Search

A Security Compromise Shouldn't
Compromise Your Communications

woman-holding-laptop

Step Zero: Don’t assume your communication tools will work.

Every step in an incident response playbook assumes that mission-critical roles can communicate. Too many assume their day-to-day corporate tools will be usable in an emergency and their best-laid plans go out the window when their network is breached. 

Step Zero means: make sure all your other steps can still be acted on by having the right comms tool in place.

Being prepared = Secure
Out of Band Collaboration

When there’s a count-down clock on the dark web with your logo over it, minutes matter.

Making a Secure Out of Band Collaboration tool part of your incident response playbook ensures invaluable time isn’t lost scrambling to spin up an ad-hoc communications channel.

More so, legal counsel and cyber insurance now insist on having a trustworthy communication channel established before even beginning to work with a compromised organization.

See How Your Incident Response Plan Stacks Up

Grade your plan now

Getting Started

1 of 1

How would you rate you Incident Response (IR) communications plan?
(1 being worst & 5 being best)

First, let's look at how Out-of-Band your solution is.

1 of 3

Does your IR comms tool rely on any On-premise Components?
(e.g. single-sign-on?) Is there network-connected hardware that supports your IR comms tool that would no longer be trustworthy if your network is breached?

Yes
No
I Don't Know

First, let's look at how Out-of-Band your solution is.

2 of 3

Is your alternate tool Dependent on Your Network? Does your IR tool depend on Active Directory, Single Sign On or other authentication tools that would be taken offline if your network is breached?

Yes
No
I Don't Know

First, let's look at how Out-of-Band your solution is.

3 of 3

Is your chosen IR comms tool a Duplicate of Current Tool? Is your chosen IR comms tool a Duplicate of Current Tool?

Yes
No
I Don't Know

Out of Band Risk Level:

Your communications plan could be impacted by a network breach





    Continue Questionnaire

    Now, let's look at how Secure your solution is.

    1 of 3

    Are communications on your IR tool end-to-end encrypted (E2EE)? Don't forget: Encryption-at-rest and encryption-in-transit are not the same as end-to-end encryption.

    Yes
    No
    I Don't Know

    Now, let's look at how Secure your solution is.

    2 of 3

    Can your admins see communications on your IR comms tool?
    Will your comms be exposed to anyone with the proper admin credentials, intentionally or unintentionally

    Yes
    No
    I Don't Know

    Now, let's look at how Secure your solution is.

    3 of 3

    Can your IR comms tool's provider see your communications?
    (intentionally or unintentionally) Can your IR comms tool's provider see your communications? (intentionally or unintentionally)

    Yes
    No
    I Don't Know

    Secure Comms Risk Level:

    Your communications plan could be impacted by a rogue insider





      Continue Questionnaire

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      1 of 3

      Does your IR comms tool give you a way to manage users?
      Define policies?

      Yes
      No
      I Don't Know

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      2 of 3

      Does your IR comms tool give you the ability to retain comms for compliance, regulatory, or legal requirements?

      Yes
      No
      I Don't Know

      Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.

      3 of 3

      Does your IR comms tool require self-hosting to enable archive retention?

      Yes
      No
      I Don't Know

      Your Overall Communications Plan Risk is:

      Don't let your response plan fail before it even begins. Let's Get in Touch.





        Security: Organizational Controls Are Just As Important As End-to-End Encryption

        Ephemeral messengers are fine for consumers but for an organization, security means more than end-to-end encryption and includes compliance features like user management, policy enforcement and audit trails. ArmorText provides a unique end-to-end encryption approach that maintains governance while reducing risks and eliminating common attack points.

        Don’t Let Security Incidents Control Your Company. With ArmorText:

        ArmorText is easy to deploy — most clients are up and running in under an hour —and provides greater security for critical roles and situations without sacrificing your organization’s controls.

        Don’t let your response plan fail before it even begins

        Learn more about how ArmorText can help your company survive a cyber incident.

        Search