Shortly after Amazon CEO Jeff Bezos and his wife Mackenzie announced that they were divorcing, the National Enquirer published text messages that Bezos had reportedly sent to Lauren Sanchez, who he is currently in a relationship with. Bezos, like everybody else, is entitled to his privacy. These text messaging leaks, however, remind us that security is a must in order to protect personal information—whether business related, financial or private conversations with friends and family.
In this modern day and age, mobile business messaging—specifically, secure mobile business messaging—is a must-have for the transportation and logistics industry. Today, electronic data is a critical part of supply chains, making secure communications a necessity for both efficiency and security.
The revelations Tuesday and Wednesday about the extensive use of Wickr inside Uber upended the high-stakes legal showdown with Alphabet’s Waymo unit, which accuses the ride-hailing firm of stealing its self-driving car secrets. The issue of course is not whether using Wickr or apps like it, including Vaporstream, is acceptable. The issue is when, where and how to use the application and what legitimate use indeed looks like.
Eavesdropping is relatively easy to solve in any communication method by applying encryption while messages are in transit. Although native SMS texting does not provide this security, Indeed, many texting apps offer excellent encryption that will make it much more difficult for spies to read messages.
As the workforce becomes increasingly mobile and employees rely on texting for quick, easy communication, organizations across industries have been driven to create policies that guide how the information created by mobile text messaging is managed. These frameworks help to effectively support recordkeeping, answer compliance needs and ensure data availability for eDiscovery. Information governance is one such accepted discipline, ensuring a reasonable level of security for records and information that require protection.
“Whoever Wins the White House, This Year’s Big Loser is Email.” Thus, reads the headline in the NY Times on October 19, 2016. Indeed, in the current election cycle, month after month, the focus has been on hacked and released emails, on disappearing emails, on emails that reappear on various devices – not of the user’s choosing. It certainly seems that the people who sent those emails should have known better than to write what they actually wrote in the first place.
Secure communications are essential to the HR recruiting process. From initial correspondence with potential new hires to salary negotiations, HR recruiters need the ability to communicate internally and externally while keeping confidential information secure. But, keeping this information private in today’s technology landscape can be a challenge for both recruiters and job candidates.
People engage in conversations over phones in public areas without a thought to who can overhear, or about the potential consequences. There is a blind faith that privacy is somehow granted by being surrounded by strangers. That privacy is often valid, however strangers don’t always equal safety.