Skip to content
Building your order...
+

Are Your Private Texts Private?

man on mobile

You probably don’t give much thought to the security of a text message. Usually it’s a stream of consciousness conversation with one or a few friends about where to meet for dinner or gossip about the day’s events. Nothing proprietary here…just a few sarcastic comments and laugh emojis.

It’s not like it’s a business email or anything important, right? Besides, how would you even know if someone was eavesdropping on your texts about tonight’s dinner plans?

Better safe than sorry. We’ve compiled five tips to improve your texting security.

Power Your Performance with Business Class Internet

Experience high-performance connectivity to drive your business forward with symmetrical Business Class Internet. Whether you have a small or mid-sized business, this premium, blazing-fast speed gives you the throughput to manage your daily operations.

When text security becomes important

So what about those times when you innocently reset a password or enter a shipping confirmation number via text. Are those messages and responses from automated text messaging systems safe? Is sensitive information contained in some of those messages—account numbers, passwords, email and physical addresses—left open for anyone to see?

They shouldn’t be, but these days you never know. Phone numbers can be hijacked or forwarded without your permission. The icon on your phone shows you’re connected to your trusty network, so everything must be secure…but text messages aren’t actually a direct Device A to Device B transmission.

Its complicated

A text going from a business to your phone can be a multi-step process involving several companies, especially if you’re texting using a different carrier. Companies often use outside vendors to handle things like verifying a customer’s phone number or using multi-factor authentication. Once authorized, carriers then release the text message contents to get it delivered to the appropriate phone(s) or device(s). If any of the servers in this messaging/authentication chain or network ports are left unguarded, it may be possible for hackers to access your messaging threads.

While every carrier will tell you they offer multi-layer security features to protect your data and privacy against such threats, well, cyber criminals are always one step ahead of the good guys. You don’t want to risk someone scraping a password or shipping confirmation number off your texts any more than you want a stranger knowing where you’re going for dinner.

Voice Built for All Sized Businesses

Designed for the needs of today’s mobile workforce, Hosted Voice gives you access to state-of-the-art features and functionality at a low cost.

Tips to improve your text security

We’ve compiled these easily accessible tips to improve your security while texting and help reduce exposure to cybersecurity breaches. Take advantage of safety measures offered to you by websites you visit, as well as employing your own practices and tools.

Tip #1 — Use two-factor authentication (2FA)

This authentication method only grants access or allows transmission after the user verifies their identity using a combination of two different factors, usually a password plus correctly answering an obscure question about something only they would know, like a maiden name or old street address. This prevents someone from accessing an account even if they have your password. Google Authenticator and 1Password are examples of popular self-contained authentication apps with built-in 2FA code generators.

Tip #2 — Make sure your devices are “trusted devices”

You may get annoyed at the Trusted Device protocol many sites insist on following when downloading an app or iTunes song, for example. But this is an important step to protect you when signing into sites using different devices or browsers.

Tip #3 — Employ software tokens

Microsoft Authenticator is one example of a popular software token-based solution; others include Twilio Authenticator and LastPass Authenticator. These apps rely on a time-based one-time password (TOTP) algorithm to generate a short-lived (30 seconds or less) password. For verification, the user must copy the password into the website’s or app’s required field before it expires.

Tip #4 — Distribute hardware tokens

These physical devices, sometimes called dongles, are typically USB flash drives or keychain fobs that store authentication and certificate data for that user. Hardware tokens do not require cell phone reception or even Wi-Fi; however, they are costly to set up and maintain, and employees often misplace or confuse them with other personal devices.

Tip #5 — Use biometrics

This rapidly emerging technology eliminates additional devices altogether and instead relies on a user’s inherent credentials, such as fingerprints, retina, or even gait to verify a user. A nice feature of this technique is you have less to memorize!

Transform your digital communications

Astound is dedicated to helping small businesses operate more productively and securely. Contact us today to learn how we can help transform your digital communication

Stay informed and stay competitive

See more articles on technology and best practices that can impact your business.

Disclaimers

Not all services, speeds and product features are available in all areas. Taxes & fees apply to all services and are subject to change. All services a governed by Astound Business Solutions Terms and Conditions. Other restrictions may apply. Internet speeds may vary & are not guaranteed. Certain equipment may be required to reach advertised speeds. DOCSIS 3.1 modem with 2.5GE physical LAN port is required for 1 Gigabit speeds and higher. Learn more on why speeds may vary. To view Astound’s FCC Network Management Disclosure see below. Modem required for Internet service. Wi-Fi Security provided by eero. ±Astound Internet is powered by fiber and connected to the premises via coaxial connection or fiber, where available. Delivery methods may vary by area.

TV rates are not promotional and are subject to change. Availability of channels, packages, TV tiers and other offerings may vary by location and is subject to change. Any additional services (such as equipment, add-on channels and other tiers of service) are subject to additional charge & regular increases. Minimum internet speed of 250 Mbps is required for Business TV service. Programming subject to change; availability may differ by location; certain on demand, events and pay-per-view titles are available an addt’l cost. High definition may not be available in all markets. Refer to your on-screen guide for details.

Available phone services may vary based on market and location. Additional charges apply to new or moved phone jacks and may apply to additional cable jacks as well as custom or non-standard installation work. Other restrictions may apply. Read phone equipment and battery backup details. CA/OR RESIDENTS: pricing for phone does not include 2% Regulatory Administration Fee.

New business customers only, and other restrictions apply. Customer consents to texts, emails & calls by Astound for purposes relating to customer’s account. All services are governed by the Astound Small Business Services Subscriber Agreement.

+Satisfaction Guarantee (Astound.com/about-us/customer-pledge)

All names, logos, images and service marks are property of their respective owners. ©2024 Astound Business Solutions, LLC. All rights reserved.