Microsoft is watching you – What you need to know when using Microsoft Teams

Companies and private individuals alike rely on Microsoft Teams. The advantages are obvious: central storage in the cloud, simple organisation of employees in groups and collaborative work on projects. But what about encryption to protect your information?

As part of our security research, we took a closer look at encryption: How, when and where is encryption used and what type of connections are established? We also scrutinised whether the actual encryption meets the standards advertised by the manufacturer.

Result of the analysis

The result surprised us:

Encryption is used (when end-to-end encryption is activated for both communication partners):
✅ Audio calls
✅ Video calls
✅ The sharing of screens

Transmitted without end-to-end encryption (without the corresponding activation option):
❌ Files
❌ Messages

Significant security issues on the client devices

The investigation revealed significant security issues on the client devices themselves. There is no end-to-end encryption and no option to activate it via the settings. This means that messages and files are stored unencrypted on the client and can be viewed by the manufacturer Microsoft. This poses a considerable risk to the privacy and security of users. If you would like to take a look behind the encryption, please read our comprehensive research report attached.

Generic statement from Microsoft

We confronted Microsoft with the issue and received the following statement from a spokesperson: ‘’The end-to-end encryption feature meets the needs of some customers to provide a higher level of confidentiality when required. This confidentiality is mainly required in direct, non-persistent communication, i.e. video and audio transmissions, while there are already established ways of ensuring confidentiality for the transmission of messages or files. As is generally the case in Teams, these messages and files are already protected against unauthorised reading both by extensive security measures and by system-side encryption.’

You can download our complete analysis here

Lukas Sökefeld

Cyber Security Consultant
Lukas Sökefeld deals with the latest developments on the subject of AI and cyber security on a daily basis and advises our customers online and on site.

Jetzt weiterlesen!

Fill The Gap

Robots on patrol – How robotics and AI are changing the security industry with Severin Pfister (Ascento)

Security robots that independently monitor terrain, recognise anomalies and communicate with existing systems - what sounds like science fiction has long since become reality. In the latest episode of FILL THE GAP, the security podcast, we talk to Severin Pfister from Ascento about the use of robotics and artificial intelligence in property protection.

Security Compliance

NIS 2 and CER: How the delayed legal implementation in Germany is putting KRITIS operators under pressure

The resilience of our critical infrastructures (KRITIS) is at stake. While other EU countries have long since created facts, Germany is lagging alarmingly behind in the crucial implementation of European requirements for KRITIS security, in particular the NIS-2 and CER directives.

Fill The Gap, Security Consulting

FILL THE GAP – the new security podcast is here! 🎙

Security is complex - we help you to keep an overview. In FILL THE GAP, we talk to experts about current challenges, technological developments and real threat scenarios in the field of physical security!

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.