Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Mobile
    • Networking

    Why You Shouldn’t Use Personal Messaging or Email Apps for Business

    Written by

    Wayne Rash
    Published March 26, 2019
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Over the weekend, we received word that Rep. Elijah Cummings (D-MD), who chairs the House Oversight and Reform Committee in Congress, had sent a letter to the White House regarding the use of a private email account by presidential advisor Ivanka Trump to conduct official business. The letter also asked about the use of the WhatsApp messaging app by advisor Jared Kushner to conduct sensitive diplomatic communications with people outside the U.S.

      According to multiple news reports, the recipient of some of Kushner’s messages was Saudi Crown Prince Mohammed bin Salman, the same Saudi official who ordered the killing of Washington Post journalist Jamal Khashoggi. The fact that Kushner uses Facebook’s WhatsApp to communicate official business is giving security experts within the government and elsewhere nightmares.

      Why? First of all, WhatsApp messages aren’t part of the official White House messaging infrastructure, and that means that they aren’t being preserved as required by the Presidential Records Act. Kushner’s lawyer has told the committee that Kushner sends screen shots of the messages to his official White House email, but as a number of officials have noted, that doesn’t preserve the entire communication.

      WhatsApp is Encrypted, but That Doesn’t Mean the Message is Safe

      But a worse problem is the security. While WhatsApp is encrypted end to end, it’s a commercial app intended for use by consumers. It has no means of protecting the communications on either end of the line. In any case, being encrypted isn’t the same thing as being safe. After all, WhatsApp is owned by Facebook, a company for whom security and privacy are, at best, theoretical concepts.

      On the other end of the line, cracking mobile phone security is a major industry in the Middle East, and some of that activity is operated under the auspices of the Saudi government. How hard would it be for a Saudi government official to install malware that affects both ends of the messaging link?

      So what does this have to do with you? Actually, a lot. Even if your company doesn’t deal with highly classified information, you still have information you don’t want to be made public. In addition, you may find yourself in a situation in which your communications are legally binding, such as when you agree to a purchase using email.

      Just as in the case of the White House, you don’t want to find out that one of your employees used an insecure messaging platform that enabled a breach. Likewise, you don’t want to find out that your executives’ private discussions were sharing a messaging service with the babysitter.

      Legal Consequences a Major Factor

      If you’re engaging in some activity that’s got a legal consequence, such as negotiations for a merger, an HR situation or even an order for paper for the copier, you want to make sure you have a copy of that communication.

      The way to accomplish this in business depends on whether you let your employees use their own phones and computers. If you provide those for the employees to use, then you can take charge of the applications that are installed on their devices. You can also lock down the device so that employees can’t add applications, which will make it less convenient to use things like WhatsApp.

      On the other hand, if your organization has gone fully into the BYOD world, then you’re going to deal with a more complicated problem. Since you don’t own the device, your control over the apps that are installed is limited. In this case, your best chance is in the realm of HR policy.

      Your rule forbidding the use of personal messaging for company business may not prevent its use, but it will give you some recourse if your employees ignore the policy and use it anyway. For example, you may want to make it a matter of policy that the employee is personally responsible for financial transactions conducted outside of official channels. Then you can control the outcome when they submit their expenses.

      Consider the Nature of the Infraction First

      It’s important to the nature of the infraction. For example, an employee setting up lunch with a prospective customer over a Facebook Messenger account isn’t exactly an egregious failing. But using WhatsApp to tell their friends about company activities probably is a policy violation.

      The best way to handle this issue is to make it easy for your employees to follow the rules. For example, make sure that their company email will work from their mobile device in addition to their computer at work. Set clear guidelines for the use of messaging and social media when it involves the company, and include a description of the consequences if your employees don’t follow the rules. Then enforce the rules.

      While you can use the right technology to determine whether employees are using social media or a messaging app from the company network by using an NG firewall, it may not be worth the effort. Your employees can bypass your firewall by simply turning off WiFi on their devices.

      Instead, help your employees comply with your policies by providing them the means to follow them and by educating them on how to accomplish that. Like everything else in security, it helps a lot if your staff is working on your behalf.

      Wayne Rash
      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a content writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.