The Case for Secure Communications
The tapping of voice communications has occurred virtually as long as electronic communication has been in existence. In the early days of electronic communications, and prior to the implementation of digital technology, tapping a phone was very easy. One simply needed access to the physical wiring where a listening device could be connected.
Today's communications landscape has migrated to mostly wireless communications. This doesn't mean that communications are more secure. In fact, it means that the attack surface has become much larger. Wireless traffic has the potential to be captured, listened to and even hijacked without any indication to those on either end of a call.
The good news is that these communications can be protected with solutions that encrypt and secure voice and messaging communications so that even if its captured, it will reveal no usable information.
Read More
By submitting this form you agree to BlackBerry contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. BlackBerry web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: Authentication & Access Systems, Communications Software, Consumerization of IT, Data Loss Prevention (DLP), Data Recovery, Digital transformation, Email Security, Endpoint Security, Event Management, Firewall, IT Security, IT Threats & Vulnerabilities, Log Management, Malware, Mobile Security, Network Security, Security Management, Security Solutions, VPN


More resources from BlackBerry

Better Security. Fewer Resources.
When you consider the number of headlines that appear on a regular basis about major data breaches — despite ongoing increases in security techno...

Incident Response Use Cases
According to an IBM study, the vast majority of organisations surveyed are unprepared to respond effectively to a serious security incident. Most o...

Compromise Assessment Use Cases
With cyber attacks increasing both in quantity and sophistication, how can an organization know with certainty whether its defenses have been compr...