customisable counter

Why is Skype’s new feature so important

Why is Skype’s new feature so important

With more targeted attacks on social networking services than ever, private conversations with your business partners can become public information. To prevent this, Skype has released a new feature that ensures complete privacy by encrypting all types of communication. Here are some of the features.

Benefits of using Private Conversations

Named ‘Private Conversations’ by Microsoft, this new feature allows all audio calls, text messages, and multimedia messages to be encrypted. This means that when the feature is enabled, only the sender and receiver will be able to view or hear the transmissions. Even if they were to be intercepted, their contents would be totally garbled.

Although Skype has already been providing basic encryption to its service, elevating this feature to something called "end-to-end encryption" prevents unintended parties -- such as cybercriminals or even the government -- from tapping into private conversations, ensuring peace of mind to more than 300 million users.

Beta stage of testing

Currently still in its testing stage, end-to-end encryption is available only in the beta version of Skype Insider. To activate it, select “new private conversation” from another user’s profile or Skype’s “compose” menu.

Currently, Private Conversations do not support video chat. And although conversation contents are encrypted, conversation details -- such as the call duration and when it occurred -- can still be accessed by Skype.

Other end-to-end encrypted VoIP services

From free consumer communication apps like WhatsApp to business solutions like RingCentral, and many other VoIP services, end-to-end encryption is becoming more prevalent every day.

Skype for Business sells it as a simple, DIY telecom solution. But with cyber attacks getting more sophisticated every day and the increasing number of data security regulations, a lot can go wrong. If you're interested in switching to a VoIP service, or want us to assess the security of your current solution, give us a call.

Published with permission from TechAdvisory.org. Source.