The lastest in connecting and collaborating securely at work. From our leading minds in cybersecurity.

With more and more of your personal and businesses digital footprint being stored in the cloud, have you ever thought about the implications of where your data is being hosted?

What is data sovereignty

Data sovereignty is the idea that data remains in the country of its origin, stored within its own borders and subject to the laws and regulations of that country alone.

One may think that if you’re sending data (such as a message or document) to another person located in the same country, that data would stay in the same country. However in reality, data is often routed and stored in many countries before and after arriving at its destination. This means that your data is subject to the local laws and regulations in any country which your data is routed or stored in.

The laws and regulations of data sovereignty

Most countries claim the right to any data that passes through or is stored on their servers however the legal precedent surrounding this notion is often untested and shaky.

The US Patriots Act of 2001 states that in the event of a high-security threat that the U.S. government can access any data stored within the country, without notification of the data owner. Meaning Australian’s with data stored within America are potentially subject to their data being seized without notice. In many European countries as well as Canada, governments are bringing in strict regulation to guarantee that data remains within the country to protect the security of their citizens.

In Australia numerous government departments are already compelled to host data within Australian data centres, such as the government's COVIDsafe app that utilises Amazon’s webs services to ensure data sovereignty.

Why it matters

Before the insurgence and popularity of cloud storage, data sovereignty was a relatively unheard of phrase but as individuals, enterprise and government began shifting data to the cloud it has become increasingly relevant.

Having your data stored on foreign soil means that data is open to seizure by foreign governments and individuals through subpoena, legal proceedings or malicious intent. This means those who store data, communications or intellectual property must accept the fact that they are increasing the likelihood of this data no longer remaining confidential. If such data was to be breached it could have potentially catastrophic effects for many businesses such as a loss of reputation and client confidentiality.

How can I achieve data sovereignty?

In order to achieve data sovereignty, your data must remain and be stored within the country of its origin. For example if you are in Australia and sending a file to another colleague in Australia, the data must be stored in Australian data hosting centres rather than potentially cheaper options in America or Asia.

If you are not actively pursuing data sovereignty then there is a very high likelihood that at least part if not the majority of your digital footprint is hosted in international data hosting centres. At Dekko we give users the option of where they can store their data to ensure they can keep sovereignty over their data. This is available for all Dekko services such as video-conferencing, file sharing, chat and document signing.

If you would like to read more about our data sovereignty capabilities then read our security page:

If you would like to try one of our completely secure communications and collaboration solutions then visit:

Since the advent of COVID-19 people around the world are shifting from workplaces into home office environments. With this has come a massive uptick in video conferencing to allow people to communicate and collaborate with their colleagues and clients despite working from home. However one issue many have grappled with is, how do I make my home office look professional over a video call.

Whether you're in a share-house or a penthouse there are some simple steps that you can take to up your professionalism and put your best foot forward when working from home.


Proper lighting is perhaps the most crucial element to make yourself look professional when video conferencing from home. Correct lighting ensures you can be seen clearly and will also improve the quality of your video feed to other meeting participants. If you want your input into a meeting to carry weight, make sure it’s not coming from a low visibility, low quality video feed.

So what’s the best way to improve the lighting in your home office environment?

  • Open the window shades and let some natural light into the room if possible. As long as the window is not facing directly into your webcam this will provide a natural, even lighting.

  • DON'T put a light source such as a lamp behind your webcam and body, this will create a silhouette around your body and make your face dark.

  • DO put a light source in front of your webcam and body so that it is illuminating your face. This doesn’t have to be a spotlight, just a simple lamp a couple metres away will do the trick.

Think about your background

When you don’t have the ability to meet in person, your home office environment is going to provide subconscious cues to other meeting participants when video conferencing. A messy desk with a pile of dirty washing behind you might send the wrong message about your organisational skills to a potential client.

This doesn’t mean you have to go out and buy a full collection of Encyclopedia Britannica to place neatly behind your desk but it does mean you might want to avoid clutter. Consider which way you are angling your webcam to have a clean work environment behind you and push that hamper of dirty laundry out of frame. Consider adding something uncomplicated to your background, perhaps a simple piece of artwork or a pot plant to provide some character.

Manage distractions

Whether it's kids, roommates or a partner, you don’t want someone interrupting your work meeting, it can be distracting for you but also anyone else in the meeting. The best way to avoid this is to find a private place to set up your home office, this could be your bedroom, an office or any quiet room. Avoid having doors and hallways in your background if possible as these increase the likelihood of an unexpected visitor being visible.

However this is not always possible so for those people consider investing in earphones or headphones with a high-quality in built microphone. Not only will this greatly improve the quality of your audio feed to others in the meeting but it will also reduce background noise by moving the microphone closer to your mouth.

Upgrade your audio

Your audio quality is just as important as your video quality if you want your opinion to be heard and listened to.Your computer's inbuilt microphone will do fine in a quiet room however if you are video conferencing from a busy house or sharing a workspace it will be worth your while investing in earphones or headphones with an in-built microphone. This will improve your audio quality, as well as reducing the amount of background noise coming from your feed.

DekkoLynx is our end-to-end encrypted video conferencing platform. Allowing you to effortlessly and securely communicate when working from home with a total security guarantee. For more information visit:

If you want to start a free trial visit:

Whilst end-to-end encryption is the safest way to secure your data as it travels between connected entities, it’s not the whole picture when it comes to truly secure business communication. If you want to ensure the absolute security of your conversations, data and intellectual property you need to understand end-to-end security and how security extends beyond encryption.

So what is End-To-End encryption?

End-To-End encryption (E2EE) is a form of encryption that uses complex algorithms to secure data as it travels between users to ensure no third-party can ever view your communicated content. E2EE uses these algorithms to place a ‘lock’ on your data and communications and only people you give access to the unique ‘key’ can unlock this data.

Each user has two sets of keys, a public key and a private key. Your public key is used by the sender to encrypt the data before it is sent to you, and your private key is used to decrypt it on arrival. As the data travels between users, no one can view or read it as they do not have the unique private key which unlocks the data (which is stored safely and never in the hands of someone without permission).

This means that no one, not even the server, network provider or encryption provider has the ability to view your end-to-end encrypted data as they do not have the unique key required to unlock that data.

What other types of encryption are used?

Whilst there are many other forms of encryption security none of them are as secure as end-to-end encryption. For example ‘encryption in-transit’ may encrypt data as it travels but it can be, or often will be, decrypted as it is routed through servers before being re-encrypted, exposing it to vulnerabilities. The other common form of encryption is ‘in-transit and at rest’ which does encrypt the data for the whole journey however parties such as the service provider, who may not be trusted, have access to the keys that unlock that data, again exposing vulnerabilities.

How does end-to-end encryption differ from end-to-end security

End-to-end encryption is just a piece in the puzzle of ensuring total security, it’s the right place to start but if other security practices are being ignored, your sensitive data is no longer completely secure. There is no utility in encrypting data, if someone else has the ability to login to your account or access the data with a simple URL.

That’s why DekkoSecure isn’t just an encryption company, we are a security company. As encryption is just one crucial step, but one step nonetheless in ensuring total security. Dekko presents a complete end-to-end security approach by mitigating the human and technological risks beyond just data encryption to help provide total security. These additional steps eliminate security gaps ensuring the confidentiality of data, communications and intellectual property whether that be in files, documents, chat, email or video conferencing. At Dekko we provide security beyond encryption through the following steps:

  • Authentication: Dekko takes additional steps beyond industry standard to authenticate that the user is indeed the intended recipient. Unlike other services where you may be able to access a document or video call simply by clicking a link, Dekko requires you to login and authenticate yourself. Digital signatures are also used to ensure your content cannot be tampered with.

  • Authorisation: Dekko actively checks for who has authorisation to sensitive data. In comparison many other platforms may still give you access to data using a link (which often contains the required encryption key), URL or password that could be maliciously intercepted. Dekko also ensures that authorisations that are revoked are done so cryptographically.

  • Integrity: Dekko verifies the integrity of its platform through a number of steps such as running its applications in the browser ensuring they are fully updated with no need for software updates and offering data sovereignty to improve traceability.

  • Verifiability: Rather than typical applications where organisers are responsible of inviting participants through URL or email, exposing them to the risk of phishing attacks, Dekko manages this in the application to improve verifiability.

  • Auditability: Audit logs provide crucial data on data, when it has been altered, who has accessed and when and using Dekko this is stored encrypted within the cloud to mitigate risk of tampering.

If you want more information on our end-to-end encrypted, video conferencing platform visit us at

We also offer a complete product suite of integrated, end-to-end encrypted collaboration tools including video conferencing, email, chat and document signing, to find out more about these visit us at

© DekkoSecure 2020. All rights reserved.