British companies at RSA to showcase UK leadership in cyber security

SAN FRANCISCO, California, April 17, 2018 – Five British cyber security companies will showcase their ground-breaking products and services to the US market at the RSA Conference in San Francisco on April 16-20, 2018.

The companies will demonstrate their innovative solutions in a broad range of cyber security requirements – such as the protection of critical assets and infrastructure, prevention and detection of cybercrime, as well as their commitment to cutting-edge research – at the UK Pavilion and through a series of ancillary events, with the support of the UK’s Department for International Trade (DIT). The companies look to develop close partnerships and forge lasting relationships that will support the US cyber security sector in its aims of securing the safety of the nation.

  • Armour Communications will show a new Message Burn capability for Armour Mobile, which gives users the ability to set a burn time for particularly sensitive messages.
  • Bob’s Business will demonstrate its specialty in developing and delivering information security awareness campaigns.
  • iProov will demonstrate its new HTML5, no-app mobile web solution, which won the Best of Show Award at Finovate Europe.
  • Garrison will showcase its unique Silicon Assured Video Isolation technology, which provides a game-changing platform for secure remote browsing.
  • MetaCompliance will showcase its platform, which has the highest-quality cyber security and compliance e-learning content available on the market.

 

DIT will also partner with British Secure Mobile Gateway company Wandera to host a night focused on UK cyber excellence. The evening will feature Jane Frankland, a UK cyber security expert and author of the book IN Security, about why women in cyber security should be the standard and not the exception. She will remark on her 20+ years in the industry and host an exclusive book signing.

The UK’s cyber security industry, worth $31 billion and growing at a rate of 10% per year, is respected across the globe for its expertise, breadth of capabilities, and world-class advice, products and services.

Last month, DIT’s Secretary of State Dr. Liam Fox launched a new Cyber Security Export Strategy to promote the UK’s world-leading expertise and to strengthen defense capabilities in the UK and allied countries. Composed of approximately 800 innovative companies, the UK cyber sector currently exports $2.1 billion worth of technology and services per year, a number anticipated to grow in line with the overall global spend on cyber security products, expected to exceed $1 trillion by 2021. This new cyber security export strategy supports the ongoing work of the 2016 National Cyber Security Strategy, which invested in the cyber security industry to ensure the UK is secure, resilient to cyber threats, prosperous, and confident in the digital world.

Andrew Whittaker, Her Majesty’s Consul General to San Francisco, said:

“The UK government’s commitment to cyber security is clear. Our world-leading National Cyber Security Centre is now 18 months old and doing excellent work as the authoritative voice on information security in the UK, and the recently published Cyber Security Export strategy will help support British firms in overseas markets. The government’s $2.7 billion investment in its National Cyber Security Strategy will ensure that the UK continues to lead the development of cyber security capability across the world, and the five companies at RSA next week are fantastic exemplars of British excellence in this field.“

CallKit – the good, the bad and the ugly

CallKit integrates VoIP services with other call-related apps on the Apple device, using the same native interface, making it easier for users as they use the same dialer for all calls.  However, it’s not plain sailing and CallKit does have its limitations.  Here’s our take on it…

The Good

CallKit provides a more typical Apple interface, which is great for the user experience and provides anonymity when receiving secure calls, particularly when in a public place, because all calls look the same.  It provides integration features with other types of incoming call, which means that Armour users are able to prioritise their secure calls over a standard call, and so avoid interruptions.

The Bad

Calls made with CallKit appear in the regular iOS call log, which used to be synced to iCloud.  The sync to iCloud may be turned off, but can you rely on users to remember to do that? Importantly, this means that meta data for secure calls also appears on the standard phone log – which is far from ideal.  To identify the incoming caller, their information would need to be in the Apple push, which may mean that it requires access to the secure contacts database, which could result in call details being stored outside of the secure database, all of which would contravene a CPA certified solution.  And, all of which could give away valuable metadata to an attacker.

CallKit provides the user with an incoming call interface on the lock screen, however, if your secure comms app is held behind a secure login, it may not initiate for the incoming call.

The Ugly

The user interface is limited to Apple’s standard phone app, which means that additional functionality (i.e. buttons for messaging, video and conferencing controls) can’t easily be displayed.  CallKit also has limited ability to deal with video calls, for example, video needs to be enabled at both ends for the call to take place (whereas Armour Mobile will allow one-way video calls, since this better fits with the security and usability requirements of our customers).

Users may require the ability to disable CallKit.

Our overall take on CallKit is that while it can cause more problems than it solves, it does solve some specific issues in specialist use cases, and for this reason we will be including CallKit in an upcoming version of Armour Mobile, so that our clients have the choice.

In the midst of a Cyber Attack who you gonna call – and how?

Who you gonna call

Don’t rely on the very IP channel that has just been hacked, because your adversaries will be monitoring it!

If (when!) your organisation succumbs to a cyber-attack, the first thing you need to think about, when assessing the situation and putting together a plan for recovery and future mitigation, is exactly how you are going to communicate.  Whether it is the IT department discussing the technicalities, or communicating with senior managers and the board to keep them abreast of events, the last thing you should do is use the very platform that has just been compromised, ie, your corporate network.

In layman’s terms, if your email has been hacked, sending an email to your friends asking for help is nonsensical – your email alerts the hackers to the fact you’ve detected their presence.  And, you can’t tell if any of the responses are genuinely from your friends or from the hackers messing with you.

It is very common when hackers have compromised a system for them to watch carefully for the responses from any IT resources that are tasked with countering their attack. Typically this includes watching and subverting any communications channels that IT may be using.  It’s not unusual for hackers to send spoof messages to try and assess just how well the IT team understands the nature of the attack, to capture new passwords or other changes to security, and prevent key messages from being delivered.

During the initial investigation phase of a cyber attack it is difficult to know what systems have been compromised, so it is best not to rely on any of them, if possible.

By protecting the communications of the IT and digital forensics team, you are blocking a very useful source of information from being intercepted or modified by the hackers. In addition, by using a secure communications platform, such as Armour Mobile, and having the secure comms hosted by a third party, you are further isolating the IT team’s comms from the potentially compromised systems that they are trying to recover.

For third party ‘blue teams’ brought in to handle such hacking situations it makes perfect sense for them to bring their own secure comms solution with them – and this is a question that you should be asking any would-be supplier when tendering for such services.

Armour is now working with a number of organisations that can provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance, to incident management and response, and technical security research.

When it’s sent, it’s out there, right? – Wrong!

Message Burn

With Message Burn you get to choose how long your messages last. 

When you send a sensitive message how can you be sure that only the intended recipient sees it, and that it is not lying around on a phone somewhere for others to find at a later date?

While for the majority of chitchat on consumer-grade messaging apps it really doesn’t matter, when you are sending more sensitive, work-related communications, who sees it and what happens after that can literally be a matter of life and death in some cases (for example, a journalist in an unfriendly regime meeting an interviewee, or in the case of covert ops).

With a facility like Message Burn, users can limit the life of their sensitive data at rest.  Users can set a time for their message to dissolve, disappear or as the name implies, ‘burn’. This can be either a future date and time, or an amount of time after the message has been read by the recipient. While some other enterprise apps allow one or the other, Armour Mobile provides the flexibility of both options for the user via an intuitive interface.  The ‘burn’ time can be set for each individual message.  So, for example, a user may send several low sensitivity messages without any burn time, and then one highly sensitive message regarding, say, a meeting time/venue, or a sensitive contact name, with a very short burn time.

The burn time can be applied to messages, and their attachments (which can be pictures and/or files), for one-to-one messages and to group chats. To ensure that messages to important users aren’t accidentally sent without appropriate ‘burn’ protection, you can also define default message destruction settings for any user or group, so that accidentally pressing the send button never results in sensitive data hanging around for any longer than it should – incidentally, this meets one of the key requirements for GDPR, should that be a concern for your organisation.

Message Burn will be incorporated into Armour Mobile in the next major release.  For more details contact us now: sales@armourcomms.com

 

Armour Communications announces the release of Armour Desktop for Windows 10

Government certified secure mobile communications app continues to lead market with expanded functionality

London, 15 February 2018: Armour Communications, a leading provider of specialist, secure communications solutions, has today announced the general availability of Armour Desktop.  Armour Desktop extends the secure mobile communications capabilities of Armour Mobile via a Windows 10 softphone and is fully interoperable with Armour Mobile.

David Holman, a director of Armour Communications said: “At Armour we are committed to extending our range of secure communications solutions that enable trusted colleagues to collaborate safe in the knowledge that their mobile conversations and associated metadata is secure. Our new Armour Desktop which runs on Windows 10 enables staff both inside and outside of the organisation to communicate within a secure and private environment, while taking advantage of the reduced costs and increased flexibility of Voice over IP communications.”

A government certified solution, Armour Mobile can be downloaded from the app stores and used on company-issued or staff owned devices (BYOD). It is easily deployed and centrally managed either on the Armour secure cloud, or as a full on-premises installation, giving a completely secured and controlled solution.

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

For more information or to download Armour Desktop click here

Armour Communications included in Gartner’s Market Guide for Secure Instant Communications

London, 13 February 2018: Armour Communications, a leading provider of specialist, secure communications solutions, has announced that it has been included in Gartner’s Market Guide for Secure Instant Communications[i]. The 2017 Market Guide defines secure instant communications solutions as those that “protect the confidentiality and integrity of voice, text and video communications sent over mobile and wireless networks, while also providing archiving functionality.” Armour Communications is listed alongside other Representative Vendors that offer security instant communications.

David Holman, a director of Armour Communications said: “We are delighted to be included in Gartner’s Market Guide for Secure Instant Communications. We believe that, with regulatory compliance and the increased number of privacy-invading mobile apps now prevalent, security and risk managers are looking for solutions that enable secure communications and archiving for voice and text in order to protect important and confidential information.

“To us, what is apparent from the Market Guide is that organisations should not rely upon consumer apps to protect their communications. We feel that, while they may provide some security capabilities, they are inadequate to ensure proper enterprise-level security. We believe that features such as an administrator account, integration with directory services, archiving, monitoring and encryption certifications are all essential to manage secure communications across an enterprise.”

Gartner states in the Market Guide that “Security leaders in organizations that have a real need for protecting instant communications will discover that the total cost of purchasing and implementing an enterprise-grade solution is not as high as having to make a consumer solution work in specific enterprise scenarios.”

Armour Mobile is a government certified solution and can be downloaded from the app stores and used on company-issued or staff owned devices (BYOD). It is easily deployed and centrally managed either on the Armour secure cloud, or as a full on-premises installation, giving enterprises high security, control and privacy for their corporate data.

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

[1] Gartner, ‘Market Guide for Secure Instant Communications’, Dionisio Zumerle, Gregg Pessin, 18 December 2017, ID: G00314063.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Armour Mobile boasts a raft of new features in latest version including in-call switching between Voice and Video

Government certified secure mobile communications app continues to lead market with expanded functionality

London, 15 January 2018: Armour Communications, a leading provider of specialist, secure communications solutions, has today announced the release of the latest version of Armour Mobile.  Armour Mobile, which provides the same easy to use experience as consumer-grade (free) apps but with the benefit of significantly enhanced security, now enables users to switch between Voice and Video and back, mid-call, and introduces new capabilities for managing group chat members and group chat list owners.  Unlike other apps, Armour Mobile does not require all users to move to video simultaneously. With Armour Mobile, a single user may switch to video, which can be particularly useful when one caller is on a low bandwidth connection.

David Holman, a director of Armour Communications said: “At our customers request we have upgraded Armour Mobile to provide the option for a participant in a call to select voice or video during a call, giving users maximum flexibility with their communications and we have extended the management features of chat groups. This provides our users with all the great features they see in some consumer-grade apps, but from a known and trusted organisation.”

A government certified solution, Armour Mobile can be downloaded from the app stores and used on company-issued or staff owned devices (BYOD). It is easily deployed and centrally managed either on the Armour secure cloud, or as a full on-premises installation, giving enterprises high security, control and privacy for their corporate data.

Armour Mobile provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments and sent/received/read message status. Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

 

Comparing ‘Consumer’ to ‘Enterprise’ Messaging apps is like comparing ‘road cars’ to ‘racing cars’

So what exactly are the dangers of consumer (ie. free) apps?  And what do Enterprise-grade apps provide that the free apps don’t?  Sometimes when your end-users want to download a consumer app and start using it, it isn’t always clear what extra benefits enterprise-grade apps provide, so here we compare the two.

First a note about Encryption

Free apps have encryption and so to do enterprise apps.  There is so much more to security than encryption.  Encryption is (or should be) a given, it is rarely the weakest link, and therefore rarely the attack vector.  The dangers in using free apps for business revolve far more around how your sensitive data is managed, where it goes and who has access to it.

Secure Numbers

Consumer apps need a GSM number to use as the ‘secure number’.  This number is used to send activation codes in clear text via an SMS message.  This is easy to intercept and can compromise any security before it is even activated.

Enterprise apps can use GSM numbers as the secure number too, or a randomly assigned number for the ‘secure number’.  But activation is NOT via an insecure SMS, it can be via a variety of secure activation methods so it is very much harder to compromise.

Armour Mobile

We are able to utilise existing GSM numbers, or use another ‘secure number’. The process for activation and provisioning of Armour Mobile can be designed around the user’s specific requirements, using secure activation methods.

Harvesting your data

Consumer apps run on the vendor’s infrastructure only, and even if the content is protected, the metadata of each call or message is visible to the vendor. This can be cross matched with other user ID owned by the provider to build up a detailed picture of user habits, geo-location, and common friends/contacts, which can be used for profiling and targeted advertising.  Or sold to third parties for a similar purpose.

Enterprise apps run on a subscription business model, so there is no need to harvest user metadata in order to make a profit.  Serious cyber security vendors have no interest in selling data or advertising, their emphasis is on security and maintaining their credibility and brand value.

Armour Mobile

As well as our secure Cloud option, for fast provisioning, Armour Mobile is also available as an ‘on-premises’ option, meaning that not only is the content of the calls/messages secure, but nobody outside of the organisation has access to the metadata.  This ensures complete security and privacy regarding when, where and who users are communicating with.

Sharing your Contacts

Consumer apps typically upload users’ native contacts list to their global database upon activation. This enables them to cross match friends/contacts so that the user knows who else is using the same app. While this is certainly very user friendly, it does mean that the vendor has your GSM number, and also those of all your contacts for potential marketing purposes. All of those users will also have had their details cross matched to their social media profiles, so that the vendor can start to build up really detailed knowledge of the user, their contacts, what they like, and what they look like.  Yes, we are talking facial recognition here!

For more detail on this worrying scenario, read our blog Whose list are you on?

Enterprise apps do NOT need to upload the native phone directory.

Armour Mobile

With Armour Mobile you are able to import a bespoke directory of secure contacts for your users. In some cases real time integration between the app and the organisation’s internal Active Directory is possible. For certain public sector/government organisations there is also the option to link to address books of other departments that are also using Armour Mobile.

Securing your Communities

Consumer apps run on the vendor’s cloud and work in a single global group community where anyone can call anyone if you know their number. This is great for private communication between friends, but it is less than ideal for enterprise users.  Furthermore, it can put users at risk of phishing scams sent from within the messaging app, which can be perpetrated by anyone who has access to a list of valid GSM numbers, whether obtained legally or from the dark web.

Even when running in the ‘cloud’ Enterprise apps can offer cryptographically segregated user groups or ‘communities’ that are ring fenced from all other user groups.

Armour Mobile

We are able to offer to the option for different communities to be white listed to enable communication between communities for collaborative working purposes.  For On-premises installations, communities can be used to offer segregation between different departments or user groups, for increased security.

Third party certification

Consumer apps are rarely, if ever, subject to any independent certification of their security procedures.

Good enterprise apps are certified by Government cyber security experts or international bodies such as NATO.

Armour Mobile

Using a FIPS-140-2 validated crypto core, Armour Mobile has been awarded many other certifications including CPA (Commercial Product Assurance) from the National Cyber Security Centre (NCSC) and is included in the NATO Information Assurance catalogue.

Intelligent Support v Automation

Consumer apps typically have no human interaction during the activation process, which means no voice on the end of the phone for technical support if required.

Enterprise apps usually have an account manager assigned during the sales and trial process, with a technical support email and phone line available after the sale.  This is invaluable if, for example, a board level exec, senior manager or VIP user is having issues that need resolving quickly.

Armour Mobile

We provide a range of support services that enable organisations to be up and running with Armour Mobile secure communications within hours for our Cloud solution. We are also able to provide bespoke solutions tailored to specific high security requirements, based on individual use cases.

Management of sent and received files

Some consumer apps store sent and received files on the mobile device’s SD card, unencrypted, and then don’t delete them later. Sometimes this is the case, even when the delete option has been set. The files may remain, in an unencrypted form even if the app is uninstalled.

Enterprise apps that focus on security will keep sent and received files encrypted, only exposing them in unencrypted form to be read briefly by the third party viewer that displays them. Any such files are then removed as soon as the user has finished viewing them.

Armour Mobile

All files are kept encrypted, with data encrypted at rest as well as in transit. In addition, Armour Mobile will not run on a jail-broken phone meaning that security apps performed by the app stores and native in-built security remains intact.  Armour Mobile also isolates the microphone to prevent data leakage.

In Summary

When dealing with sensitive business communications of any type (voice, message, text, video, attachments) you need to be sure of exactly where your data and meta data is going, and who can see it.  You also need to think about what other information that you may be giving away, for example, your contacts list, and other personal information from social media that can be used for profiling.

And one final thought – if you don’t want the world and his wife to see your corporate communications, you need to use an enterprise-grade app, like Armour Mobile, rather than a consumer app downloaded for free.  In this instance, you really do get what you paid for.

Security Spectre Causes Meltdown – What’s Going On?

Spectre

You may be aware of significant security concerns raised in the last few days regarding the “Meltdown” and “Spectre” flaws identified in a variety of processors found in PCs, smartphones, servers and other products. This is an advisory to all our customers regarding Armour’s assessment of the effect of these issues.

What’s going on?

Firstly, a brief outline of these issues:*

“Meltdown” is the name given to a side-channel attack on memory isolation that affects most Intel chips since at least 2010, as well as a few Arm cores. “Meltdown” allows a normal (user) application to read (private) kernel memory, potentially allowing the app to steal passwords, cryptographic keys, and other secrets. It is easy to exploit, but easy to patch – and workarounds to kill the vulnerability are available for Windows and Linux, and are already in macOS High Sierra, for Intel parts. There are Linux kernel patches available for the Cortex-A75.

“Spectre” affects, to varying degrees, Intel, AMD, and Arm. Depending on your CPU, “Spectre” allows normal apps to potentially steal information from other apps, the kernel, or the underlying hypervisor. “Spectre” is difficult to exploit, but also difficult to fully patch, so could pose an ongoing threat for some time.

One always needs to ask whether a theoretical vulnerability can be exploited in the real world: in this case the (multiple) teams who reported these problems have proof-of-concept exploits to demonstrate the vulnerabilities so the threat is definitely real.

Although you might initially be concerned about the vulnerabilities this introduces to your personal computer or mobile phone, the wider danger is where data from many users is processed on the same machine, as happens in almost every cloud-based system where multiple applications (often from different companies) run alongside each other, but separated within ‘virtual’ environments (or ‘containers’). These vulnerabilities could allow a malicious application to examine the private data (e.g. customer passwords or cryptographic keys) for another company’s application when present on the same physical machine.

How does this affect Armour customers?

There are three key ways these vulnerabilities need to be addressed:

  • Vulnerable Devices – it’s common sense, but we recommend that all customers ensure that their individual devices (PCs, smartphones) have the latest operating system security updates – not all systems have fixes for “Meltdown” or “Spectre” yet, so keep an eye out for further updates.
  • Vulnerable Servers – follow the same principle as for other devices; make sure you apply the latest operating system updates. (It is possible that patching for these vulnerabilities may have some performance impact, but this has still to be fully evaluated.)
  • Virtualisation – Armour’s server components can be run in a virtual environment, which could be affected by these vulnerabilities; however, it’s important to note that the Armour security architecture already minimises any potential effects:

Customers running an on-premises Armour system have total control over how and where the Armour components are run: if there are no third-party applications or organisations running in the same virtual environments, then the Armour components can’t be attacked by these vulnerabilities.

The really sensitive data (e.g. cryptographic keys) in any Armour system are not exposed to the front-end servers (which is where an attacker might try to insert malware to exploit these vulnerabilities) because this information is stored in the ‘inner’ (more secure) servers.

* For more detail, we suggest you check your preferred, technical web site, as understanding of these issues, their effects and how to counter them, is continually evolving at this time; the formal vulnerability description is on the CERT web page under ID 584653 and MITRE vulnerabilities CVE-2017-5753 and CVE-2017-5715 (for “Spectre”) and CVE-2017-5754 (for “Meltdown”). Of course it’s obligatory for any cyber issue to be given its own web page and fancy icon, hence you could look at https://meltdownattack.com/ or https://spectreattack.com/, though these both direct you to the same joint page.