Digitalendpoint Blog

We offer our best advice, research, how-tos, and insights with the goal of helping you increase employee productivity and protect your business from insider threats.

Whatsapp’s End-to-end Encryption: What More Can You Do to Protect Your Data?

by | Aug 11, 2016 | Other | 0 comments

There’s been a lot of discussion around encryption and data-security this year.

Triggered by the FBI’s widely publicised battle with Apple over gaining access to a criminal’s iPhone, everyone is talking about the issue of data privacy.

Meanwhile, while the potential clash was brought to a premature halt when the FBI managed to gain access to the iPhone, it now seems potentially small in comparison to the latest development…

At the beginning of April, Whatsapp, the Facebook-owned messaging app behemoth, announced that it had introduced end-to-end encryption on all its messages. This news means that every communication via Whatsapp is securely encrypted.

While this is great news for people who use Whatsapp, it also shows that most forms of communications aren’t fully protected and is a timely reminder about the importance of keeping your data secure, especially at work.

Protecting your data at work

Aside from using Whatsapp for all your business communications – which isn’t very practical, what can you do to ensure your crucial business data is adequately protected?

In addition to the standard precautions: fully up to date security software, and a network that is regularly tested by a security professional, one of the best ways to keep your data secure at work is through the use of employee monitoring software.

The software can then monitor what websites and applications each employee uses, as well as all their emails, IM, text messages and voice communications. You can even set it up so that it up to alert managers whenever specified files are accessed or copied, or keywords input.

On the one hand, you can ensure that none of your employees are visiting sites or using apps that may contain malware that would compromise your security. On the other, if any of your sensitives files are accessed, either from a successful hack or an internal threat, you can be immediately alerted to the danger.

With so many potential threats to your data, having a constant eye on all of your devices and users is an excellent way to protect it.

How do you protect your data at work?

What methods do you use to protect sensitive company data? Let us know in the comments section below.

Submit a Comment

Your email address will not be published. Required fields are marked *