Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Monday, June 23
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Rethinking secure comms: Are encrypted platforms still enough?
    Latest News

    Rethinking secure comms: Are encrypted platforms still enough?

    TeamBy TeamMay 30, 2025No Comments5 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Robust cloud IAM should align to zero-trust principles
    Share
    Facebook Twitter LinkedIn Pinterest Email


    In today’s constantly changing cyber landscape, answering the question “what does best practice now look like?” is far from simple. While emerging technologies and AI-driven security tools continue to make the headlines and become the topics of discussion, the real pivot point for modern security lies not just in the technological advancements but in context, people and process. 

    The recent Signal messaging platform incident in which a journalist was mistakenly added to a group chat, exposing sensitive information, serves as a timely reminder that even the most secure platform is vulnerable to human error. The platform wasn’t breached by malicious actors, or a zero-day exploit being utilised or the end-to-end encryption failing; the shortfall here was likely poorly defined acceptable use polices and controls alongside a lack of training and awareness.

    This incident, if nothing else, highlights a critical truth within cyber security – security tools are only as good as the environment, policies, and people operating them. While it’s tempting to focus on implementing more technical controls to prevent this from happening again, the reality is that many incidents result from a failure of process, governance, or awareness. 

    What does good security look like today? Some key areas include:

    • Context over features, for example, whether Signal should have been used in the first place;
    • There is no such thing as a silver bullet approach to protect your organisation;
    • The importance of your team’s training and education;
    • Reviewing and adapting continuously. 

    Security must be context-driven. Business leaders need to consider what their key area of concern is – reputational risk, state-sponsored surveillance, insider threats, or regulatory compliance. Each threat vector requires a different set of controls. For example, an organisation handling official-sensitive or classified data will require not just encryption, but assured platforms, robust access controls, identity validation, and clear auditability.

    Conversely, a commercial enterprise concerned about intellectual property leakage might strategically focus on user training, data loss prevention, and device control. Best practice isn’t picking the platform with the cheapest price tag or the most commonly used; it’s selecting a platform that supports the controls and policies required based on a deep understanding of your specific risks and use cases.  

    There is no one-size-fits-all solution for your organisation. The security product landscape is filled with vendors offering overlapping solutions that all claim to provide more protection than the other. And, although we know some potentially do offer better protection, features or functionality, even the best tool will fail if used incorrectly or implemented without a clear understanding of its limitations. Worse, organisations may gain a false sense of security by relying solely on a supplier’s claims. The priority must be to assess your organisation’s internal capability to manage and operate these tools effectively. Reassessing the threat landscape and taking advantage of the wealth of threat intelligence tools available, helps ensure you have the right skills, policies, and processes in place. 

    Best practice in 2025 means recognising that many security incidents stem from simple human mistakes, misaddressed emails, poor password hygiene, or even sharing access with the wrong person. Investing in continual staff education, security awareness, and skills gap analysis is essential to risk reduction.  

    This doesn’t mean showing an annual 10-minute cyber awareness video; you need to identify what will motivate your people and run security campaigns that capture their attention and change behaviour. For example you could consider using engaging nudges such as mandatory phishing alerts on laptops, interactive lock screen campaigns, and quizzes on key policies such as acceptable use and password complexity. Incorporate gamification elements, for example rewards for completing quizzes, and timely reminders to reinforce security best practices and fostering a culture of vigilance. 

    These campaigns should be a mixture of communications that engage people coupled with training which is seen as relevant by the workforce, as well as meeting role specific needs. Your developers need to understand secure coding practices, while those in front line operations may need training in how to detect phishing or social engineering attacks. In doing so this helps to create a better security culture within the organisation and enhance your overall security posture. 

    Finally, what’s considered “best practice” today may be outdated by tomorrow. Threats are constantly evolving, regulations change, and your own business operations and strategy may shift. Adopting a cyber security lifecycle that encompasses people, process and technology, supported by business continuous improvement activities and a clear vision from senior stakeholders will be vital. Conducting regular security reviews, red-teaming, and reassessing governance and policies will help ensure that defences remain relevant and proportional to your organisation’s threats.

    Encryption, however, still matters. As do SSO, MFA, secure coding practises, and access controls. But the real cornerstone of best practice in today’s cyber world is understanding why you need them, and how they’ll be used in practice. Securing your organisation is no longer just about picking the best platform, it’s about creating a holistic view that incorporates people, process, and technology. And that may be the most secure approach, after all. 

    Russell Auld is digital trust and cyber security expert at PA Consulting

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Dr. Mahnaz CharaniaChief Transformation Officer, The New Teacher Project

      June 23, 2025

      Clouded judgement: Resilience, risk and the rise of repatriation

      June 23, 2025

      Why Giving My Students More Choice Was the Most Punk Rock Thing I Could Do

      June 22, 2025

      5 online resources to beat the summer slide

      June 22, 2025

      Cyber Essentials certifications rising slowly but steadily

      June 21, 2025

      An AI Wish List From Teachers: What They Actually Want It to Do

      June 21, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202452 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202427 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202422 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202516 Views
      Reviews

      How To Rank Videos On YouTube | Udemy Coupons 2025

      June 23, 2025

      Clinician Lead

      June 23, 2025

      Dr. Mahnaz CharaniaChief Transformation Officer, The New Teacher Project

      June 23, 2025

      The Beginners Guide to WordPress Theme Development 2025 | Udemy Coupons 2025

      June 23, 2025

      Expert Designer, Innovation Basketball Footwear Product Design

      June 23, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Dr. Mahnaz CharaniaChief Transformation Officer, The New Teacher Project

      June 23, 2025

      Clouded judgement: Resilience, risk and the rise of repatriation

      June 23, 2025

      Why Giving My Students More Choice Was the Most Punk Rock Thing I Could Do

      June 22, 2025

      5 online resources to beat the summer slide

      June 22, 2025

      Cyber Essentials certifications rising slowly but steadily

      June 21, 2025
      Latest Videos

      Elevate your business career with a Master of Applied Finance

      June 23, 2025

      5 Career Options for Digital Marketing Students

      June 22, 2025

      F1 2021 Career Mode – Not a bad move on a 4x WDC #formula1 #automobile #f1game #foryou #gaming

      June 20, 2025

      How to Become a Cyber Security Engineer in 2025[Complete Roadmap]| Intellipaat#shorts #cybersecurity

      June 19, 2025

      Why you should major in marketing #careeradvice #facts #career #motivation #careerguidance #college

      June 18, 2025
      Latest Jobs

      Clinician Lead

      June 23, 2025

      Expert Designer, Innovation Basketball Footwear Product Design

      June 23, 2025

      Fabrication Detailer (Revit OR Stratus)

      June 23, 2025

      Software Support Analyst

      June 23, 2025

      Creative Account Manager

      June 23, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202530 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202521 Views
      Blog

      How To Manage Your Career Goals Successfully

      June 20, 2025

      5 Mistakes That Are Killing Your LinkedIn Profile

      June 18, 2025

      How To Write A Cover Letter That Stands Out To Recruiters

      June 17, 2025

      Why Feedback Will Help Your Professional Development

      June 14, 2025

      4 Ways To Improve Your LinkedIn Presence

      June 13, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT