SlideShare a Scribd company logo
1 of 6
Download to read offline
SOMEONE’S
LISTENING
The Real Reasons You Need to Encrypt Your Calls
Whitepaper
Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls
2
Someone’s
Listening: The Real
Reasons You Need
to Encrypt Your Calls
What You Don’t Know CAN Hurt You
By now, it’s common knowledge in enterprise that text-based communications
– such as SMS messages, email, and instant messages – need to be
encrypted. The media has driven that point home often enough.
What many don’t seem to realize is that encrypted text isn’t
enough. In order to truly protect sensitive enterprise data,
voice communication needs to be encrypted, as well.
Across all business functions and levels within an organization, employees and
executives alike regularly exchange critical information over the phone. This
includes details on mergers, intellectual property, product roadmaps, finances,
litigation, and client data. When such communications are intercepted, they
can cause as much damage to an enterprise as a hijacked email – if not more.
Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls
3
Consider, for example, the recent breach
of Securus Technologies, a phone
services provider for the United States
prison system. An anonymous hacker
released over 70 million phone records
made between 2011 and 2014. Included
in these records are approximately
fourteen thousand conversations
between inmates and attorneys – a clear
violation of attorney-client privilege.
“That 14,000 figure is likely an
underestimate, because it does not
include calls to attorney cellphone
numbers,” Jordan Smith and Micah Lee
of The Intercept explain.“These attorney
calls are potentially just a small subset of
the attorney-client calls that were hacked.”
“In short,” they continue,“it turns
out that Securus isn’t so secure.”
The Securus breach underscores the
sensitive nature of phone calls and
their records. The phone calls released
by Securus’s hacker comprised a
wealth of privileged client-attorney
information – a class-action lawsuit
is already brewing as a result.
What might ill-intentioned third
parties hear if they listen in on
your enterprise’s calls?
That’s not a hypothetical question.
Eavesdropping is now easier than ever,
and the software that enables it is both
highly available and simple to use. Worse
still, due to security shortcomings, this
eavesdropping usually goes unnoticed
until it’s too late, if it’s detected at all.
At issue here is the fact that, in spite of
recent developments, the architecture
underpinning voice communications
still falls woefully short from a security
standpoint – and at the same time,
eavesdropping and interception tools
have only grown more advanced.
What might
ill-intentioned
third parties
hear if they
listen in on your
enterprise's
calls?
Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls
4
Weak Architecture and
Advanced Hacking Tools Make
For a Dangerous Cocktail
Signaling System 7 – the world’s most
widely used telecommunications
protocol – is positively ancient by
technological standards. It was first
defined as a standard in 1980, over
thirty years ago. Bafflingly, it has
changed relatively little since then.
“SS7 was created before there was an
Internet, and was never designed to
be secure in today’s world,” explains
Enderle Group principal analyst Robert
Enderle.“Its security was based on the
fact that no one other than carriers and
some governments could access it.
It’s a technology well past its prime.”
More concerning is the fact that SS7,
outdated as it is, forms the backbone of
many mobile communications standards,
such as GSM. This outdated architecture is
the reason hackers can listen in on phone
calls and intercept messages regardless
of carrier encryption. It’s the reason GSM
calls can be hacked using $9 handsets;
it’s why readily available commercial
interceptors can often decrypt calls
before the user even picks up the phone.
It’s also why security researcher
Chris Paget was able to build a $1500
cell-phone tapping device capable
of intercepting virtually any GSM
call he chose. Back in 2010, he
demonstrated his tool by intercepting
several dozen calls made by hackers
at the DefCon conference in Boston.
It’s worth noting that GSM has been
superseded by new standards such as 3G
and 4G, and currently accounts for less
than 1% of total traffic. 3G, though more
secure than 2G, still uses SS7. And though
4G LTE uses the “relatively modern”
Diameter Protocol, it will only account for
10% of worldwide mobile connections by
2017. 2G and 3G make up the other 80%.
What’s more, although it’s built atop
more modern architecture, 4G has
its own security shortcomings.
As demonstrated in a presentation at
Black Hat Europe in November 2015,
the idea that LTE security alone is
enough to protect phone calls is naïve
at best. Low-cost hacking tools can
easily bypass enhanced LTE security
measures, and a rudimentary denial of
service attack can force most phones
to drop down to a 2G or 3G connection.
Enterprises cannot, in other words,
rely on carriers to protect voice calls.
You need to safeguard them yourself
– and that’s where SecuSUITE®
for Enterprise comes in.
Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls
5
Protect Your Organization’s
Information Against
Electronic Eavesdropping
SecuSUITE® for Enterprise is a hosted
software-based solution that provides
secure calling and text messaging
on mobile devices, across multiple
operating systems – including iOS®,
Android™ and BlackBerry® 10.*
›› With SecuSUITE for Enterprise,
technology that was designed to protect
national security has been adapted and
optimized to secure your organization’s
communications against electronic
eavesdropping and third-party attacks.
›› SecuSUITE for Enterprise is hosted in
the BlackBerry® Infrastructure, which
provides a direct connection to more
than 600 carriers around the globe.
›› Connect securely with the people you
need to talk to, inside and outside
your organization, and across phone
networks around the globe. If they
use SecuSUITE® for Enterprise,
you can communicate with them
securely, with the crystal-clear voice
quality you need and expect.
›› You don't have time to waste trying
to get technology working for
you. SecuSUITE for Enterprise is
designed to be easy and intuitive to
use, so there’s no learning curve.
›› SecuSUITE for Enterprise comes with
a user-friendly, secure cloud-based
portal where administrators can
enroll or deactivate users and adjust
settings. There’s nothing else to add,
manage, maintain, or worry about.
›› SecuSUITE for Enterprise is MDM/EMM-
agnostic – so you’ve got the flexibility to
deploy it even if you’re running multiple
MDM solutions, or in the midst of a
transition to a new EMM platform.
Leverage the security benefits of a behind-
the-firewall, on-premise solution – with
the convenience of a cloud deployment.
With no servers or hardware to install,
there’s no upfront capital expenditure
and no unpredictable operating costs to
wonder about. SecuSUITE® for Enterprise
is available at a low monthly cost per
user, on an annual license basis.
Safeguard Mission-
Critical Data
Enterprise decision-makers know
that in order to safeguard mission-
critical data, they need to encrypt
digital, text-based communications.
Unfortunately, many of them don’t
realize that unsecured phone calls
represent as much of a threat as an
unencrypted email. Outdated carrier
infrastructure and the wide availability
of advanced eavesdropping tools
designed to intercept confidential
calls are a dangerous combination
for any unprepared enterprise.
A dedicated call encryption
solution is necessary, but it
cannot be difficult to integrate or
use. Enterprise infrastructure is
complicated enough already, without
adding extra layers of complexity.
Further, employees demand
convenience from all the business
apps they use – and if they aren’t
afforded that convenience, they’ll
simply ignore or circumvent your
organization’s security measures.
By implementing a solution such
as SecuSUITE for Enterprise, you’ll
protect your sensitive information
against eavesdropping without
hindering either administrators or
employees – and without making
your mobile architecture any more
complex than it needs to be.
Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls
6
Learn more about what SecuSUITE for Enterprise
can do for you at blackberry.com/secusuiteforenterprise
©2016 BlackBerry.All rights reserved.BlackBerry®,BBM™ and related trademarks,names and logos are the property of BlackBerry Limited (“BlackBerry”)
and are registered and/or used in the U.S.and countries around the world.All other trademarks are property of their respective owners.

More Related Content

Viewers also liked

Yliopistotutkijat somessa (ote)
Yliopistotutkijat somessa (ote)Yliopistotutkijat somessa (ote)
Yliopistotutkijat somessa (ote)Johanna Janhonen
 
Target audience questionaire
Target audience questionaireTarget audience questionaire
Target audience questionairecharheap2244
 
Informe Sectorial de la Economía Española 2016: Sector papel y artes gráficas
Informe Sectorial de la Economía Española 2016: Sector papel y artes gráficasInforme Sectorial de la Economía Española 2016: Sector papel y artes gráficas
Informe Sectorial de la Economía Española 2016: Sector papel y artes gráficasCesce
 
Water Level Indicator Project Presentation
Water Level Indicator Project PresentationWater Level Indicator Project Presentation
Water Level Indicator Project PresentationAbdul Rehman
 
Comparison of intraoral harvest sites for corticocancellous bone grafts
Comparison of intraoral harvest sites for corticocancellous bone graftsComparison of intraoral harvest sites for corticocancellous bone grafts
Comparison of intraoral harvest sites for corticocancellous bone graftsDr. SHEETAL KAPSE
 
Communities presentation
Communities presentation Communities presentation
Communities presentation avalonchase
 

Viewers also liked (6)

Yliopistotutkijat somessa (ote)
Yliopistotutkijat somessa (ote)Yliopistotutkijat somessa (ote)
Yliopistotutkijat somessa (ote)
 
Target audience questionaire
Target audience questionaireTarget audience questionaire
Target audience questionaire
 
Informe Sectorial de la Economía Española 2016: Sector papel y artes gráficas
Informe Sectorial de la Economía Española 2016: Sector papel y artes gráficasInforme Sectorial de la Economía Española 2016: Sector papel y artes gráficas
Informe Sectorial de la Economía Española 2016: Sector papel y artes gráficas
 
Water Level Indicator Project Presentation
Water Level Indicator Project PresentationWater Level Indicator Project Presentation
Water Level Indicator Project Presentation
 
Comparison of intraoral harvest sites for corticocancellous bone grafts
Comparison of intraoral harvest sites for corticocancellous bone graftsComparison of intraoral harvest sites for corticocancellous bone grafts
Comparison of intraoral harvest sites for corticocancellous bone grafts
 
Communities presentation
Communities presentation Communities presentation
Communities presentation
 

More from BlackBerry

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner BenefitsBlackBerry
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneBlackBerry
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointBlackBerry
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry SecureBlackBerry
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our LivesBlackBerry
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
 

More from BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Someone's Listening: The Real Reasons You Need to Encrypt Your Calls

  • 1. SOMEONE’S LISTENING The Real Reasons You Need to Encrypt Your Calls Whitepaper
  • 2. Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls 2 Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls What You Don’t Know CAN Hurt You By now, it’s common knowledge in enterprise that text-based communications – such as SMS messages, email, and instant messages – need to be encrypted. The media has driven that point home often enough. What many don’t seem to realize is that encrypted text isn’t enough. In order to truly protect sensitive enterprise data, voice communication needs to be encrypted, as well. Across all business functions and levels within an organization, employees and executives alike regularly exchange critical information over the phone. This includes details on mergers, intellectual property, product roadmaps, finances, litigation, and client data. When such communications are intercepted, they can cause as much damage to an enterprise as a hijacked email – if not more.
  • 3. Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls 3 Consider, for example, the recent breach of Securus Technologies, a phone services provider for the United States prison system. An anonymous hacker released over 70 million phone records made between 2011 and 2014. Included in these records are approximately fourteen thousand conversations between inmates and attorneys – a clear violation of attorney-client privilege. “That 14,000 figure is likely an underestimate, because it does not include calls to attorney cellphone numbers,” Jordan Smith and Micah Lee of The Intercept explain.“These attorney calls are potentially just a small subset of the attorney-client calls that were hacked.” “In short,” they continue,“it turns out that Securus isn’t so secure.” The Securus breach underscores the sensitive nature of phone calls and their records. The phone calls released by Securus’s hacker comprised a wealth of privileged client-attorney information – a class-action lawsuit is already brewing as a result. What might ill-intentioned third parties hear if they listen in on your enterprise’s calls? That’s not a hypothetical question. Eavesdropping is now easier than ever, and the software that enables it is both highly available and simple to use. Worse still, due to security shortcomings, this eavesdropping usually goes unnoticed until it’s too late, if it’s detected at all. At issue here is the fact that, in spite of recent developments, the architecture underpinning voice communications still falls woefully short from a security standpoint – and at the same time, eavesdropping and interception tools have only grown more advanced. What might ill-intentioned third parties hear if they listen in on your enterprise's calls?
  • 4. Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls 4 Weak Architecture and Advanced Hacking Tools Make For a Dangerous Cocktail Signaling System 7 – the world’s most widely used telecommunications protocol – is positively ancient by technological standards. It was first defined as a standard in 1980, over thirty years ago. Bafflingly, it has changed relatively little since then. “SS7 was created before there was an Internet, and was never designed to be secure in today’s world,” explains Enderle Group principal analyst Robert Enderle.“Its security was based on the fact that no one other than carriers and some governments could access it. It’s a technology well past its prime.” More concerning is the fact that SS7, outdated as it is, forms the backbone of many mobile communications standards, such as GSM. This outdated architecture is the reason hackers can listen in on phone calls and intercept messages regardless of carrier encryption. It’s the reason GSM calls can be hacked using $9 handsets; it’s why readily available commercial interceptors can often decrypt calls before the user even picks up the phone. It’s also why security researcher Chris Paget was able to build a $1500 cell-phone tapping device capable of intercepting virtually any GSM call he chose. Back in 2010, he demonstrated his tool by intercepting several dozen calls made by hackers at the DefCon conference in Boston. It’s worth noting that GSM has been superseded by new standards such as 3G and 4G, and currently accounts for less than 1% of total traffic. 3G, though more secure than 2G, still uses SS7. And though 4G LTE uses the “relatively modern” Diameter Protocol, it will only account for 10% of worldwide mobile connections by 2017. 2G and 3G make up the other 80%. What’s more, although it’s built atop more modern architecture, 4G has its own security shortcomings. As demonstrated in a presentation at Black Hat Europe in November 2015, the idea that LTE security alone is enough to protect phone calls is naïve at best. Low-cost hacking tools can easily bypass enhanced LTE security measures, and a rudimentary denial of service attack can force most phones to drop down to a 2G or 3G connection. Enterprises cannot, in other words, rely on carriers to protect voice calls. You need to safeguard them yourself – and that’s where SecuSUITE® for Enterprise comes in.
  • 5. Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls 5 Protect Your Organization’s Information Against Electronic Eavesdropping SecuSUITE® for Enterprise is a hosted software-based solution that provides secure calling and text messaging on mobile devices, across multiple operating systems – including iOS®, Android™ and BlackBerry® 10.* ›› With SecuSUITE for Enterprise, technology that was designed to protect national security has been adapted and optimized to secure your organization’s communications against electronic eavesdropping and third-party attacks. ›› SecuSUITE for Enterprise is hosted in the BlackBerry® Infrastructure, which provides a direct connection to more than 600 carriers around the globe. ›› Connect securely with the people you need to talk to, inside and outside your organization, and across phone networks around the globe. If they use SecuSUITE® for Enterprise, you can communicate with them securely, with the crystal-clear voice quality you need and expect. ›› You don't have time to waste trying to get technology working for you. SecuSUITE for Enterprise is designed to be easy and intuitive to use, so there’s no learning curve. ›› SecuSUITE for Enterprise comes with a user-friendly, secure cloud-based portal where administrators can enroll or deactivate users and adjust settings. There’s nothing else to add, manage, maintain, or worry about. ›› SecuSUITE for Enterprise is MDM/EMM- agnostic – so you’ve got the flexibility to deploy it even if you’re running multiple MDM solutions, or in the midst of a transition to a new EMM platform. Leverage the security benefits of a behind- the-firewall, on-premise solution – with the convenience of a cloud deployment. With no servers or hardware to install, there’s no upfront capital expenditure and no unpredictable operating costs to wonder about. SecuSUITE® for Enterprise is available at a low monthly cost per user, on an annual license basis. Safeguard Mission- Critical Data Enterprise decision-makers know that in order to safeguard mission- critical data, they need to encrypt digital, text-based communications. Unfortunately, many of them don’t realize that unsecured phone calls represent as much of a threat as an unencrypted email. Outdated carrier infrastructure and the wide availability of advanced eavesdropping tools designed to intercept confidential calls are a dangerous combination for any unprepared enterprise. A dedicated call encryption solution is necessary, but it cannot be difficult to integrate or use. Enterprise infrastructure is complicated enough already, without adding extra layers of complexity. Further, employees demand convenience from all the business apps they use – and if they aren’t afforded that convenience, they’ll simply ignore or circumvent your organization’s security measures. By implementing a solution such as SecuSUITE for Enterprise, you’ll protect your sensitive information against eavesdropping without hindering either administrators or employees – and without making your mobile architecture any more complex than it needs to be.
  • 6. Someone’s Listening: The Real Reasons You Need to Encrypt Your Calls 6 Learn more about what SecuSUITE for Enterprise can do for you at blackberry.com/secusuiteforenterprise ©2016 BlackBerry.All rights reserved.BlackBerry®,BBM™ and related trademarks,names and logos are the property of BlackBerry Limited (“BlackBerry”) and are registered and/or used in the U.S.and countries around the world.All other trademarks are property of their respective owners.