The lastest in connecting and collaborating securely at work. From our leading minds in cybersecurity.

65% of businesses only consider cybersecurity after it’s already too late, reveals the EY 2020 Global Information Security Survey. If you’re a business owner, CISO, or employee how do you make sure your business doesn’t fall into that category? The answer is to put security at the core of your systems, technology and products by adopting security by design principles.

What is secure by design?

Secure by design, or security by design, is an approach to product, system or technology development where security is built as the core product. The secure by design process incorporates security from the inception and continues to make it the top priority as the product or system is being built. It is a proactive, preventative process, minimising security flaws at all times rather than retroactively responding to security threats after they’ve developed.

Why use a secure by design process?

The fast-paced nature of the modern economy means firms and technologies must constantly evolve and change to stay competitive however if security by design principles aren’t built into this mindset it will inevitably lead to vulnerabilities. As these technologies, necessary to stay relevant, become more complex it becomes increasingly difficult to add security retroactively.

The solution to this issue is adopting a security by design approach to the adoption and development of products and systems. When security is at the core of a technology, new features should be built out with security at the ground level of feature development, minimising the risk of security compromises being exposed as the feature set gets built up.

Historically there has been an inclination by firms to build security tools around existing products, using checklists to ensure compliance. However the reality of this approach is, covering for a security weakness is never as secure as eliminating that weakness in the system. This approach has also contributed to the mindset of CISOs as impediments to innovation and change. When CISOs and security teams are constantly ensuring compliance by checking systems and making fixes they will inevitably slow innovation however this can be subverted by allowing CISOs and security teams to adopt technologies with security at their core. This will lessen the workload on security teams in system maintenance and allow them to be free to approach more innovative security solutions that provide the ability for a firm to stay nimble and agile whilst maintaining security.

How DekkoSecure implements security by design.

DekkoSecure was built with a security by design mindset right from the outset. Founded by leading technologists and privacy advocates, the business began making security products and expanding its feature range over time. As the product suite developed, security and our world's first end-to-end encryption technology were always built into the core of our expanding feature set.

The Dekko Team

All Dekko products are built around end-to-end encryption, providing world-leading encryption technology to all our communications tools. However Dekko isn’t just an encryption company, we are primarily a security company (and encryption is just one key step in that security process). We also provide additional security features such as data sovereignty, authorisation, authentication and auditability. Furthering this, for a product to be truly secure by design, it cannot simply address technological risks it also has to address the ever-present human risks of the people who use their systems. DekkoSecure reduces human risk through security features such as no misaddressing and running through the browser to ensure there is no risk of missing a software update and exposing a vulnerability.

Another key component to security by design is a commitment to continual testing of systems to identify potential vulnerabilities. DekkoSecure performs this through regular, independent testing by Enex TestLab who verify the legitimacy of our security claims.

DekkoSecure offers a complete product suite of communication and collaboration tools, all built within a security by design framework. To get more information on our products or start a free trial, visit:

With more and more of your personal and businesses digital footprint being stored in the cloud, have you ever thought about the implications of where your data is being hosted?

What is Data Sovereignty?

Data sovereignty is the idea that data remains in the country of its origin, stored within its own borders and subject to the laws and regulations of that country alone.

One may think that if you’re sending data (such as a message or document) to another person located in the same country, that data would stay in the same country. However in reality, data is often routed and stored in many countries before and after arriving its destination. This means that your data is subject to the local laws and regulations in any country which your data is routed or stored.

The Laws and Regulations of Data Sovereignty

Most countries claim the right to any data that passes through or is stored on their servers however the legal precedent surrounding this notion is often untested and shaky.

The US Patriots Act of 2001 states that in the event of a high-security threat that the U.S. government can access any data stored within the country, without notification of the data owner. Meaning Australian’s with data stored within America are potentially subject to their data being seized without notice. In many European countries as well as Canada, governments are bringing in strict regulation to guarantee that data remains within the country to protect the security of their citizens.

In Australia numerous government departments are already compelled to host data within Australian data centres, such as the government's COVIDsafe app that utilises Amazon’s webs services to ensure data sovereignty.

Why It Matters

Before the insurgence and popularity of cloud storage, data sovereignty was a relatively unheard of phrase but as individuals, enterprise and government began shifting data to the cloud it has become increasingly relevant.

Having your data stored on foreign soil means that data is open to seizure by foreign governments and individuals through subpoena, legal proceedings or malicious intent. This means those who store data, communications or intellectual property must accept the fact that they are increasing the likelihood of this data no longer remaining confidential. If such data was to be breached it could have potentially catastrophic effects for many businesses such as a loss of reputation and client confidentiality.

How Can I Achieve Data Sovereignty?

In order to achieve data sovereignty, your data must remain and be stored within the country of its origin. For example if you are in Australia and sending a file to another colleague in Australia, the data must be stored in Australian data hosting centres rather than potentially cheaper options in America or Asia.

If you are not actively pursuing data sovereignty then there is a high likelihood that at least part, if not the majority of your digital footprint is hosted in international data hosting centres. At Dekko we give users the option of where they can store their data to ensure they can keep sovereignty over their data. This is available for all Dekko services such as video-conferencing, file sharing, chat and document signing.

If you would like to read more about our data sovereignty capabilities then read our security page:

If you would like to try one of our completely secure communications and collaboration solutions then visit:

Since the advent of COVID-19 people around the world have shifted from workplaces into home office environments. With this has come a massive uptick in video conferencing to allow people to communicate and collaborate with their colleagues and clients. However one issue many have grappled with is how do I make my home office look professional over a video call?

Whether you're in a share-house or a penthouse there are some simple steps that you can take to up your professionalism and put your best foot forward when working from home.


Proper lighting is perhaps the most crucial element to make yourself look professional when video conferencing from home. Correct lighting ensures you can be seen clearly and will also improve the quality of your video feed to other meeting participants. If you want your input into a meeting to carry weight, make sure it’s not coming from a low visibility, low quality video feed.

So what’s the best way to improve the lighting in your home office environment?

  • Open the window shades and let some natural light into the room if possible. As long as the window is not facing directly into your webcam, this will provide natural, even lighting.

  • DON'T put a light source such as a lamp behind your webcam and body, this will create a silhouette around your body and make your face dark.

  • DO put a light source in front of your webcam and body so that it is illuminating your face. This doesn’t have to be a spotlight, just a simple lamp a couple metres away will do the trick.

Think about your background

When you don’t have the ability to meet in person, your home office environment is going to provide subconscious cues to other meeting participants when video conferencing. A messy desk with a pile of dirty washing behind you might send the wrong message about your organisational skills to a potential client.

This doesn’t mean you have to go out and buy a full collection of Encyclopedia Britannica to place neatly behind your desk but it does mean you might want to avoid clutter. Consider which way you are angling your webcam to have a clean work environment behind you and push that hamper of dirty laundry out of frame. Consider adding something uncomplicated to your background, perhaps a simple piece of artwork or a pot plant to provide some character.

Manage distractions

Whether it's kids, roommates, or a partner, you don’t want someone interrupting your meeting, it can be distracting for you but also anyone else in the meeting. The best way to avoid this is to find a private place to set up your home office, this could be your bedroom, an office, or any quiet room. Avoid having doors and hallways in your background if possible as these increase the likelihood of an unexpected visitor being visible.

However, if this is not possible consider investing in earphones or headphones with a high-quality inbuilt microphone. Not only will this greatly improve the quality of your audio feed to others in the meeting but it will also reduce background noise by moving the microphone closer to your voice.

Upgrade your audio

Your audio quality is just as important as your video quality if you want your opinion to be heard and listened to. Your computer's inbuilt microphone will likely be fine in a quiet room however if you are video conferencing from a busy house or sharing a workspace it will be worth your while investing in earphones or headphones with an in-built microphone. This will improve your audio quality, as well as reducing the amount of background noise coming from your feed.

DekkoLynx is our end-to-end encrypted video conferencing platform. Allowing you to effortlessly and securely communicate when working from home with a total security guarantee. For more information visit:

If you want to start a free trial visit:

© DekkoSecure 2020. All rights reserved.