VPNs – Choose wisely

VPN Tunnel

First the explanation

A Virtual Private Network is effectively an encrypted ‘tunnel’ between your device (which can be your desk computer at home, your mobile, laptop or tablet) and another computer, such as your corporate VPN server. This gives you protected, secure access to your corporate network. A casual observer looking at the traffic between the device and the server will only see encrypted VPN data, and will be hard pressed to distinguish between the different data types.  However, there are a number of technical papers available regarding VPN analysis and how the flow of the traffic give clues as to the type of data being carried. For example, voice traffic usually flows one way then the other as people hold a conversation.

How it helps

Use of a VPN has pros and cons: it may alert eavesdroppers to the fact that you are trying to cover your tracks, so for those with the type of job where they are likely to be under surveillance from a nation state, staying below the radar by using a VPN as an extra level of security, is very much about choosing the right VPN. Some unfriendly nation states try to ban the use of VPNs for this very reason.

What a VPN can do is provide obfuscation, by using a VPN that a lot of other people use. For example, if you are near a University and you use the same type of VPN as the students or staff, your traffic will hopefully be lost in the general melee of University life.  The VPN encryption means the network operator cannot see that you have made a call, or the number you dialed; therefore, calls to certain numbers (known Government department numbers, for example) that might be monitored, will not attract unwanted attention. By using a VPN, the call is hidden from plain view, and even the fact that you are using Armour Mobile to protect your communications end-to-end is hidden.

Conversely, if you use a specialist or unusual VPN, that could well alert eavesdroppers to the fact that there is something worth listening to.  So choose your VPN wisely!

SS7 vulnerability still going strong near the White House

Sting Ray on Whitehouse

Why bother to teach an old dog new tricks when the old ones are still working well?

You may well ask!  A recent piece in El Reg ‘Stingray phone stalker tech used near White House, SS7 abused to steal US citizen’s data is a salient reminder that sometimes the old ones are the best.

The SS7 vulnerability is well documented, and indeed it was one of the first topics that we wrote about in this blog (What’s up with WhatsApp).

To recap, SS7 stands for Signalling System No 7 (also called the Common Channel Signalling System 7 in the US or Channel Interoffice Signalling 7 in the UK), and is the system that connects mobile phone and landline networks to each other. SS7 protocols enable phone networks to exchange information needed to process calls and text messages across disparate networks (including roaming on foreign networks), and to ensure correct billing. It also enables local number portability, prepaid payments, SMS and number translation. However, SS7 was designed nearly 40 years ago, long before phone hacking was considered a serious threat and flaws in SS7 enable an attacker to mimic a victim’s device.

This particular hack is typically used to steal personal data and to snoop.  While it is used by nation states, there is equipment available on the dark web for a few hundred bucks (see: With prices like these – anyone could be listening to your mobile calls!) that brings this type of hack into the domain of almost any tech-savvy criminal.

If it can happen near the White House, it can happen anywhere. Time to review your mobile phone security. If you or your staff discuss details of sensitive deals, intellectual property, confidential meetings, or industrial/commercial secrets by mobile, using voice, video, message/text, or send attachments, and if you want them to remain private, you need to use a seriously secure mobile comms service.

 

Contact us today for more information:

Email: sales@armourcomms.com

Tel: +44 (0)20 36 37 38 01

GDPR is here – don’t forget your mobile comms need securing too

GDPR on the Horizon

Andy Lilly discusses how securing your mobile communications is a key step in meeting GDPR regulations

The new General Data Protection Regulation (GDPR) is now in force. A lot has been written about it, and how it overrides previous national data protection laws. Many are seeing the introduction of the new regulations as a positive step. It encompasses how personal data is managed, processed and deleted – and in particular, how it is lawfully and fairly protected by documented security measures. GDPR is clear in that it encompasses all of a company’s data (including that held in marketing, sales and finance) when dealing with EU citizens.

With many companies using mobiles to communicate with customers, it also means that texts and messaging, whether internal or external, will be considered within the new data laws.

With non-compliance fines of up to €20m or 4% of global turnover, not to mention reputational damage, companies ignore the legislation at their peril. According to ICO Information Commissioner Elizabeth Denham¹; “If your organisation can’t demonstrate that good data protection is a cornerstone of your business policy and practices, you’re leaving your organisation open to enforcement action that can damage both public reputation and bank balance.”

Getting your ducks in a row
Whatever their business, all organisations need to have their ducks nicely lined up when it comes to data retention, compliance and security. Governance plays an enhanced role under GDPR and you must ensure that your systems and processes in place are able to manage and monitor all data under the new rules. Accountability is also important so as well as complying, you have to be able to demonstrate how you comply.

Armour Mobile enables your organisation to ensure that data and messaging communications are entirely secure whether in transit or stored, either with our cloud solution once you have licensed your mobile devices with us, or with our Armour on-premises solution. In fact, the latter allows your organisation to configure and manage your secure communications service in total privacy, restricting any outside connections.

We can also provide secure voice communications between your mobile and other voice systems (e.g. desk phones within your office) or services (voicemail or conferencing). Securing messaging and voice communications in these ways provides robust audit trails to support compliance and due diligence of the new privacy rules.

GDPR means that all organisations must see data in a different way – adopting Armour for your mobile communications is a big tick in terms of ensuring compliance.

¹ https://ico.org.uk/

Not all Group Messaging Apps are created equal

Group Messaging

What limits does yours have?

When it comes to secure comms apps, group messaging is often taken as a given, expected.  However, sending everyone in a group the same message simultaneously it isn’t quite as straight forward as it sounds.  It all depends on how the messages are handled.  Some apps send messages from the client to every user in the group, and obviously the more members in the group, the more messages that need to be sent.  As the client is required to process each of these messages and any attachments (including any encryption) this can cause issues resulting in practical limits on the numbers in a group.

Alternatively, a single message can be sent to a messaging server, which then replicates the messages to the entire group. This is a far more scalable method, where the server is doing the hard work and the size of a group becomes almost unlimited. This has been achieved in Armour Mobile by extending our encryption capability, drawing on 3GPP standards.

So if your organisation needs to communicate securely within groups, sending bulk messages and attachments efficiently, without limits on the number of recipients, we have the solution for you.

For more information contact us via:

Email: sales@armourcomms.com

Tele: +44 (0)20 36 37 38 01

Cambridge Analytica & Facebook, compromised data – more reminders!

Facebook

Do we need yet another wake-up call regarding keeping our data safe?  The latest scandal involving Cambridge Analytica’s mining of Facebook profiles, which has been running for a few weeks now and shows no signs of abating, is a sign of rising public consciousness that personal data is important, it is valuable. The case highlights just how social media companies seem to please themselves when it comes to who has access to what.  At the very least, social media companies take a commercial view which is in their own interests and not in the interests of their customers/users – and who can blame them – it’s how they make a profit.

While those that need to have sensitive and/or commercial communications probably won’t be using Facebook to do so, they might be using consumer grade apps such as WhatsApp (owned by Facebook) or others.  The messages sent on these services are encrypted, but, as we’ve said before, the associated metadata still gives away a lot of valuable information.  To illustrate this point, by profiling the metadata associated with a conversation between two people, it is possible to identify who is the most important, ie. Boss and sub-ordinate, simply based on the frequency, length, number and response times of replies. Using these techniques it is possible to map a whole organisation!

This is a timely reminder that if you’d rather keep your sensitive communications private you need to be aware of where your metadata is held and who might have access to it. Relying on social media companies that makes their money through third parties advertising to the user base, is never going to be good for users – it is the price you pay for a ‘free’ service.

Services provided by security vendors don’t rely on selling advertising to make a profit, they are in business to protect their customer’s data, and their reputation lives or dies by their ability to do so.  Something worth remembering next time you need to send a work/business related communication.

Built-in versus bolt-on – why security should never be an after thought

Key and Keyhole

We are all looking to do more, be more productive, efficient and organised. With a plethora of unified communication solutions promising to boost productivity by using time in a smarter way, it’s easy to see how these applications are appealing. But are they secure?

Not all applications are created equally

We often hear of high profile security breaches and the resulting financial and reputational issues they cause. This alone should be motivation for product creators to implement adequate security controls into their solutions. However, speed to market and functionality improvements can often take precedence over security.

When purchasing a new car, we take for granted that safety features have been built in, we don’t ask whether we need to retrofit seatbelts and air bags. Car manufacturers have reinvented the way cars are designed, with passenger safety at the heart of the critical thinking design process. The net result is a product that is secure by design with features that work in unison.

Education not blame

Too often employees are cited as the ‘weakest link’ and are blamed for being the cause of security incidents. In reality, these incidents are often caused by users just trying to get their work done, but in the face of complex and poorly designed applications, they are being put in the position of understanding and making complex security decisions beyond their realm of expertise. Secure communications should be just that, secure by default. Security should be there without the user having to think about it, they are not the experts and we should not expect them to make decisions like one.

For example, a secure messaging application might be required to block pasting text out of the app and perhaps even pasting in. However, from a usability point of view, if the message is a phone number or email address, the user probably wants to be able to paste that across into their dialler or email app, rather than having to retype it. Security and usability have to be carefully balanced.

Businesses need to ensure their employees have the right tools required to carry out the job. If users need to have conversations where the content must remain confidential, then organisations need to provide the appropriate solution that enables this transparently. Which means by default removing burden from the user and ensuring that information is not put at risk.

The way forward

It’s time to stop apportioning blame and seeking to ‘fix the user’ but instead design technology to fit the business process and how people behave, rather than asking employees to adjust themselves.

Users shouldn’t have to be security experts and bear the burden of using solutions where security has been bolted on as an after thought. Employees should take security seriously and be an educated user – but they shouldn’t need cyber security credentials to do their day job.

Choosing a secure communications solution such as an Armour product is a positive way to address this issue. Armour Mobile solutions are cost-effective, easy to use with technology that is always designed to be government-grade level secure – proven assurance to our customers that we take security seriously.

It’s time for the tech industry as a whole to step up and start thinking about the needs of the user and not hiding behind ‘user error’.

Andy Lilly of Armour Comms appointed Chair of Technical Standards Committee at Secure Chorus

Secure Chorus Logo

Armour welcomes NCSC to Secure Chorus

London, UK, 30 April, 2018, Dr Andy Lilly, CTO of Armour Communications, has been elected as Chairperson of the Secure Chorus Technical Standards Committee.  Armour Comms are a founding member of Secure Chorus, which recently welcomed the UK’s National Cyber Security Centre (NCSC) into the organisation. Secure Chorus serves as a platform for public-private sector collaboration in developing a security baseline for secure multimedia communications: this is a key strand in the UK’s digital economy strategy, “to make the UK the safest place to live and do business online”, as regularly espoused by Matt Hancock, Secretary of State for Digital, Culture, Culture and Sport (DCMS).

Dr Lilly commented: “In addition to the UK government’s requirement to protect OFFICIAL and OFFICIAL SENSITIVE communications, it is key that the resulting multimedia systems provide interoperability between different vendor systems, to support the creation of pan-government and pan-enterprise collaboration capabilities. The definition of suitable forward-looking technical standards is critical to enabling this interoperability and promoting the growth of the associated networks and services both across the UK and internationally.”

Armour has had a key role in Secure Chorus since the group’s formation, working to define and develop the underlying security technologies into products such as Armour Mobile, demonstrating how communications applications can be created that combine the ease-of-use of social media apps while providing the security and seat-of-trust needed by government, defence, finance, healthcare and enterprises who need to protect and control their mobile communications on off-the-shelf, commercial smartphones, tablets and desktops.

About the National Cyber Security Centre

• The UK Government is fully committed to defending against digital threats and set up the National Cyber Security Centre last year through the five-year National Cyber Security Strategy, supported through £1.9 billion transformative investment.

• The NCSC provides a single, central body for cyber security at a national level and is the UK’s technical authority on cyber. It manages national cyber security incidents, carries out real-time threat analysis and provides tailored sectoral advice.

• GCHQ is the parent body for the Centre, meaning that it can draw on the organisation’s world-class skills and sensitive capabilities.

About Secure Chorus Ltd

• Secure Chorus is a not-for-profit, membership organisation, serving as a platform for public-private collaboration and development of common standards and capabilities for secure communication for the global digital economy.

For more information visit www.securechorus.org and follow the company on LinkedIn and Twitter.

  

Armour Communications and Metro Communications agree partnership

Metro Communications Logo

London, 24 April 2018: Armour Communications and Metro Communications have joined forces to help businesses and VIPs keep their calls, messages and data private and confidential.

Armour Mobile enables secure collaboration between trusted colleagues when discussing commercially sensitive information such as corporate deals, intellectual property matters, financial transactions, customer negotiations or for VIP’s the details of their day to day lives.

Armour Mobile prevents mobile communications including voice, messaging, file transfers, video or even conferencing from being intercepted by illicit or unwarranted surveillance, keeping both conversations and associated data private. Importantly, Armour Mobile can provide this not just in a local environment, but also for the corporate traveller keeping communications secure even when using untrusted networks, anywhere in the world.

David Holman, a director at Armour Communications commented; “Armour Comms is committed to working with our partners to  deliver secure mobile communications on every day devices to businesses and high profile individuals. Metro Communications brings a solid track record of dealing with corporate executives and high profile individuals and doing so in a discerning, confidential and trusted manner. We are delighted to partner with Metro Communications and look forward to delivering our  secure mobile solutions to Metro Communications customers.”

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS 140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

Peter Matthews, CEO of Metro Communications, said: “We’re delighted to be working with Armour Communications to provide a world-class service to our customers – businesses and high-profile individuals. Organised criminals, lone-wolf hackers and state-sponsored organisations are accessing private phone calls, messages and data sent from mobile phones. This is a very real threat, and it will only increase. Armour Mobile has been certified by the National Cyber Security Centre (NCSC) and approved by NATO. This powerful, user-friendly app removes many security concerns for businesses and VIPs, giving them complete peace of mind.”

Metro Communications provides only the highest quality telecommunications and IT solutions to people and businesses. Metro customers who pass strict security checks can now use Armour Mobile to keep their communications as they should be – secure and confidential.

British companies at RSA to showcase UK leadership in cyber security

SAN FRANCISCO, California, April 17, 2018 – Five British cyber security companies will showcase their ground-breaking products and services to the US market at the RSA Conference in San Francisco on April 16-20, 2018.

The companies will demonstrate their innovative solutions in a broad range of cyber security requirements – such as the protection of critical assets and infrastructure, prevention and detection of cybercrime, as well as their commitment to cutting-edge research – at the UK Pavilion and through a series of ancillary events, with the support of the UK’s Department for International Trade (DIT). The companies look to develop close partnerships and forge lasting relationships that will support the US cyber security sector in its aims of securing the safety of the nation.

  • Armour Communications will show a new Message Burn capability for Armour Mobile, which gives users the ability to set a burn time for particularly sensitive messages.
  • Bob’s Business will demonstrate its specialty in developing and delivering information security awareness campaigns.
  • iProov will demonstrate its new HTML5, no-app mobile web solution, which won the Best of Show Award at Finovate Europe.
  • Garrison will showcase its unique Silicon Assured Video Isolation technology, which provides a game-changing platform for secure remote browsing.
  • MetaCompliance will showcase its platform, which has the highest-quality cyber security and compliance e-learning content available on the market.

 

DIT will also partner with British Secure Mobile Gateway company Wandera to host a night focused on UK cyber excellence. The evening will feature Jane Frankland, a UK cyber security expert and author of the book IN Security, about why women in cyber security should be the standard and not the exception. She will remark on her 20+ years in the industry and host an exclusive book signing.

The UK’s cyber security industry, worth $31 billion and growing at a rate of 10% per year, is respected across the globe for its expertise, breadth of capabilities, and world-class advice, products and services.

Last month, DIT’s Secretary of State Dr. Liam Fox launched a new Cyber Security Export Strategy to promote the UK’s world-leading expertise and to strengthen defense capabilities in the UK and allied countries. Composed of approximately 800 innovative companies, the UK cyber sector currently exports $2.1 billion worth of technology and services per year, a number anticipated to grow in line with the overall global spend on cyber security products, expected to exceed $1 trillion by 2021. This new cyber security export strategy supports the ongoing work of the 2016 National Cyber Security Strategy, which invested in the cyber security industry to ensure the UK is secure, resilient to cyber threats, prosperous, and confident in the digital world.

Andrew Whittaker, Her Majesty’s Consul General to San Francisco, said:

“The UK government’s commitment to cyber security is clear. Our world-leading National Cyber Security Centre is now 18 months old and doing excellent work as the authoritative voice on information security in the UK, and the recently published Cyber Security Export strategy will help support British firms in overseas markets. The government’s $2.7 billion investment in its National Cyber Security Strategy will ensure that the UK continues to lead the development of cyber security capability across the world, and the five companies at RSA next week are fantastic exemplars of British excellence in this field.“