Secure Communication Today: A Look At Metadata, Shadow IT, NIS 2 And DORA | Teamwire App
Business Continuity

Secure communication today: a look at metadata, shadow IT, NIS 2 and DORA

Secure communication Teamwire

Content

Encryption protects content. But who protects everything else? Who communicates with whom, when and from where: this information is generated with every message. For emergency services, critical infrastructure operators and public authorities, it can pose a security risk. Added to this are shadow IT and stricter requirements under NIS 2 and DORA. Read this article to find out what a holistic approach to security means today.

True security only begins when all levels are protected  

Stolen login credentials. Compromised operational plans. Communication systems that fail at the critical moment. For many organisations, these are no longer abstract scenarios, but unfortunately, a reality. Particularly affected are security-critical sectors such as law enforcement and emergency services, critical infrastructure, public authorities and the healthcare sector.

In this context, secure communication is not an optional feature, but a prerequisite for effective action. But what does this really entail? Is end-to-end encryption sufficient – or is a fundamentally different approach required?

This article explains why comprehensive communication security requires far more than just encrypted messages and outlines the role of regulatory requirements such as ISO 27001, the GDPR, NIS 2 and DORA.

You’ll learn how a holistic approach to security can make your organisation more resilient, and which solutions make all the difference. So that your communications work when it really matters.

E2EE and secure communication: Why encryption alone is not enough 

End-to-end encryption (E2EE) is a term that often sounds like a magic shield in discussions about digital security. It suggests absolute confidentiality: 

Only the sender and the recipient can read a message; no one else – not even the service provider. 

This promise is undoubtedly appealing, especially at a time when data protection and privacy are becoming increasingly important. However, the reality is more complex, and placing one’s trust in E2EE as the sole panacea may prove to be misleading. Because:

End-to-end encryption protects the content of your communications. This is a fundamentally important step. However, digital communication involves more than just the content itself. Every message, every call and every interaction generates a wealth of accompanying information – known as metadata

And that’s exactly where the catch lies: 

Whilst the content is encrypted using end-to-end encryption, this metadata often remains unprotected and can paint a surprisingly detailed picture of your activities

Imagine you are sending a strictly confidential letter. E2EE ensures that the contents of the letter are enclosed in an impenetrable envelope. But the envelope itself still reveals a great deal: 

Who sent the letter to whom? When was it posted, and when did it arrive? How often do you send letters to this person? 

Far-reaching conclusions can be drawn from this seemingly innocuous information. In the digital realm, metadata is even more revealing. It includes: 

  • Who communicates with whom 
  • When and how often does communication take place? 
  • How long are the messages or calls? 
  • What group memberships are there
  • Who is part of which discussion groups?
  • What role does the person play in the group?
  • Location information: IP addresses or even GPS data are often collected, which can be used to determine a person’s location 
  • Device information: Which device is being used, and what is the operating system version (IP addresses) 

For attackers, this metadata is worth its weight in gold. It enables them to analyse communication patterns, reconstruct operational plans, or launch targeted attacks on vulnerabilities.

 

You might also be interested in these articles on the subject: 

Secure corporate communication: Why end-to-end encryption alone is not enough

End-to-end encryption: secure or deceptive?

 

Real-life examples: 

  • In the healthcare sector, metadata could indicate critical diagnoses
  • In government departments and the civil service, they could reveal political crises or security situations.
  • Public safety organisations could reveal operational patterns.
  • In critical infrastructure organisations, vulnerabilities could be identified and exploited for acts of sabotage

Metadata is not just a harmless by-product. It is a treasure trove of information which, if it falls into the wrong hands, can have serious consequences. 

Many consumer messaging apps with end-to-end encryption, such as WhatsApp or Signal, are owned by data-driven US corporations. Whilst the content itself is encrypted, metadata is systematically analysed and stored – usually on servers outside Europe. Data collection and analysis form the basis of their business model. The assurance that content is encrypted often distracts attention from this extensive data collection. 

Another problem is shadow IT

When employees use insecure consumer messaging apps, communication slips beyond IT managers’ control. Sensitive business information is often left unmonitored on personal devices and servers outside the EU, leading to data breaches and compliance violations.

Conclusion:

End-to-end encryption is important – but it is not a panacea. If you want to ensure truly secure communication, you must also protect metadata and actively prevent shadow IT.

Legal framework: The foundation of secure communication 

Secure communication is not just a technical challenge – it is also a clear regulatory requirement. For organisations in sensitive sectors such as law enforcement, critical infrastructure, public administration and healthcare, international and European regulations serve as key guidelines for trust, resilience and compliance, and are often legally binding.

An overview of the key regulations:

ISO: The gold standard for information security 

ISO 27001 is an internationally recognised standard for information security management systems (ISMS). It requires:

  • A structured approach to risk management
  • Clear processes for safeguarding sensitive data
  • Ongoing review and improvement of security measures

It therefore offers a systematic approach to managing sensitive corporate information and builds trust by implementing proven risk mitigation methods

Organisations that implement ISO 27001 are thereby actively demonstrating their commitment to security, including to partners, public authorities and regulatory bodies.

GDPR: Data protection as a fundamental right 

The EU’s General Data Protection Regulation (GDPR) sets out strict rules for the processing of personal data. For communication, this means:

  • Data processing exclusively on a legal basis
  • Hosting within the EU for maximum data sovereignty
  • Protection against unauthorised access through technical and organisational measures

A particular concern is that the use of US services may conflict with the GDPR, as access by third parties (see the US CLOUD Act) cannot be ruled out.

NIS 2 Directive: Strengthening cybersecurity in critical sectors 

The NIS 2 directive strengthens cyber resilience in the EU by extending its scope to cover a wider range of critical and important sectors:

  • Numerous sectors and companies are subject to regulation
  • Stricter requirements for prevention, reporting and response to security incidents
  • Requirement to use robust, fail-safe communication solutions

Anyone wishing to comply with NIS 2 must implement communication systems that can withstand crises whilst also complying with data protection regulations.

DORA (Digital Operational Resilience Act): Digital resilience in the financial sector 

The Digital Operational Resilience Act (DORA) is a specific EU regulation for the financial sector. It ensures that financial institutions and their IT service providers can withstand serious ICT disruptions. DORA sets out comprehensive requirements for ICT risk management and digital operational resilience:

  • Comprehensive ICT risk management
  • The ability to communicate even in the event of system failures
  • Documentation and reporting requirements in the event of a crisis

DORA makes it clear that communication is not a side issue but a cornerstone of operational resilience.

A holistic approach is essential

The standards mentioned above – ISO 27001, the GDPR, NIS 2 and DORA – mesh together like cogs in a wheel. Together, they form a safety net designed not only to protect organisations but also to empower them to achieve digital resilience.

However, this network is only effective if communication is not viewed in isolation, but is conceived and designed holistically. After all, secure communication is not an isolated issue. It permeates all processes, departments and systems. It determines whether your organisation remains capable of acting, compliant with the law and trustworthy in a complex and dynamic world.

Secure communication under high pressure: requirements of sensitive sectors 

Secure communication isn’t just a nice-to-have – it’s a must. But what ‘secure’ actually means depends very much on the context. Whilst a financial institution has to keep regulatory pressures in mind, every second counts for the fire service.

A look behind the scenes reveals that every industry has its own unique requirements. Yet they all share a common goal: reliable, fail-safe and legally compliant communication.

Public safety authorities and organisations: When every second counts 

For public safety agencies and organisations such as the police, fire service, ambulance services and civil protection, communication is, quite literally, a matter of life and death. 

In emergencies and crisis situations, information must flow quickly, accurately and with absolute reliability. In such circumstances, the demands placed on secure communication are particularly high: 

  • Reliability: Communication systems must continue to function even under extreme conditions – such as power cuts, network overloads or cyberattacks. Redundancy and contingency measures are essential. 
  • Fast, accurate information sharing: Emergency services need up-to-date, real-time information to make informed decisions. 
  • Protection of sensitive operational data: Information regarding operational locations, personnel involved, tactical procedures or victim data is highly sensitive and must be protected against unauthorised access. This requires not only encryption, but also strict control over metadata and the location where the data is stored. 
  • Interoperability: Public safety organisations often need to collaborate across departmental and national boundaries. Communication solutions must enable seamless communication between different units and organisations. 
  • Legal certainty and auditability: All communication processes must be documented in an audit-proof manner and, where necessary, be traceable to meet legal requirements and withstand internal audits. 

„It quickly became clear that a supporting communications solution was needed for an optimized operational communication. On the one hand, this had to be GDPR compliant, meet our high police security standards and fulfill our compliance regulations. On the other hand, it had to be highly functional and easy to use.“ – Alexander Stöbrich, IuK-Coordination Office of the Bavarian Police

Critical infrastructure: Protecting the backbone of our society

Critical infrastructure encompasses sectors such as energy supply, water supply, food, finance and insurance, healthcare, information technology and telecommunications, and transport and traffic. 

Any failure or disruption to these infrastructures would have serious consequences for society. Communication systems in critical infrastructure organisations must therefore be extremely robust and secure

  • Stability and availability: Continuous operational capability is paramount. Communication solutions must continue to function even in the event of IT infrastructure failures or cyberattacks to ensure the coordination of countermeasures.
  • Protection against cyberattacks: Operators of critical infrastructure are prime targets for cybercriminals and state-sponsored actors. Communication systems must therefore meet the highest security standards to prevent unauthorised access to networks and the theft of sensitive data. 
  • Emergency and crisis communication: In the event of a disruption or attack, internal and external communication (e.g., with authorities, partners, and the public) must be maintained. Alert systems and the ability to rapidly establish crisis management teams are essential. 
  • Compliance with NIS 2 and DORA: As mentioned earlier, operators of critical infrastructure are subject to strict regulatory requirements that mandate a high level of digital resilience and comprehensive security measures. 
  • Secure remote maintenance and control: Many critical infrastructure systems are monitored and controlled remotely. Communication between control centres and decentralised units must be absolutely secure in order to prevent tampering. 

“With Teamwire, we have a communication solution that supports us in our day-to-day internal communication but also in exceptional situations such as a system failure.” – Sebastian Adams, Corporate Communications MD Bremen

Public authorities and administration: Efficiency and data protection in the public sector 

For public authorities and the public sector, secure communication involves striking a balance between efficiency, transparency and the protection of sensitive personal data. They must not only operate smoothly internally, but also be able to communicate securely with members of the public and other public authorities: 

  • Data protection and GDPR compliance: Processing citizens’ personal data requires the utmost care and strict compliance with the GDPR. Communication solutions must ensure that data is processed and stored exclusively within the EU and is protected against unauthorised access. 
  • Preventing shadow IT: To prevent the uncontrolled outflow of data, official communication channels must be user-friendly and functional, so that employees do not resort to using insecure consumer messaging apps. 
  • Efficiency and collaboration: Public sector organisations often have complex, hierarchical structures. Secure communication solutions must promote internal collaboration, streamline processes, and simplify communication across departments and levels.
  • Citizen communication: The ability to communicate with citizens securely and in compliance with data protection regulations (e.g. for enquiries, booking appointments, exchanging documents) is becoming increasingly important. 
  • Legal certainty and archiving: It must be possible to archive communication content in an audit-proof manner in order to comply with statutory retention requirements and ensure the traceability of decisions. 

“Teamwire enables us to communicate quickly, securely, and flexibly – both in everyday life and during extraordinary events such as bomb disposal or major events. We are particularly impressed by the intuitive operation, which colleagues can use in pressurised situations.” – Ben Viethen, Head of Digitalisation City of Kleve

Healthcare: Trust, confidentiality and saving lives 

The healthcare sector – from hospitals and doctors’ surgeries to care homes – is an area where confidentiality and fast, secure communication can have a direct impact on patients’ well-being. These specific requirements stem from the sensitive nature of patient data and the urgency of medical situations: 

  • Patient data protection: Health data is among the most sensitive types of information. Communication regarding diagnoses, treatments and personal health conditions must be kept strictly confidential and comply with the most stringent data protection requirements (e.g. the GDPR, as well as specific national health data protection laws). 
  • Fast and secure communication in emergencies: In critical situations, doctors, nursing staff, and emergency services must be able to communicate with one another immediately and securely to coordinate life-saving measures. Delays or communication failures can have fatal consequences. 
  • Interdisciplinary collaboration: Treating patients often requires coordination among departments and with external specialists. A secure platform that facilitates information exchange and treatment plan coordination is essential. 
  • Integration with existing systems: Communication solutions must integrate seamlessly with hospital information systems (HIS), electronic patient records (EPR) and other medical IT systems. 
  • Mobile use: Doctors and nursing staff are often on the move. Secure mobile communication solutions on smartphones and tablets are therefore of great importance. 

Although the specific challenges vary, these target groups are united by the overarching need for a communication solution that meets the highest security standards and legal requirements, whilst also boosting efficiency and productivity in day-to-day work. 

The aim is to create an environment in which trust underpins every interaction and sensitive information is protected at all times.

“Simple and secure communication via Teamwire has greatly improved our business communication. The WhatsApp problem is history, and we communicate quickly and securely – exactly what we need in the healthcare sector.” – Alexander Miltz, Head of IT-Services Andernach Regional Hospital

Teamwire: Secure communication without compromise 

Given the complex requirements for secure communication, Teamwire, as a specialist business messenger, offers a comprehensive solution

This specialist messaging solution has been developed to meet the highest security standards and address the specific needs of organisations operating in highly sensitive and regulated sectors such as the financial sector, critical infrastructure, law enforcement, public authorities and the healthcare sector:

  • A comprehensive security approach: In addition to end-to-end encryption, Teamwire also protects metadata 100%. The zero-trust approach ensures that every interaction is authenticated and authorised.
  • Comprehensive compliance: Teamwire is GDPR-compliant, ISO 27001- and BSI C5-certified, and meets the requirements of NIS 2 and DORA. 
  • Fail-safe emergency features: For critical situations, Teamwire offers special features such as alerting, live location sharing, push-to-talk, broadcasts, and augmented reality to ensure communication remains possible even in the event of system failures. 
  • Centralised management and control: To prevent shadow IT and ensure compliance, Teamwire offers comprehensive administration features, including MDM integration, centralised user management, audit-proof archiving and granular policies. 
  • Adaptability and scalability: Teamwire is flexible and scales with the needs of any organisation, without compromising on security. 

Teamwire is therefore a strategic partner for organisations seeking to thrive in a complex digital world, providing the necessary security, compliance and efficiency. 

The future of secure communication: trust requires strategy

Secure communication is about much more than just encryption. It is the result of a carefully considered combination of technology, regulatory expertise and organisational responsibility.

For organisations operating in sensitive and critical sectors – whether law enforcement, critical infrastructure, public authorities or the healthcare sector – a comprehensive communications security strategy is now more crucial than ever. It protects not only data, but also trust, operational capability and long-term resilience.

Teamwire provides the technological foundation for this: a secure, GDPR-compliant communication platform that works in every situation – from day-to-day operations to exceptional circumstances. 

This enables companies to take a holistic approach to information security and implement it effectively. After all, the future of secure communication is not a static state; it is an ongoing process. And those who tackle it strategically at an early stage lay a solid foundation for whatever lies ahead.

Are you curious to learn how Teamwire works and how it can facilitate secure collaboration within your organisation?

Then try our collaboration tool for 14 days free of charge and with no obligation. Or let us show you how Teamwire works in a personalised demo.

Frequently asked questions (FAQs)

Secure communication refers to the exchange of information in which the confidentiality, integrity and availability of data are guaranteed at all times. It encompasses technical measures such as comprehensive, modern (end-to-end) encryption and the protection of metadata, as well as organisational precautions – such as avoiding shadow IT and complying with legal requirements such as the GDPR, ISO 27001, NIS 2 and DORA. For organisations in sensitive sectors such as law enforcement, critical infrastructure, public authorities and the healthcare sector, secure communication also means resilience: systems must function reliably even in crisis situations. True communication security is therefore not a single feature but the result of a holistic approach that combines technology, compliance and organisational responsibility.

End-to-end encryption (E2EE) protects the content of your messages. Comprehensive communication security goes further: it also protects metadata, prevents shadow IT, ensures compliance with legal regulations (such as GDPR, NIS 2, DORA) and offers features for emergency communication and centralised management. E2EE is an important building block, but not the sole solution for true security. 

Metadata is data about your communications (who, when, how often, where, and with whom). It can be used to create detailed profiles of communication patterns and may be valuable to attackers for identifying vulnerabilities or planning attacks. 

Shadow IT refers to the use of unauthorised IT systems by employees. These often include consumer messaging apps such as WhatsApp or Telegram, as well as platforms like Dropbox. This poses risks of data breaches and compliance violations. Shadow IT can be prevented by organisations providing secure, user-friendly and feature-rich communication solutions. 

Companies must comply with standards such as ISO 27001, the GDPR, the NIS 2 Directive and the DORA Directive. These require comprehensive measures to protect data and systems and to ensure digital resilience. 

Teamwire is GDPR-compliant thanks to its hosting in Germany and comprehensive data protection measures. For NIS 2 and DORA, Teamwire offers features for ICT risk management, secure emergency communication and reporting obligations to meet the strict requirements of these regulations. 

Yes, Teamwire is ISO 27001-certified. This confirms that it has a robust information security management system in place that complies with international standards. 

Teamwire is specifically designed for organisations operating in highly sensitive and regulated sectors, including law enforcement, critical infrastructure, public authorities and government bodies, as well as the healthcare sector. 

Yes, Teamwire integrates seamlessly with existing IT infrastructure, with interfaces for centralised user management systems (e.g., Active Directory) and mobile device management (MDM) systems. 

Teamwire offers a wide range of specialised emergency features designed specifically for crisis communication, IT outages, operations and other critical situations. The aim is to ensure that organisations remain operational at all times – even when other systems fail. Teamwire’s key emergency features:

 

  • Alarm function
  • Broadcast
  • Live location tracking & augmented reality
  • Push-to-Talk (PTT)
  • Group chat
  • Video calls & conferences
  • Status updates & polls
  • Map integration (ArcGIS) 

Don't miss these