Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of the budget” of a AAA title

    Will there actually be any such thing as a Project Helix “native” game? | Opinion

    Larry Hryb joins Commodore International Corporation as community development consultant

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      The team behind continuous batching says your idle GPUs should be running inference, not sitting dark

      March 13, 2026

      Met Office ‘supercomputing as a service’ one year old

      March 12, 2026

      Tech hiring evolves as candidates ask for AI compute alongside pay and perks

      March 11, 2026

      Oracle is spending billions on AI data centers as cash flow turns negative

      March 11, 2026

      Google: Cloud attacks exploit flaws more than weak credentials

      March 10, 2026
    • Crypto

      Banks Respond to Kraken’s Federal Reserve Access as Trump Sides with Crypto

      March 4, 2026

      Hyperliquid and DEXs Break the Top 10 — Is the CEX Era Ending?

      March 4, 2026

      Consensus Hong Kong 2026: The Institutional Turn 

      March 4, 2026

      New Crypto Mutuum Finance (MUTM) Reports V1 Protocol Progress as Roadmap Enters Phase 3

      March 4, 2026

      Bitcoin Short Sellers Caught Off Guard in New White House Move

      March 4, 2026
    • Technology

      Optimizing Content for Agents

      March 14, 2026

      Our Experience with I-Ready

      March 14, 2026

      Show HN: Simple plugin to get Claude Code to listen to you

      March 14, 2026

      I beg you to follow Crocker’s Rules, even if you will be rude to me

      March 14, 2026

      5 Ways To Use Your PC’s Ethernet Port (Besides Plugging In Your Router)

      March 14, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»Security vs. usability: Why rogue corporate comms are still an issue
    Technology

    Security vs. usability: Why rogue corporate comms are still an issue

    TechAiVerseBy TechAiVerseMay 27, 2025No Comments4 Mins Read2 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Security vs. usability: Why rogue corporate comms are still an issue
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Security vs. usability: Why rogue corporate comms are still an issue

    A leak of information on American military operations caused a major political incident in March 2025. The Security Think Tank considers what can CISOs can learn from this potentially fatal error.

    By

    • Elliott Wilkes, ACDS

    Published: 27 May 2025

    Internal and external comms are an age-old minefield for security leaders, with teams balancing security with usability. In some cases, insecure comms systems can turn otherwise diligent top teams and employees into (accidental) insider threats. This presents two key challenges: data loss prevention and corporate buy in.

    Let’s start with data loss prevention. The recent leak of information on American military operations via Signal is an extraordinary incident – but it may be more commonplace than we think, especially within corporations. Politics and legal issues aside, the exchanging of sensitive organisational data on systems that aren’t designed for such is not uncommon, despite its blaring insecurity.

    Incidents like this highlight why it’s not worth the risk to use unvetted third-party apps, like Signal or WhatsApp, despite their ease of use. Leaks from chats like this can be ruinous to the reputation of an organisation, resulting in financial loss, reputational and legal damage and, in some cases, non-compliance. Often, conversations held on apps that aren’t overseen or approved by security teams are not officially logged, which can be a problem for compliance. In some industries, like finance and healthcare, for example, organisations are expected to keep logs of conversations to meet compliance, with disappearing messages, as an example, violating this. On the other hand, some organisations (like many of those in the retail and media sectors) have very short data retention policies, with written, non-disappearing messages violating this.

    Usability and getting organisational buy-in

    It’s important to consider why employees turn to external messaging apps so security professionals can build secure tech that people will actually use. Simply put, sometimes employees turn to non-org issued comms apps due to ease of use and accessibility. Top teams are especially prone to this, with any sort of restrictions running the risk of slowing work down – and time is money.

    Security teams are challenged with trying to provide secure tech that will actually be used with the appropriate security measures built in. These apps should be encrypted and let people get their jobs done efficiently and with little friction. Equally, employees must be educated on the risks (and laws) of using unapproved third-party apps, as well as the personal and organisational repercussions of not using them.

    The rise of BYOD

    Modern working conditions, like hybrid working, have further complicated the matter. Personal devices being used for work and ‘bring your own device’ (BYOD) models are on the rise across organisations. Oftentimes this is because it reduces costs and increases flexibility. Whilst these devices enable quick conversation between teams, unmonitored personal devices can mean a lack of control for security teams and, as a result, increased security risk.

    Ultimately, robust BYOD policies and practices must be put in place to mitigate excess risk that arises from using personal devices for work. There must be some element of corporate review of what’s allowed on these devices to ensure safety of organisational data.

    Whilst many users may have faith in the security of the apps they’re using, personally and professionally, a compromised device often means that these security measures are overridden. Ensuring that users follow basic device hygiene when it comes to security is important (regularly updating software and apps, for example). Additionally, users should understand the importance of enabling multi-factor authentication (MFA) and similar measures that make it harder for a threat actor to move across accounts.

    The verdict?

    This isn’t a new problem for CISOs and security teams. Getting organisational buy-in on cyber in general is hard, but restricting the apps that allow people to get their jobs done quickly is equally as tedious. Security teams should prioritise creating and investing in comms systems with good user interfaces that are backed up by robust security measures, like encryption. These apps, devices and tools must also meet the compliance standards set for the organisation’s respective industries. Additionally, strong awareness training is crucial for helping people at all levels understand the risks and consequences of working outside of organisational security standards.

    Elliott Wilkes is CTO at Advanced Cyber Defence Systems. A seasoned digital transformation leader and product manager, Wilkes has over a decade of experience working with both the American and British governments, most recently as a cyber security consultant to the Civil Service.

    Read more on Privacy and data protection


    • When leaders ignore cybersecurity rules, the whole system weakens

      By: Raihan  Islam


    • Unspoken risk: Human factors undermine trusted platforms


    • Security Think Tank: What CISOs can learn from Signalgate


    • Signalgate: Learnings for CISOs securing enterprise data

      By: Todd Thiemann

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleInterview: Richard Masters, vice-president of data and AI, Virgin Atlantic
    Next Article Building resilient cyber threat intelligence communities
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Optimizing Content for Agents

    March 14, 2026

    Our Experience with I-Ready

    March 14, 2026

    Show HN: Simple plugin to get Claude Code to listen to you

    March 14, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025716 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025303 Views

    Wired Headphones Are Making A Comeback, And We Have Gen Z To Thank

    July 22, 2025210 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025173 Views
    Don't Miss
    Gaming March 14, 2026

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of the budget” of a AAA title

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of…

    Will there actually be any such thing as a Project Helix “native” game? | Opinion

    Larry Hryb joins Commodore International Corporation as community development consultant

    Roblox and Minecraft players are less likely to play traditional AAA video games

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Embark Studios head Patrick Söderlund explains how Arc Raiders was made on “a quarter of the budget” of a AAA title

    March 14, 20262 Views

    Will there actually be any such thing as a Project Helix “native” game? | Opinion

    March 14, 20263 Views

    Larry Hryb joins Commodore International Corporation as community development consultant

    March 14, 20263 Views
    Most Popular

    Outbreak turns 30

    March 14, 20250 Views

    New SuperBlack ransomware exploits Fortinet auth bypass flaws

    March 14, 20250 Views

    CDs Offer Guaranteed Returns in an Uncertain Market. Today’s CD Rates, March 14, 2025

    March 14, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.