The Case for Secure Communications
The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications, and prior to the implementation of digital technology, tapping a phone was very easy. One simply needed access to the physical wiring where a listening device could be connected.
Today's communications landscape has migrated to mostly wireless communications. This doesn't mean that communications are more secure. In fact, it means that the attack surface has become much larger. Wireless traffic has the potential to be captured, listened to and even hijacked without any indication to those on either end of a call.
The good news is that these communications can be protected with solutions that encrypt and secure voice and messaging communications so that even if its captured, it will reveal no usable information.
Read More
By submitting this form you agree to BlackBerry contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. BlackBerry web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Authentication & Access Systems, Communications Software, Consumerization of IT, Data Loss Prevention (DLP), Data Recovery, Digital transformation, Email Security, Endpoint Security, Event Management, Firewall, IT Security, IT Threats & Vulnerabilities, Log Management, Malware, Mobile Security, Network Security, Security Management, Security Solutions, VPN


More resources from BlackBerry

Endpoint security versus productivity in the ...
Computing's interviews with CIOs and CISOs consistently support the view that breaches are inevitable, and it is a consistent finding in both resea...

Better Security. Fewer Resources.
When you consider the number of headlines that appear on a regular basis about major data breaches — despite ongoing increases in security techno...

Endpoint security versus productivity in tran...
Transport and logistics organisations form part of our critical infrastructure, which in itself makes them a high value target for those intent on ...