bit of down time.  Some are playing PCR bingo and going abroad, while others are stay-cationing.

When staff are in holiday mood – will they throw caution to the wind?

While relaxing on holiday, will your employees remember your security protocols?  The harsh answer is probably not!  It’s not just the corporate information stored on personal mobile devices, or business devices that are also used for personal use, that could be compromised, it is their own personal privacy.

With the spectre of mobile network roaming charges (due to UK leaving the EU), some people may choose to use standard voice calls to keep costs down, but these easy for hackers, malicious actors (eg. business competitors) or foreign network carriers to intercept.

When taking business devices abroad, how does your organisation manage the export controls of taking data overseas?

On a personal level, will staff remember not to access their banking apps over an untrusted (hotel) Wi-Fi connection?

There’s a lot to think about – especially when people are fatigued by security measures in their working lives that can make getting ‘the job done’ that bit more laborious.

Personal Privacy is being infringed – Every day

Enlightened self-interested is as big a motivator as any to get people to follow corporate policy.  When it comes to personal privacy versus what some describe as the surveillance state, many people are of the opinion that if you’ve done nothing wrong, you’ve nothing to fear.  Recent stories in the press highlight the error in that thinking.

One such story to hit the headlines concerns Pegasus spyware manufactured by Israeli company NSO that is for sale to governments and other organisations for the purposes of surveillance.  A data leak revealed how the spyware has been used to target journalists, human rights activists, politicians, government officials and business executives around the world. A list of 50,000 mobile phone numbers of potential targets has been uncovered.

This is one example of a ‘list’ that no one wants to be on. There are other databases of mobile phone numbers that people are not aware they are listed in.  A recent BBC article told about how the reporter received a call via WhatsApp from someone she didn’t know.  The caller had got her number from a database held in the US (there are many companies collecting and monetising personal data, scraped from a variety of online sources which allowed someone to link her WhatsApp account and personal phone number).

Live Facial Recognition (LFR) – is now a reality, and so concerning that UK Information Commissioner, Elizabeth Denham recently voiced her concerns about the technology. When CCTV cameras are overlaid with LFR, for instance, in a shopping centre, it could be used for identifying known shoplifters, or for serving up personalised adverts to shoppers.  Safety or an invasion of privacy?

Another story to hit the more technical journals is news that Apple is to introduce new scanning software to detect Child Sexual Abuse Material (CSAM) on people’s iPhones.  No one would argue that cracking down on the peddling of CSAM and the apprehension of paedophiles is anything but a good thing. However, in this case, the method is being called into question because it introduces a security and privacy weakness in Apple’s operating system, that previously enjoyed a robust reputation. It doesn’t take a huge leap of imagination to see how this type of well-meaning surveillance could be appropriated for more political or sinister purposes.  Indeed, there has been such a degree of public outcry that Apple has now announced it is deferring the launch of the service.

Corporate Duty of Care

Infringements of personal privacy can impact business. Most people are wedded to their mobile phones, making these devices a tempting and lucrative attack vector. Not only may perpetrators be able to steal the user’s identity, they may also gain valuable commercial information, or indeed, that might be the very reason for the attack in the first place.  It is in the interest of any organisation to educate and protect its employees.

Products such as Armour Mobile and SigNet by Armour are delightfully easy to use, and yet provide a much higher level of security than consumer-grade apps.

In today’s world of increasing surveillance, anyone who handles sensitive or commercially valuable information on their mobile phone, needs to consider protecting it, and with that, their own privacy.

 

Contact us today to see how we can help your organisation protect your employees personal privacy and with it, your corporate IP.

 

Protect Privacy and Protect your Brand

Security of data has long been an issue for organisations around the world. Pundits say it’s not a matter of IF but WHEN any given company will suffer a data breach or attack. As catastrophic as it may be at the time, businesses do survive data breaches, despite the damning headlines and the punitive fines.  Notable examples are British Airways and Marriott Hotels.  British Airways was fined £20m by the ICO for a data breach that took place in 2018, and in the last couple of weeks BA has announced that they have now settled compensation claims: https://www.bbc.co.uk/news/technology-57734946

Similarly Marriott Hotels was fined £18.4m for a breach that involved over 500m data files.

While both brands are in the travel industry, which is suffering due to the pandemic, neither saw a notable downturn in consumer sentiment toward them as a result of the breaches. Both have apologised to customers and put measures in place to mitigate further risks.

The Embarrassment Factor

What really kills a business is when something is leaked that is toe-curlingly embarrassing.  Something that cuts to the core of brand values, shows an organisation as dishonest, or not respecting their customers or the general public.  Depending on your age, the famous Ratner moment may spring to mind.  This is when Gerard Ratner claimed that the Ratners high street chain of jewellery stores sold ‘crap’. Previously loyal customers felt under-valued and taken for fools.  They deserted the brand in droves, the business lost significant sales and had to completely rebrand.

PA Consulting lost major government contracts as a result of losing an un-encrypted USB stick containing details of 84,000 prisoners. http://news.bbc.co.uk/1/hi/uk/7575989.stm

More recently, the Tory government, and Boris Johnson in particular, took a knocking when disgruntled ex-Spad (special advisor), Dominic Cummings decided to dish the dirt. He had the saved WhatsApp messages to prove his point.  (Ex-employees that take sensitive WhatsApp conversations with them is another demonstration of why consumer-grade apps should not be used in business – the organisation can’t control the data https://www.theguardian.com/politics/2021/jul/19/dominic-cummings-tells-bbc-that-pm-denied-covid-would-overwhelm-nhs)

Protecting Privacy

Protecting your employees’ individual privacy, and the commercially sensitive and valuable information that they may keep on their mobile devices is a very good reason to use a secure comms app such as those offered by Armour.  Depending on your job, losing data can be inconvenient if it needs to be retrieved, costly if it is of a commercial nature and results in lost sales, extremely costly if it is intellectual property or trade secrets, or, if you are someone from the covert/intelligence services world, a journalist, aid worker or activist working in an unfriendly regime, it can be life threatening.

Protecting the privacy of your customers or citizens is equally important, particularly, as we have just discussed, to protect the brand value and public image of your organisation. Quite apart from the requirements of GDPR, protecting personally identifiable data is a worthy goal in its own right, as the distress and inconvenience its loss could cause an individual is immeasurable.

How a Secure Comms App can help

Providing an app like Armour® Mobile, or SigNet by Armour®, for your employees to use for business conversations, be they voice, video, conference or messaging, or sharing sensitive documents, helps employees to become more security aware. The apps have great usability (something our UX designers have worked hard on), so there is no learning curve to get people to use them, ensuring swift user adoption by the user community. The organisation is in full control of its data, and when an employee leaves, their account can be deleted, along with all of the data held in their account.

Using an enterprise-grade secure comms app sets the tone, and leads by example, so that employees understand that data security and data privacy is something that needs to be taken very seriously. It protects your staff, protects their privacy, the privacy of your customers, and ultimately may save your brand from an embarrassing ‘disgruntled ex-employee dishes the dirt’ moment.

For more information about how Armour Comms can help your organisation to keep control of your data and protect privacy, contact us today or view our latest podcast below.

Our Latest Podcast – Privacy V Security: https://youtu.be/IeeBvl2XJAc