Security Operations:
If Your Communications Are Worth Protecting During An Incident, Aren’t They Worth Protecting Before?
In Sec Ops, Your Comms are Worth More
Mission critical departments like Security Operations, Board Members, Executives and Legal, play an outsized role in the organization. The day to day communications of these personnel are full of insights into how the company operates, where its weaknesses are and how it responds to a crisis.
What Have You Talked About That You Wouldn’t Want Bad Actors To See?
Hackers aren’t discovered for seven months on average and during that time they actively target the communications channels of these high-value personnel to glean information they could use to do more damage, cripple your response or extort individuals.
Don’t Wait Until Your Breached To Start Protecting
You wouldn’t put your valuables in a safe after your house is broken into, similarly some communications deserve more security day to day.
ArmorText isn’t just for protecting your mission critical communications during an incident, its also there to make sure your most valuable intel is never exposed with a network breach.
See How Your Incident Response Plan Stacks Up
Grade your plan now
Getting Started
1 of 1
How would you rate you Incident Response (IR) communications plan?
(1 being worst & 5 being best)
First, let's look at how Out-of-Band your solution is.
1 of 3
Does your IR comms tool rely on any On-premise Components?
(e.g. single-sign-on?)
Is there network-connected hardware that supports your IR comms tool that would no longer be trustworthy if your network is breached?
First, let's look at how Out-of-Band your solution is.
2 of 3
Is your alternate tool Dependent on Your Network? Does your IR tool depend on Active Directory, Single Sign On or other authentication tools that would be taken offline if your network is breached?
First, let's look at how Out-of-Band your solution is.
3 of 3
Is your chosen IR comms tool a Duplicate of Current Tool? Is your chosen IR comms tool a Duplicate of Current Tool?
Out of Band Risk Level:
Your communications plan could be impacted by a network breach
Now, let's look at how Secure your solution is.
1 of 3
Are communications on your IR tool end-to-end encrypted (E2EE)? Don't forget: Encryption-at-rest and encryption-in-transit are not the same as end-to-end encryption.
Now, let's look at how Secure your solution is.
2 of 3
Can your admins see communications on your IR comms tool?
Will your comms be exposed to anyone with the proper admin credentials, intentionally or unintentionally
Now, let's look at how Secure your solution is.
3 of 3
Can your IR comms tool's provider see your communications?
(intentionally or unintentionally)
Can your IR comms tool's provider see your communications? (intentionally or unintentionally)
Secure Comms Risk Level:
Your communications plan could be impacted by a rogue insider
Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.
1 of 3
Does your IR comms tool give you a way to manage users?
Define policies?
Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.
2 of 3
Does your IR comms tool give you the ability to retain comms for compliance, regulatory, or legal requirements?
Finally, let's look at how well your solution supports compliance, regulatory, and legal requirements.
3 of 3
Does your IR comms tool require self-hosting to enable archive retention?