Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

How to Secure Business Communication Tools in an Increasingly Digital Work Environment

Spurred by digital transformations and the pandemic, businesses have moved a lot of meetings and communications—internally, externally and with customers—to workplace collaboration tools and cloud messaging apps such as Slack, Teams, WhatsApp and Zoom.

Companies today frequently discuss very sensitive topics over these apps with employees and customers. While communicating via these channels helps companies operate more efficiently, it naturally poses cybersecurity risks.

The increase in remote work has also compounded the security problem since home offices introduce the risk of cybersecurity issues that occur outside of a protected corporate network. . Since the beginning of the pandemic, cyberattacks involving remote workers have increased by 238%.

Business collaboration apps can be exploited in a number of ways. Slack, for example, makes use of encryption but doesn’t feature end-to-end encryption often because executives want to maintain visibility into communications among teams and channels. WhatsApp has also been exploited in a variety of social engineering attacks, and Telegram, which is particularly popular with financial services firms, has become a frequent target.

The vulnerabilities introduced by the use of these tools in the enterprise setting have created a new attack category—Business Communication Compromise, or BCC. BCC is an evolution of the more familiar category Business Email Compromise (BEC).

However, companies should not avoid using these new digital communication tools that improve their business; they can continue to use them while still protecting their brand equity and ensuring that company and customer data is safe. But they need to address the vulnerabilities first.

Attackers Exploit the Human Element

Employees, whether intentionally or accidentally, share sensitive information like login credentials, financial reports and even proprietary information when communicating in workplace collaboration tools. In BCC, cybercriminals target the full range of these tools to exploit that sensitive data.

According to Verizon’s 2022 Data Breach Investigation Report, 82% of data breaches involved the human element. An attack can start with a phishing email and then, if successful, move across other communication platforms like Slack or Teams. From there, an attacker could use a social engineering tactic like impersonation to get into the network and steal sensitive information.

To protect businesses, employees and customers in this new attack surface, organizations and their SOC teams need to gain greater visibility over business communication channels to identify and discover sophisticated social engineering attacks in all cloud channels.

Defeating Social Engineering Attacks with ML and AI

Unified visibility is essential to securing enterprise cloud-based environments, but when defending against social engineering attacks that are becoming more sophisticated, context is also critical. Because so many attacks employ language-based techniques, SOC teams need help from machine learning (ML) and artificial intelligence (AI) tools to understand the full breadth of business communications.

Recent advancement in ML and AI can help disrupt social engineering and phishing attacks in the initial compromise phase. These tools useAI and machine-reading comprehension to understand sentences in text or speech of messages without resorting to computer languages.

These tools can also analyze the intent and context of conversations occurring across multiple communication channels. Traditional cybersecurity tools rely on metadata-based activities to detect anomalies, but ML and AI based tools can analyze the language elements in conversations—such as context, topical elements and lexical features—to detect social engineering and language-based attacks.

An organization that maintains visibility across the array of its cloud-based collaboration tools and employs Natural Language Understanding (NLU) analysis is better able to detect attacks in their early stages.

Ensuring Secure Business Communication

Collaboration tools like messaging apps are vital to a company’s success, especially if it operates remotely and with employees spread across different regions. Business communication tools are indispensable in today’s distributed working environments, both for internal communication between team members and for external communication with customers. But their use has attracted the attention of attackers who successfully exploit their security weaknesses and tailor their attacks to specific communication platforms.

Protecting the brand equity of the company is of utmost importance when using collaboration tools. Customer data is sensitive, and one data breach can destroy a company’s reputation. As collaboration channels continue to play an essential role in business communication and operations, companies must prioritize securing these channels against threats.

Organizations can mitigate the risk by enforcing strict access controls that provide visibility into the business communication environment, implementing data loss prevention measures and training employees on how to handle sensitive information. But perhaps most importantly, ML and AI based tools can reveal the context and intent of language-based attacks across collaboration channels. If companies can identify suspicious behavior before it leads to a data breach, they can disrupt social engineering and phishing attacks earlier on in the kill chain, before it’s too late.


About the Author

Chris Lehman is CEO at SafeGuard Cyber. SafeGuard Cyber provides security and compliance for email and multi-channel communications. Stop social engineering attacks, insider threats, ransomware, and policy violations across email and workplace channels like M365, Slack, Salesforce, LinkedIn, Zoom, WhatsApp, Telegram, and more. For more information, please visit www.safeguardcyber.com

Featured image: ©Mila Supinskaya

more insights