温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ssh.com/blog/using-unauthorized-channels-for-sensitive-information-sharing
点击访问原文链接

Unauthorized Communication: All You Need to Know Now

Unauthorized Communication: All You Need to Know Now About us Investors Partners Careers Solutions SOLUTIONS Zero Trust Suite Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Assessment, Quantification & Mitigation By Topic Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & multi-cloud access management Interactive tour: Privileged Access in the Cloud M2M connections IT Audits & Compliance Secure file transfer By Industry Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Products SECURE ACCESS & SECRETS MANAGEMENT SECURE FILE TRANSFER & ENCRYPTION NQX™ quantum-ready encryption Tectia™ SSH Client/Server Tectia™ z/OS SalaX Secure Collaboration Secure Mail 2024 Secure Messaging 2024 SalaX Secure Collaboration Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability Solutions SOLUTIONS PrivX Zero Trust Suite SalaX Secure Collaboration Strong ID-based access with Entra ID & Zero Trust Suite Quantum-Safe Cryptography (QSC) Security Risk Assessment, Quantification & Mitigation Device trust & access and identity verification Identity-based authentication & converged IAM and PAM TOPICS Just-in-Time Access Secure vendor access Credentials & Secrets Management Hybrid & Multi-Cloud Access Management Interactive tour: Privileged Access in the Cloud M2M Connections Management IT Audits & Compliance Secure File Transfer INDUSTRIES Managed Service Providers (MSP) Operational Technology (OT) Federal Government Security Healthcare Data Security OT Security IT/OT convergence of data & systems Zero Trust Access and ZSP Workflow approvals Secure remote access  Secure patch management  OT Compliance Discovery and threat intelligence Phishing-resistant MFA & device trust Products SalaX SECURE COLLABORATION Secure Mail Secure Messaging Secure Sign SalaX Secure Collaboration FQX File Encryptor SECURE ACCESS & SECRETS MANAGEMENT PrivX™ PAM PrivX™ OT Edition PrivX Key Manager SECURE FILE TRANSFER & ENCRYPTION Tectia™ SSH Server Tectia™ SSH Server for IBM z/OS PrivX Desktop NQX™ quantum-safe encryption Services SSH Risk Assessment™ Professional Services Support Contact us Customer cases PrivX Zero Trust PAM Enterprise Key Management UKM Tectia SFTP for servers & mainframes SSH Secure Collaboration Resources SSH Academy Content library Blog References Press releases Downloads Manuals Events & Webinars Media Legal Report a vulnerability About us Investors Partners Careers October 10, 2022 Are You Using Unauthorized and Non-compliant Channels for Sensitive Information Sharing? Written by: Maarit Asikainen Are your sensitive communications encrypted, restricted, trackable, and compliant? That's the question circulating in the finance sector, as massive fines are hitting financial businesses due to personnel discussing deals and trades on their personal, unauthorized devices and communication apps – and then deleting the messages afterward. 

Unencrypted and untrackable communications are a serious vulnerability Wall Street companies have been fined over 1,8 bln dollars this year for violations like these, and U.S CFTC Commissioner, Christy Goldsmith Romero, strongly condemned similar activities in her statement, accusing these practices of jeopardizing market integrity and violating the law.  

She also pinpointed the fact that this illegality “…was disturbingly widespread, evasive, directed or sanctioned by senior bank executives, and a clear violation of the law and internal bank policies.” 

The widespread use of unauthorized communication channels is a serious security issue. For example, have you ever thought of how many people you are sharing your business communication with? The number is probably much higher than you think.  

To help you assess the security level of your own communications, try to answer this question: Which of these statements apply to your communication style? 

I send sensitive data over WhatsApp, Wicker, Signal, text messages, or similar applications. I regularly delete the messages I have sent. I use end-to-end encryption for sensitive communications.  I can authenticate the recipients before allowing them access to the sensitive data. I can authorize, restrict, and allow access to business-critical data according to different data classification levels. If statements 1 and 2 apply to you, you’re practicing a communication style that can lead to data leaks and non-compliance. If you agreed with statements 3, 4 and 5, you’ve got it covered and your communication style supports good practices.

Messaging applications or regular SMS are not secure enough Let me elaborate.

Using popular instant messaging applications, like WhatsApp, is a very risky business for sensitive information sharing.  

WhatsApp is owned by Facebook, the company whose track record for keeping information private is not great. Their business model is based on sharing information, not protecting it. WhatsApp has its uses, but it’s not the tool to use when sharing your company’s business or trade secrets. 

Many people think that switching from WhatsApp to traditional SMS will protect their data and information, but the unfortunate fact is that traditional text messages are not very private or secure either.    

When using traditional SMS, the messages you send are not end-to-end encrypted. Also, mobile operators and service providers can potentially see the content of your messages as the messages are stored in the service providers' systems and data warehouses.

Secure your sensitive communications with the right tools Going back to the question above - the best answer is to preserve a solid track record of your business communications for auditing and forensics while being in control of your data and content yourself (statements 3, 4, and 5). 

You should use a solution that: 

boasts robust end-to-end security for communications across organizations  identifies and verifies any user sharing sensitive information  allows you to restrict access levels and additional authentication methods as per the sensitivity level of data (confidential, restricted, secret)  works like your everyday online collaboration tools but with government-grade security  This enables you to preserve your business communications, fulfill record-keeping requirements, and share the communications only with the intended recipients. 

At SSH, we understand that compliance with laws and regulations is crucial to keep your operations going – whether you use on-prem tools, the cloud, or a hybrid approach to data management. The mission of our SalaX Secure Collaboration solution is exactly that – stay compliant while processing, storing, and sharing data with the right people.

Learn more about SalaX Secure Collaboration >>>

Learn how we help our customers secure their sensitive communications >>>

 

Tag(s): secure communications , Secure Information Sharing , Deltagon Suite Maarit Asikainen Maarit Asikainen is business manager with strong background in software and IT industry. She has worked with major companies like Nokia, Telia and EVRY in marketing, sales and business development roles. She believes that the interplay among strategy, offering, brand, and customer understanding ultimately fuels the...

Other posts you might be interested in Privileged Access Management 6 min read | February 17, 2026 Zero-Day Cyberattack on Major Telcos in Singapore: Lessons on Securing Privileged Access to Critical Systems  Read More Privileged Access Management 6 min read | February 9, 2026 How to break up with your password Read More Privileged Access Management 7 min read | February 3, 2026 SSH and Leonardo: A Strategic Partnership for Trusted European Cybersecurity  Read More Subscribe to email updates SSH is a leading defensive cybersecurity company that secures communications between humans, systems, and networks. We specialize in Zero Trust Privileged Access Controls and Quantum Safe Network Security. Our customers include a diverse range of enterprises, from multiple Fortune 500 companies to SMBs across various sectors such as Finance, Retail, Technology, Industrial, Healthcare, and Government. 25% of Fortune 100 companies rely on SSH’s solutions. Recent strategic focus has expanded SSH business to Defence, Critical Infrastructure Operators, Manufacturing OT Security and Public Safety.

Leonardo S.p.A invests 20.0 million EUR in SSH, becoming the largest shareholder of the company. SSH solutions form a Center of Excellence for Zero Trust privileged access management and quantum-safe network encryption in Leonardo - a global industrial group that creates multi-domain technological capabilities in the Aerospace, Defence and Security sector with 17.8 billion EUR revenue in 2024. SSH company’s shares (SSH1V) are listed on Nasdaq Helsinki.

 

Solutions Zero Trust Suite Zero Trust Suite & Entra ID Integration Quantum-Safe Cryptography (QSC) SalaX Secure Collaboration Security Risk Mitigation OT security MSP Security Device Trust Monitoring & Threat Intelligence Credentials & Secrets Management IT Audits & Compliance Products PrivX™ Hybrid PAM PrivX Key Manager Tectia SSH Client/Server™ Tectia™ z/OS Secure Messaging Secure Mail Secure Sign NQX™ Quantum-Safe Services SSH Risk Assessment™ Professional Services Support Resources Careers References Downloads Manuals Events & Webinars Blog Company About us Contact Investors Partners Press Stay on top of the latest in cybersecurity Be the first to know about SSH’s new solutions, product updates, new features, and other SSH news!

Thanks for submitting the form. © Copyright SSH • 2025 • Legal

智能索引记录