What you need to know about securing your business’ digital communications
Whether you’re working via email or instant messaging, it’s never been
more important to keep your company’s data secure.
New channels of communication can open business opportunities, boost productivity, and streamline workflow. But they can also expose companies to unexpected risks.
Tresorit teamed up with end-to-end encrypted messaging app Threema for a webinar on how to secure your workplace’s digital communications — from quick messages and emails to hefty filesharing.
Either click here to access the webinar in full via the Tresorit website, or read on for a round-up of the major talking points.
1. Email still dominates our digital communication
It may come as no surprise, but email still dominates most offices’ digital landscape. Most businesses say that the majority of their communications take place via email, a trend that is unlikely to change in the near future. In fact, 80 percent of companies say that their use of email rose in 2021.
But this dependence also makes inboxes a tempting target for would-be hackers. Companies who want to protect themselves against email-based threats need to ensure they have the right digital security policies in place — whether that’s making sure the company uses encrypted emails or cloud storage, or ensuring that employees feel confident and supported while using new software.
2. Messaging apps are on the rise
While email still rules the workplace, it certainly isn’t the only channel of communication for employees. The use of messaging apps in business environments has exploded over the past few years, with 66% of companies using them for either internal or external communication (and, in many cases, for both).
Messaging apps’ popularity hinges on their convenience and ease of use. But few were created with businesses in mind, which means they can be insecure, and are too often overlooked by digital decision-makers in workplace policies.
3. Post-pandemic policies could increase the risk of accidental data leaks
The Covid-19 pandemic has fundamentally changed how businesses operate, with more employees working remotely or on hybrid schedules. That shift has also changed how we use cell phones and laptops inside and outside the office, with some workplaces asking staff to use their own devices for work in different locations.
But blurring the line between the personal and the professional can cause new security concerns. Staff members working on their own devices can easily share files with the wrong person simply by accident. Meanwhile, employees who are unable to access secure remote working tools off-site can be forced to adjust their workflows, often in a way that puts data at risk.
4. Not all encryption is created equal
While almost every email and messaging service will claim to store your company’s data safely, not all digital security is created equal. Many major communication providers, such as Zoom or WhatsApp have been caught short in terms of providing real protection for users.
While almost every email and messaging service will claim to store your company’s data safely, not all digital security is created equal. Many major communication providers, such as Zoom or WhatsApp have been caught short in terms of providing real protection for users.
Different kinds of encryption can leave your data vulnerable as it moves via online servers from your device to its recipient. Both Tresorit and Threema employ true end-to-end encryption, which follows the zero-knowledge principle. It ensures that user data remains encrypted throughout its journey, and that it cannot be accessed by anyone else — even by the service providers themselves.
5. Most messaging apps aren’t GDPR compliant
Messaging apps aren’t just a risk in terms of data leakage — whether accidental or
otherwise. Many popular apps are not GDPR compliant, meaning that employees could run afoul of regulators even with seemingly innocent actions like syncing users’ address books.
Most apps also collect large amounts of user data, even if the content of individual
messages or threads are encrypted. As well as requiring users to input their phone numbers, many will gather information on the devices, servers and Wi-Fi networks being used to access their services, collect profile information, and store metadata.
Ready to find out more? Click here to access the webinar in full via the Tresorit website or listen to it on Spotify/Apple Podcast.