Search
tech-woman

Need a Secure Compliant Way to Communicate During a Cyberattack?

In a crisis, “in-network” equals “at-risk”

man-using-laptop

In a Crisis, Traditional Comms Tools are Unusable

Email, Slack, Teams, and other network-integrated comms tools are vulnerable during a cyberattack. Once the hackers are in your network, they have access to everything — including your mission-critical incident response discussions.

woman-using-phone

End-to-End Encryption Won’t Solve the Problem

Organizations have different needs than consumers, so while WhatsApp, Signal, and other consumer privacy-focused apps offer end-to-end encryption, that isn’t enough for today’s modern enterprises. Security is also being able to maintain controls, perform user management, enforce policies, and retain business records. Privacy apps just create liability.

woman-statistics

Fast Response is Key

Certainly, the best time to choose and implement a crisis communications collaboration tool is before an attack occurs. But if you’re in the midst of a cyberattack, speed is imperative; you need a secure tool that can be immediately deployed that still meets compliance policies. Only a collaboration tool that meets all three requirements for Secure Out of band communications can do this.

Secure
Out of Band
Compliant

True Out of Band tools have no dependencies on your network and go beyond just end-to-end encryption by securing against common weaknesses like compromised admin credentials.

All of this without forcing you to compromise on your internal policies or controls.

ArmorText can do all three and be deployed in less than an hour.

#image_title

Cyber Resilience: Incident Response Tabletop Exercises Collection

Plan. Prepare. Protect.


ArmorText and the international law firm of Crowell & Moring LLP are pleased to offer a collection of innovative guides, that provide some of the most accurate depictions of current cyberattacks.

See How Your Incident Response Plan Stacks Up

Grade your plan now

Getting Started

1 of 1

How would you rate you Incident Response (IR) communications plan?
(1 being worst & 5 being best)

First, let's look at how Out-of-Band your solution is.

1 of 3

Does your IR comms tool rely on any On-premise Components?
(e.g. single-sign-on?) Is there network-connected hardware that supports your IR comms tool that would no longer be trustworthy if your network is breached?

Yes
No
I Don't Know

First, let's look at how Out-of-Band your solution is.

2 of 3

Is your alternate tool Dependent on Your Network? Does your IR tool depend on Active Directory, Single Sign On or other authentication tools that would be taken offline if your network is breached?

Yes
No
I Don't Know

First, let's look at how Out-of-Band your solution is.

3 of 3

Is your chosen IR comms tool a Duplicate of Current Tool? Is your chosen IR comms tool a Duplicate of Current Tool?

Yes
No
I Don't Know

Out of Band Risk Level:

Your communications plan could be impacted by a network breach





    Continue Questionnaire

    Now, let's look at how Secure your solution is.

    1 of 3

    Are communications on your IR tool end-to-end encrypted (E2EE)? Don't forget: Encryption-at-rest and encryption-in-transit are not the same as end-to-end encryption.

    Yes
    No
    I Don't Know

    Now, let's look at how Secure your solution is.

    2 of 3

    Can your admins see communications on your IR comms tool?
    Will your comms be exposed to anyone with the proper admin credentials, intentionally or unintentionally

    Yes
    No
    I Don't Know

    Now, let's look at how Secure your solution is.

    3 of 3

    Can your IR comms tool's provider see your communications?
    (intentionally or unintentionally) Can your IR comms tool's provider see your communications? (intentionally or unintentionally)

    Yes
    No
    I Don't Know

    Secure Comms Risk Level:

    Your communications plan could be impacted by a rogue insider





      Continue Questionnaire

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      1 of 3

      Does your IR comms tool give you a way to manage users?
      Define policies?

      Yes
      No
      I Don't Know

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      2 of 3

      Does your IR comms tool give you the ability to retain comms for compliance, regulatory, or legal requirements?

      Yes
      No
      I Don't Know

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      3 of 3

      Does your IR comms tool require self-hosting to enable archive retention?

      Yes
      No
      I Don't Know

      Your Overall Communications Plan Risk is:

      Don't let your response plan fail before it even begins. Let's Get in Touch.





        ArmorText Benefits

        tech-man-with-tablet

        Don’t let your response plan fail before it even begins.

        Learn more about how ArmorText can help your company survive a cyber incident.

        Search