TelsyInTouch: secure mobile conversations

TelsyInTouch Comunicazioni sicure hor

In the world of information and interconnection, where both workers and private citizens are exposed to a multitude of cyber risks ranging from malware, computer fraud, theft of intellectual property or sensitive personal data, we cannot afford to let our guard down.  

Among the various vectors of these risks, one stands out in terms of frequency of use and permeation into every aspect of our lives: the smartphone.  

Relying on generic antivirus and assuming that our device will never be the target of cyber attacks is risky and often leads to real disasters for an organization or our private life.  

 

Smartphones and instant messaging apps

TelsyInTouch Comunicazioni sicure womanSmartphones, tablets, smartwatches and many other mobile devices are part of our daily lives. We rely on them for a wide variety of uses and, of course, our data is stored in each of them. 

No less risk-free are the instant messaging applications which have become indispensable. From the most commercial to the most niche (depending on the intended use), so-called “instant messaging apps” exchange, store and process our data according to the provider’s policies. 

Our exchanged data (images, audio, video, text, etc.), although protected by cryptographic encryption algorithms that guarantee their confidentiality, no longer belong exclusively to us, and may be used by the service provider as appropriate, although in compliance with current privacy regulations.  

  

The risks of unconscious use

As much messaging apps as utility apps, games, and more have potential inherent vulnerabilities. These can turn into vectors for cyber-attacks or malware infections and, in some cases, can harbor spyware or commands within their code that can activate, without user authorization, the microphone or camera, exfiltrating private data.  

TelsyInTouch Comunicazioni sicure worriedIn most cases, these vulnerabilities are unintentional and do not result from the developer’s criminal activities, but sometimes, the code is developed voluntarily to reproduce this type of operation, aimed at industrial espionage or theft of information, especially towards prominent people. 

Thus, especially for public or private organizations and particularly exposed individuals, it is not enough to rely on smartphone solutions or apps to exchange business-like information, if we do not want to incur potential security disasters.  

  

Secure phone and app: TelsyInTouch

TelsyInTouch is a dual solution (App + Smartphone) created to provide companies and government agencies with a robust and secure device to carry out secure communications in all operational environments. 

TelsyInTouch Comunicazioni sicure mockupThe solution consists of two integrable and interoperating parts that provide the necessary cyber and cryptographic security:

TelsyInTouchPhone 

TelsyInTouchPhone are state-of-the-art, kernel-level configured smartphones that comply with Common Criteria standards for maximum COMSEC and CIS security.  

Appropriately developed to minimize the attack surface, they provide only the functionality that reflects the requirements defined by the specific customer.  

The solution is available in both iPhone and Google Pixel versions. 

TelsyInTouchApp

An instant messaging app developed by Telsy to ensure the protection of data and conversations through sophisticated security layers, such as specific NIST– and FIPS-certified encryption protocols and the proprietary TelsyGuard VPN. 

The user experience of TelsyInTouchApp is similar to that of the most popular messaging applications on the market and allows text messages, audio messages, calls, video calls, and file transmissions to be sent securely. 

  

Learn more about TelsyInTouch and contact us at contact@telsy.it.