We wanted to share some exciting news: we’ve successfully completed our SOC 2 Type 1 audit! We embarked on this audit as part of our ongoing commitment to delivering the most robust and professional experience to our users. Service Organization Control (SOC) 2 is a procedure designed to ensure that service providers can securely manage data to protect the interests and privacy of their clients.
In recent years, remote working has risen sharply, with a 27.7% increase in the number of home-workers in the last decade alone. A mobile workforce means that a business' data is also ‘mobile’. Data, whether it is emails, ideas, contracts or plans, is the life-blood of most modern businesses; it is their intellectual property (IP). Without this data, there would be no product, no service, no sales.
At the pace that technology continues to change, it’s clear that the coming decade will continue to bring technological advances that evolve not only how we work, but the very nature of work itself.
Wire continues to be a force to be reckoned with when it comes to winning awards - this time around as a finalist for the Cybersecurity Excellence Awards 2020. The recognition comes in at a time of unprecedented growth – gaining regognition in both the technology and business categories. At the Cybersecurity Excellence Awards Wire is in the final for two awards in business categories.
Looking into the crystal ball again - this time for 2020 - Wire highlights some of the trends we see will dominate the headlines for the first year of the new decade. There are some common underpinnings - most notably that data has now become the most valuable commodity and companies are increasingly running on data, becoming massively vulnerable to any interruption or loss. The second is mobile.
Messaging Layer Security (MLS) has the potential to be the industry standard when it comes to enterprise collaboration. My colleague, Alan Duric, wrote about the birth of MLS in his blog post, where he outlined how its founding members came together with a vision of transforming enterprise communication.
When it comes to personal messaging, people have the option to choose from a range of consumer products that offer various levels of security, including end-to-end encryption. So, for the average person, using secure communication is an option in their everyday life, whether they want it or not. Yet, for business users, there are only a few enterprise options with end-to-end encryption than one would hope for or really expect.