Skip to main content

Another day, another malware discovery. This time within the US military. According to a recent New York Times article, officials found suspected Chinese malware hidden in various military systems with the intention to disrupt the operation of these systems.

The infiltration first came into the public eye in May when Microsoft identified malicious code in telecommunications software in Guam. It is unclear how the malware was inserted but this incident offers a sobering reminder that no one is impervious to malicious attacks and bad actors, not even the US government and military.

“China is steadfast and determined to penetrate our governments, our companies, our critical infrastructure,” said Deputy Director of the National Security Agency George Barnes at the Intelligence and National Security Summit last month.

Organizations large and small and across all industries must take precaution, leveraging training, education, and security best practices to lock down IT infrastructure, devices, applications, and other modes of communications, such as text, chat, and email.

Firewalls, security frameworks such as SASE and Zero Trust, two-factor authentication, and other technologies are only as strong as the weakest link. Moreover, social engineering schemes through phishing and ransomware prey on users who are oblivious, not vigilant.

Inherent in the design of QTel (formerly Qphone), all text, phone calls, chat and video conferences are encrypted end-to-end and isolated to prevent co-mingling, thus denying bad actors the opportunity to disrupt or intercept business-critical communications.

While there will always be new cybersecurity threats to thwart, utilizing a secure communications platform can ensure sensitive conversations and information are not compromised.

Click here to schedule a call to learn more about QTel.