Why Use an Encrypted Communications App?
Human behavior is typically one of the biggest cyber vulnerabilities an organization faces; encrypted communication apps help protect against the potential exploitation of human error while also combatting malicious actors. Constituents may have robust cyber and physical security measures at the organizational level, but individual employees and mobile devices can still expose the organization to cyber threats. These threats may be exacerbated when operating or traveling abroad due to differences in the threat environment. As a result, safeguarding the organization at the employee level is critical, and ensuring secure communications among employees is a vital part of this process.
Apps for encrypted communication provide a layer of security at the employee level and reduce the opportunity for hacking or manipulation by malicious actors. Various apps help protect users against multiple cybersecurity threats, including communications/signal-interception, voice-call tapping, and hacking.
Factors to Consider
Users should consider a number of app-related issues, including security features, app prevalence, quality of service, and platform availability. Three crucial security features to protect information and ensure privacy in communications are end-to-end encryption, protected metadata storage, and anti-screen scraping measures. Many new secure-communication apps have built-in technology that focuses on these three features; however, older forms of communication and some apps do not have these as a default setting and/or offer suboptimal protection due to outdated technology, which may include inherited vulnerabilities that malicious actors have discovered and could exploit. Users must carefully examine the available and default features of communications apps when deciding which to use.
End-to-end encryption allows data to be passed only between intended individuals, and enables encryption at all other points. When a message is in transit between the sender and recipient, it remains protected; encryption prevents outside actors from reading the contents if intercepted. Even the app developer and the mobile network cannot see what information is being shared via their own technology.
Preventing access to metadata, which includes contact phone numbers and the number and times of messages, allows for increased privacy for the communicating parties. This can prevent third parties from discovering who is involved in a conversation, where the parties are located, and when messages were exchanged. Often, metadata is used by third parties to track activities and movements of a target.
Screen-scraping prevention technology protects individuals from having their online activity accessed by a third party. Screen scraping involves the transfer of all the contents on the screen of another computer, which is a security problem regardless of the sensitivity of captured information.
App Comparison
The table below provides a brief feature-based comparison of four free apps widely used by OSAC constituents, based on the benchmarking survey. OSAC notes that this is not a recommendation; numerous additional reputable and quality apps, both free and fee-based, are widely available. Some encrypted messaging apps that are popular with security professionals include Signal, WhatsApp, and Wickr. However, there is no one-size-fits-all messaging app that will meet every security and communications need. Which encrypted communications apps private-sector organizations choose to use often depends on their specific organizational needs and the needs of their employees, as well as their exposure to the product.
Signal
WhatsApp
Skype
Many companies and individuals are migrating to more secure means of communication to safeguard their information. While the highlighted apps are not exhaustive of what is available on the market, they represent some of newest and widely used options, with an array of features. It is important to note that each of the above-mentioned apps has been restricted or banned for various reasons in multiple countries. Users should consider the availability of the app in specific countries when developing security and communications protocols.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.