Home » end-to-end encryption

end-to-end encryption

5 Crucial Cybersecurity Principles for Businesses

The face of cybercrime has changed, alongside the strategies used. It’s no longer just the teen hacker in their bedroom, it’s a variety of different people with a broadening array of tactics. And what’s more, in the current climate of goodwill it is increasingly easy to get caught up in one of these traps. With this in mind, there’s no harm done in brushing up on five cybersecurity principles that can help you and your business mitigate the more common tricks and attacks used by cybercriminals: 1. Least Privilege Just because you trust everyone in your business doesn’t mean that your receptionist needs the same access levels as your CEO. Give users minimum necessary access and leave your most valuable data vulnerable to far fewer breach points. You wouldn’t give a hotel guest a key for eve...

Zoom Denies End-to-End Encryption to Free Users

Videoconferencing company Zoom confirmed this week that it won’t enable its end-to-end encryption for free calls because it wants to allow law enforcement access to these calls if necessary. Zoom’s statement about the policy reads: “Zoom does not proactively monitor meeting content, and we do not share information with law enforcement except in circumstances like child sex abuse. We do not have backdoors where participants can enter meetings without being visible to others. None of this will change,” says a spokesperson. “Zoom’s end-to-end encryption plan balances the privacy of its users with the safety of vulnerable groups, including children and potential victims of hate crimes. We plan to provide end-to-end encryption to users for whom we can verify identity, thereby limiting harm to t...