To Know
-
Protecting Our Data
Keep An Eye Out
CALL To Growth
May 2025
To Know
-
Protecting Our Data
Keep An Eye Out
CALL To Growth
May 2025
EDITION EDITORIAL & OVERVIEW
Protecting Our Data
#
61
CALL To Growth
-
May 2025

How was classified military information leaked in a non-authorized group chat?

Recently, a journalist revealed that he started receiving messages from unknown individuals who claimed to be senior US officials discussing national security matters.  This raised significant concerns about disinformation campaigns and operational security breaches, highlighting the importance of verifying identities and maintaining secure communication channels to protect sensitive information.

The use of unauthorised social networks for organisational communication increases exponentially the risk of information leaks and security breaches, so their use should be minimized in professional contexts. While platforms like Signal, Telegram or WhatsApp are encrypted, they lack the same level of supervision and business integration as the tools provided by Celfocus - Microsoft Teams and Outlook. These tools ensure compliance, accountability and protection against unauthorised access, safeguarding Celfocus' data and reputation.

Know more details about this case here.

Interactive Section

In this edition, you can access a short challenge where you’ll have to identify the dangers of compromising corporate information while working remotely.

Access the challenge here.

Am I exposing my data?

Attackers often create custom phishing messages and social engineering tactics that exploit specific details from our daily lives or online profiles. To do this, they take advantage of the personal information we unknowingly share online—through photos, comments, reviews that reveal our habits and preferences, or even seemingly harmless surveys that collect our personal information.

To minimize this exposure, it's important to adopt some key digital safety practices, such as:

Evaluating the information you share: Before giving any information about yourself, consider whether it could compromise your privacy if exposed.

Using a password manager: This helps you create strong, unique passwords and avoid reusing them across different platforms.

Avoiding the use of your corporate email: Don’t use your Celfocus email address to register on external websites, as these platforms may be compromised in the future, putting your data at risk.

Online safety depends on recognizing that privacy is not automatically protected —it must be actively managed with intention and care.

If you wish to know whether your information has been compromised and leaked on the internet, you can visit the website “Have I Been Pwned?”.

New Information Security Policies

Our internal Security policies have been updated to reflect the most recent ISO 27001 controls (international security certification standard) which will be audited this year by an external certification team.

We encourage you to look through these new policies and get an understanding of the new security requirements that Celfocus complies with to maintain the organization secure.

Please find them on our internal SharePoint page and keep them handy for future reference.

Information Security contacts

We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organisation.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:

email: information.security@celfocus.com

No items found.
No items found.

How was classified military information leaked in a non-authorized group chat?

Recently, a journalist revealed that he started receiving messages from unknown individuals who claimed to be senior US officials discussing national security matters.  This raised significant concerns about disinformation campaigns and operational security breaches, highlighting the importance of verifying identities and maintaining secure communication channels to protect sensitive information.

The use of unauthorised social networks for organisational communication increases exponentially the risk of information leaks and security breaches, so their use should be minimized in professional contexts. While platforms like Signal, Telegram or WhatsApp are encrypted, they lack the same level of supervision and business integration as the tools provided by Celfocus - Microsoft Teams and Outlook. These tools ensure compliance, accountability and protection against unauthorised access, safeguarding Celfocus' data and reputation.

Know more details about this case here.

Interactive Section

In this edition, you can access a short challenge where you’ll have to identify the dangers of compromising corporate information while working remotely.

Access the challenge here.

Am I exposing my data?

Attackers often create custom phishing messages and social engineering tactics that exploit specific details from our daily lives or online profiles. To do this, they take advantage of the personal information we unknowingly share online—through photos, comments, reviews that reveal our habits and preferences, or even seemingly harmless surveys that collect our personal information.

To minimize this exposure, it's important to adopt some key digital safety practices, such as:

Evaluating the information you share: Before giving any information about yourself, consider whether it could compromise your privacy if exposed.

Using a password manager: This helps you create strong, unique passwords and avoid reusing them across different platforms.

Avoiding the use of your corporate email: Don’t use your Celfocus email address to register on external websites, as these platforms may be compromised in the future, putting your data at risk.

Online safety depends on recognizing that privacy is not automatically protected —it must be actively managed with intention and care.

If you wish to know whether your information has been compromised and leaked on the internet, you can visit the website “Have I Been Pwned?”.

New Information Security Policies

Our internal Security policies have been updated to reflect the most recent ISO 27001 controls (international security certification standard) which will be audited this year by an external certification team.

We encourage you to look through these new policies and get an understanding of the new security requirements that Celfocus complies with to maintain the organization secure.

Please find them on our internal SharePoint page and keep them handy for future reference.

Information Security contacts

We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organisation.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:

email: information.security@celfocus.com

No items found.
No items found.

How was classified military information leaked in a non-authorized group chat?

Recently, a journalist revealed that he started receiving messages from unknown individuals who claimed to be senior US officials discussing national security matters.  This raised significant concerns about disinformation campaigns and operational security breaches, highlighting the importance of verifying identities and maintaining secure communication channels to protect sensitive information.

The use of unauthorised social networks for organisational communication increases exponentially the risk of information leaks and security breaches, so their use should be minimized in professional contexts. While platforms like Signal, Telegram or WhatsApp are encrypted, they lack the same level of supervision and business integration as the tools provided by Celfocus - Microsoft Teams and Outlook. These tools ensure compliance, accountability and protection against unauthorised access, safeguarding Celfocus' data and reputation.

Know more details about this case here.

Interactive Section

In this edition, you can access a short challenge where you’ll have to identify the dangers of compromising corporate information while working remotely.

Access the challenge here.

Am I exposing my data?

Attackers often create custom phishing messages and social engineering tactics that exploit specific details from our daily lives or online profiles. To do this, they take advantage of the personal information we unknowingly share online—through photos, comments, reviews that reveal our habits and preferences, or even seemingly harmless surveys that collect our personal information.

To minimize this exposure, it's important to adopt some key digital safety practices, such as:

Evaluating the information you share: Before giving any information about yourself, consider whether it could compromise your privacy if exposed.

Using a password manager: This helps you create strong, unique passwords and avoid reusing them across different platforms.

Avoiding the use of your corporate email: Don’t use your Celfocus email address to register on external websites, as these platforms may be compromised in the future, putting your data at risk.

Online safety depends on recognizing that privacy is not automatically protected —it must be actively managed with intention and care.

If you wish to know whether your information has been compromised and leaked on the internet, you can visit the website “Have I Been Pwned?”.

New Information Security Policies

Our internal Security policies have been updated to reflect the most recent ISO 27001 controls (international security certification standard) which will be audited this year by an external certification team.

We encourage you to look through these new policies and get an understanding of the new security requirements that Celfocus complies with to maintain the organization secure.

Please find them on our internal SharePoint page and keep them handy for future reference.

Information Security contacts

We have a dedicated Security team that works diligently to ensure the protection of our systems, data, and the overall cybersecurity posture of the organisation.

Should you have any questions, concerns, or need assistance regarding security matters, our team is here to help. Please find below the contact information for our Information Security team:

email: information.security@celfocus.com

No items found.
No items found.
Go Back
Let Us Know Your Thoughts About Our Newsletter!
Start by
Saying Hi!
© 2024 Celfocus. All rights reserved.
Let Us Know Your Thoughts About Our Newsletter!
Start by
Saying Hi!
© 2025 Celfocus. All rights reserved.
50
45
ai-in-2025
40
adolescence
35
grit-power
30
growing-up-61
25
nostalgia
50
protecting-our-data
60
portuguese-women-in-tech
80
sneak-peek
99
lead-the-way
75
25-years-of-talent
65
nice-to-meet-you-61
55
jawwy-migration
98
keep-learning
100
moving-forward
70
the-importance-of-cloud-security-training
80
cheers-to-you