Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Encryption Is More Important than Ever

Encryption Is More Important than Ever

Now that Google’s Android Messages application has end-to-end encryption, it might be a good time to discuss the concept of what end-to-end encryption actually is and why it’s important. Let’s take a closer look.

First, a bit of background information on encryption and how it works.

What is Encryption, and How Does it Work?

Encryption’s primary role is to keep data secure while it’s being shared and stored. Let’s say that we wanted to share something random with you, like a couple of lines from the famous play Romeo and Juliet. If we wanted to make sure that only the specified recipient could read it, we might take the following passage…

“But, soft, what light through yonder window breaks?
It is the east, and Juliet is the sun.”

...and turn it into this as it is sent along:

OoLCYOGthzwihU03wMa6y1xdbXhK4bM+XQCE02c2LCV6qg2mdGPG4MWgPHOQzmkfUC2jxq2/sKE9eN4E+6ByUBGukTFnxL9ShM0oqIv3HAN7m8yXBOwyMa9B6Hn2FXYw

Obviously, it looks like a bunch of nonsense in this state, but once it’s been decrypted, the intended participant can read it. This might be oversimplifying it a bit, but at the end of the day, encryption is a powerful tool that has been used in some form or another for centuries. Today’s encryption uses complex mathematical formulas that would take even the most powerful computer ages to solve.

All that aside, let’s get to what Google has done with its Android Messages application.

Google is Adding Encryption to the Stock Message App on Android

Google first announced that it would launch this beta test in November 2020, equipping all up-to-date instances of the default Android messages application with end-to-end encryption. Since SMS is often used to send and receive sensitive information and two-factor authentication messages, this addition is quite welcome.

At this time, the encryption feature comes into play with one-on-one chats between users who have the chat features enabled on their devices. This is usually represented by a padlock at the top of the screen.

Encryption is a Tool That You Should Be Using

Encryption alone is not enough to completely protect your business, but it’s certainly worth your investment, and it is most definitely better than the alternative. Voyage Technology can equip your business with these powerful enterprise-level security measures. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Cybersecurity Small Business Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Android Business Management Smartphones VoIP Upgrade communications Mobile Devices Disaster Recovery Browser Data Recovery Windows Managed IT Services Social Media Microsoft Office Tech Term Network Remote Current Events Productivity Internet of Things Facebook Automation Artificial Intelligence Cloud Computing AI Covid-19 Gadgets Managed Service Provider Miscellaneous Remote Work Server Holiday Information Outsourced IT Encryption Compliance Training Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Wi-Fi Windows 10 Blockchain Virtualization Business Technology Bandwidth Mobile Office Two-factor Authentication Vendor IT Support Apps Data Security Mobile Device Management BYOD Gmail Chrome Employer-Employee Relationship Budget Apple Networking Managed Services App Voice over Internet Protocol Marketing Computing Information Technology Access Control WiFi HIPAA Office 365 Tip of the week Applications Hacker How To Avoiding Downtime BDR Conferencing Website Healthcare Operating System Virtual Private Network Risk Management Health Big Data Office Tips Router Analytics Augmented Reality Retail Storage Password Help Desk Bring Your Own Device Computers Managed IT Services Going Green Patch Management Save Money Telephone Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Cooperation Free Resource Firewall Project Management Physical Security Windows 7 Display Printer Microsoft 365 The Internet of Things Paperless Office Infrastructure Solutions Social Document Management Windows 11 Customer Service Scam 2FA Monitoring Data loss Excel Remote Workers Robot Downloads Settings iPhone Printing Word Wireless Licensing Content Filtering Entertainment Vulnerabilities IT Management Data Privacy VPN YouTube Meetings Images 101 Cryptocurrency Telephone System Multi-Factor Authentication Safety Mobility Computer Repair Cost Management Virtual Desktop Data storage LiFi Employees Outlook Machine Learning Integration Money User Tip Modem Humor Processor Mobile Security Customer Relationship Management Holidays Maintenance Antivirus Sports Mouse Data Storage Smart Technology Supply Chain Hacking Presentation Video Conferencing Managed Services Provider Administration Saving Time Virtual Machines Professional Services Wireless Technology Managed IT Service Travel Download Net Neutrality Alerts SQL Server Technology Care History Techology Business Communications Recovery Google Maps Cortana Financial Data Browsers Smartwatch Connectivity IT Break Fix Scams Hard Drives Alt Codes Domains Downtime Unified Threat Management Upload Procurement Azure Hybrid Work Social Network Telework Cyber security Unified Threat Management Multi-Factor Security Tech Human Resources Hosted Solution CES IoT Communitications Dark Web Cables Refrigeration Typing Public Speaking Network Congestion Trends Supply Chain Management Customer Resource management FinTech Regulations Lithium-ion battery Google Drive User Error Google Calendar Term Google Apps Knowledge Entrepreneur Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Point of Sale 5G Gamification Flexibility Organization Social Networking Google Docs Legislation Shortcuts Unified Communications Experience Bitcoin Network Management Running Cable Tech Support Fileless Malware Digital Security Cameras Smart Devices Ransmoware Undo Wearable Technology Memory Vendors Google Wallet Monitors Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Windows 8 Laptop Websites Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Drones Electronic Medical Records Trend Micro SharePoint Specifications Security Cameras Workplace Strategies Application Halloween Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon IBM Lenovo Writing Username Virtual Reality eCommerce Black Friday SSID Hacks Server Management Scary Stories Private Cloud Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Superfish Media Identity Theft Fun Twitter Proxy Server Reviews Cookies Cyber Monday Medical IT Deep Learning Competition Error Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Education Social Engineering Remote Computing Shopping Nanotechnology Optimization PowerPoint Mobile Computing Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation User Tablet Search Management PCI DSS Alert Gig Economy Screen Reader Distributed Denial of Service Workplace Best Practice Managed IT Buisness File Sharing Dark Data Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity IP Address Legal Evernote Paperless IT solutions How To Regulations Compliance Notifications Bookmark Smart Tech Memes Co-managed IT Business Growth

Blog Archive