Microsoft is watching you – What you need to know when using Microsoft Teams

Companies and private individuals alike rely on Microsoft Teams. The advantages are obvious: central storage in the cloud, simple organisation of employees in groups and collaborative work on projects. But what about encryption to protect your information?

As part of our security research, we took a closer look at encryption: How, when and where is encryption used and what type of connections are established? We also scrutinised whether the actual encryption meets the standards advertised by the manufacturer.

Result of the analysis

The result surprised us:

Encryption is used (when end-to-end encryption is activated for both communication partners):
✅ Audio calls
✅ Video calls
✅ The sharing of screens

Transmitted without end-to-end encryption (without the corresponding activation option):
❌ Files
❌ Messages

Significant security issues on the client devices

The investigation revealed significant security issues on the client devices themselves. There is no end-to-end encryption and no option to activate it via the settings. This means that messages and files are stored unencrypted on the client and can be viewed by the manufacturer Microsoft. This poses a considerable risk to the privacy and security of users. If you would like to take a look behind the encryption, please read our comprehensive research report attached.

Generic statement from Microsoft

We confronted Microsoft with the issue and received the following statement from a spokesperson: ‘’The end-to-end encryption feature meets the needs of some customers to provide a higher level of confidentiality when required. This confidentiality is mainly required in direct, non-persistent communication, i.e. video and audio transmissions, while there are already established ways of ensuring confidentiality for the transmission of messages or files. As is generally the case in Teams, these messages and files are already protected against unauthorised reading both by extensive security measures and by system-side encryption.’

You can download our complete analysis here

Lukas Sökefeld

Cyber Security Consultant
Lukas Sökefeld deals with the latest developments on the subject of AI and cyber security on a daily basis and advises our customers online and on site.

Jetzt weiterlesen!

Cyber Security

GPS spoofing in logistics: Invisible danger for supply chains

Whether in the navigation system of modern vehicles or in the tracking chip on a freight pallet - GPS (Global Positioning System) is now an indispensable part of global supply chains and mobility solutions. But what happens when this technology is manipulated? GPS spoofing enables attackers to deliberately falsify positioning data - with potentially fatal consequences for companies, security and profitability.

Uncategorized

Vehicle restraint systems planned correctly: Safety begins before the fence

When it comes to protecting properties, infrastructure or public areas, many people first think of access control, video technology or alarm systems. But one central weak point often goes unnoticed: vehicle access - whether through accident, negligence or intent.

Fill The Gap, Security Compliance

The EU CER Directive explained – What companies need to know now

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.