![]() In fact, insider attacks are, by far, the most dominant type of threat to the cybersecurity of organizations across the board making such attacks a particularly important threat to defend against. For example, 300 million Wechat and QQ private messages were recently leaked due to a misconfigured database.īut regardless of how carefully we defend against those threats, a C2S server inevitably remains vulnerable to various insider attacks (e.g. A recent survey found nearly 200 organizations vulnerable due to their miss-configured Amazon S3 buckets alone. The risk of exposure of a C2S server comes not just from external attackers but often from simple negligence or accident. Compromising a single server in a C2S platform simultaneously gives the attacker access to, say, all private communication with your clients and contractors, trade secrets and operational data exchanged by your employees, legal strategies discussed with lawyers, business strategies discussed amongst the executives, negotiation tactics discussed amongst sales and so much more. A compromised server can listen in and record any and all calls, see (and manipulate) all files being transferred, and read all messages being exchanged and stored as conversation histories. When you log in to your account on a new device do you see your conversation history? If so, then so can anyone with access to that server. Gaining access to a C2S messaging server means gaining access to all communication on your entire network in one fell swoop! Nor is this just about ongoing communication. Whereas, for C2S platforms the central server contains a vast trove of highly sensitive data making it one of the single most valuable targets in your entire organization’s infrastructure. The difference between E2E and C2S platforms is that an E2E server is of little to no value to an attacker trying to steal secrets on an E2E platform. So, what’s the difference? Invariably, in any such platform all traffic is routed through a single central server. The distinction between end-to-end encryption vs client-to-server encryption is so important that it’s fair to say the two types of platforms are fundamentally different. ![]() Prominent examples would include Zoom, Slack, WebEx, Skype for Business, Telegram (in its default setting) and many others. The use of client-to-server architecture is especially prevalent in products that offer video communication. However, many other tools described as “secure” use antiquated client-to-server encryption. Modern products, including Wickr networks, built exclusively with end-to-end encryption provide a new level of data and communication security. ![]() The single most important security differentiator between communication platforms is whether they offer end-to-end encryption (E2E) rather than client-to-server encryption (C2S). While encryption is crucial, how it is used makes all the difference in the world. Mission critical data and highly sensitive discussions require secure communication tools that provide stronger encryption than products used for everyday communications.ĭescribing a communication tool as “secure” generally implies that – amongst other things – it protects all communication through encryption and authentication. This is an especially complex issue in large organizations – both public and private. Conversely, the information we share can create significant risk when we are discussing negotiation tactics, confidential client data, a new business strategy or trade secrets. The things we say and send to each other can hold immense value to us as a business, as an organization or as a private citizen. Single most important decision for Critical Data Protection
0 Comments
Leave a Reply. |