
Security Intelligence
Secure Communications for Executives | CloseProtectionHire
What encrypted messaging, email, and device security actually means in practice. A security consultant's guide to the tools and protocols that protect executive communications from interception.
Written by James Whitfield, Senior Security Consultant
Executives communicate about sensitive matters constantly: commercial negotiations, board decisions, security arrangements, legal matters, and personal information that carries real risk if intercepted. Standard corporate email and messaging platforms encrypt communications in transit but leave them readable by the platform provider and subject to legal requests. In some operating environments – China, Russia, Gulf states with broad cybercrime laws – even in-transit encryption does not prevent state-level access.
This guide covers the practical tools and protocols for secure executive communications: what the encryption categories actually mean, which platforms provide what level of protection, and the operational discipline that makes communications security functional rather than theoretical.
What “encrypted” actually means
Encryption terms are used loosely in marketing and media, but the operational distinction that matters for executive security is:
In-transit encryption (TLS/HTTPS): Communications are encrypted while moving across networks. This prevents interception at the network level – a hostile actor on the same Wi-Fi network cannot read the messages as they travel. However, the service provider (email host, messaging platform, cloud storage) holds the decryption keys and can read the content. Standard corporate email, Microsoft Teams, Zoom (standard), Slack, and most business communication platforms use in-transit encryption.
End-to-end encryption (E2EE): Communications are encrypted such that only the sending and receiving devices can decrypt them. The service provider does not hold the decryption keys and cannot read the content. Signal, WhatsApp (messages), ProtonMail (ProtonMail to ProtonMail), iMessage (Apple to Apple), and some enterprise collaboration platforms with E2EE settings use this model.
Zero-knowledge encryption: An extension of E2EE in which the service provider cannot access any of the user’s data, including account metadata. ProtonMail and some secure storage services (Tresorit) operate on this model.
For executives, the practical significance is: in-transit encryption protects against network interception. E2EE protects against platform-level access (law enforcement requests to the provider, provider compromise, state-mandated access). For communications involving commercially sensitive material, legal matters, or security arrangements, E2EE is the appropriate standard.
Secure messaging platforms
Signal is the platform most widely recommended by the security community for sensitive communications. It uses the Signal Protocol (open-source, independently audited), stores minimal metadata, and has been subjected to multiple law enforcement demands that it was unable to fulfil due to its data minimisation architecture. Signal stores only the date of account creation and the date of last connection – not message content, contact lists, group memberships, or message timing.
Practical deployment: Signal works on iOS and Android. Disappearing messages should be enabled for the most sensitive communications channels – once messages expire, they are gone from both devices regardless of server-side retention. A dedicated SIM or a number registered to a non-personal identity is used by some executives to further reduce the metadata footprint.
WhatsApp uses the same Signal Protocol for message encryption and is functionally equivalent for message content security. The distinction is metadata: Meta collects who you communicate with, when, for how long, and from what location. For executives whose threat model includes sophisticated commercial intelligence operations or state-level adversaries interested in relationship mapping, Signal’s metadata minimisation is meaningful. For most corporate users whose primary concern is network-level interception, WhatsApp is functionally adequate.
iMessage uses E2EE within the Apple ecosystem (blue bubbles). When sending to Android (green bubbles), messages revert to SMS – no encryption. For executive teams that are entirely on Apple devices, iMessage provides E2EE. For mixed device environments, a platform-independent E2EE solution (Signal) is more reliable.
Secure email
Standard corporate email – Outlook via Exchange/Microsoft 365, Gmail via Google Workspace – is encrypted in transit but accessible to the provider and subject to legal requests in the provider’s jurisdiction. For most routine corporate communications, this is an acceptable security posture. For legally sensitive, commercially sensitive, or security-related communications, E2EE email provides a higher standard.
ProtonMail (headquartered in Switzerland, subject to Swiss law) provides E2EE for messages sent between ProtonMail accounts. Messages sent to non-ProtonMail accounts are encrypted in transit only. ProtonMail has been subject to law enforcement requests but can provide only limited metadata due to its zero-knowledge architecture. Switzerland’s data protection framework is more protective than US or UK frameworks for most purposes.
Tutanota (Germany) operates similarly to ProtonMail. The German legal framework applies. For executives operating in EU contexts, Tutanota’s German jurisdiction may be preferable.
The limitation of secure email is that it only provides E2EE end-to-end if both parties use compatible systems. An executive sending ProtonMail to a counterparty using Outlook receives in-transit encryption from the Outlook side only. For sensitive external communications where the counterparty cannot be moved to a compatible platform, Signal for the sensitive content and secure email for non-sensitive administrative exchange is a practical split.
Voice communications
Standard phone calls (carrier network or standard VoIP) are not E2EE. In many jurisdictions, they are legally accessible to authorities with appropriate orders. In China, Russia, Iran, and several other states, they should be assumed accessible to the state without judicial oversight.
Signal voice and video calls use E2EE and provide the same level of protection as Signal messaging. For sensitive voice conversations in high-risk operating environments, Signal calls are the appropriate tool.
Encrypted satellite phones (certain Iridium and Thuraya configurations) provide communications in areas with no mobile coverage but typically use in-transit rather than E2EE encryption.
Hardware security
Communications security rests on the security of the endpoint device. Hardware controls that support executive communications security:
Screen privacy filters prevent shoulder-surfing in public environments – trains, airports, hotel lobbies – where the executive is working on sensitive material. Physical-layer threat that is easily addressed.
Hardware security keys (YubiKey, Titan Security Key) provide hardware second-factor authentication for email and cloud service accounts. Phishing attacks against executive accounts frequently target the authentication credential. Hardware 2FA cannot be phished remotely – the attacker requires physical possession of the key.
Device management. Corporate devices should be managed under a Mobile Device Management (MDM) platform that enables remote wipe if the device is lost or stolen. An unlocked corporate device that is lost in a high-risk environment is a communications security incident regardless of the encryption on individual apps.
Tiered communications model
Rather than requiring all communications to use the highest-security available platform, a tiered approach is more operationally practical:
Tier 1 (standard corporate tools): Routine administrative communications, meeting scheduling, non-sensitive operational coordination. Standard corporate email and messaging.
Tier 2 (in-transit encryption minimum): Commercially sensitive but not exceptional communications, team coordination on ongoing projects. Corporate collaboration platform with in-transit encryption minimum.
Tier 3 (E2EE required): Legal matters, security arrangements, active commercial negotiations, sensitive financial information. Signal for messaging, ProtonMail for document exchange where both parties are on compatible platforms.
Tier 4 (maximum security): Active security incidents, K&R situations, crisis management communications, information that would be commercially or personally dangerous if intercepted. Signal with disappearing messages on designated device. Pre-established out-of-band communication method if primary channels are compromised.
For the broader digital security framework that this communications model sits within, see our executive digital security guide for international travel. For the technical surveillance countermeasures that address physical interception of communications in the executive’s office or residence, see our TSCM guide.
Sources
NCSC: End-to-End Encryption: What It Is and Why It Matters, National Cyber Security Centre, 2024. Signal: Technical Documentation and Security Audit Records, 2023. EFF: Surveillance Self-Defence – Communications Security, Electronic Frontier Foundation, 2024. CISA: Mobile Device Security Best Practices, Cybersecurity and Infrastructure Security Agency, 2024. ProtonMail: Security Model and Transparency Reports, Proton Technologies AG, 2024. GCHQ/NCSC: Guidance on Encrypted Communications for Businesses, 2024. Amnesty International: Security Lab – Communications Security Review 2024. Apple: Platform Security Guide 2024.
Key takeaways
Endpoint security determines the ceiling of communications security
The strongest encryption protocol is defeated by a compromised device. An executive who uses Signal on a phone with an unpatched operating system, or who has installed software from unverified sources, or whose phone has been physically accessed by a hostile actor, has no communications security regardless of the app used. Device security -- regular OS updates, no sideloaded apps, screen lock with strong PIN/biometric, MDM management on corporate devices -- is the foundation that communications security is built on.
Metadata is as sensitive as content for some threat models
The fact that an executive communicated with a specific person at a specific time and location may be as sensitive as what was said, depending on the context. Standard email, WhatsApp, and SMS create extensive metadata records. Signal minimises metadata retention. For executives involved in M&A activity, regulatory matters, journalist sources, or commercial negotiations where the counterparty relationship is itself sensitive, metadata discipline matters as much as message content encryption.
Different threat levels require different tools -- not one platform for all communications
A tiered communications approach is more practical than requiring all executive communications to use the most secure available platform. Routine scheduling and administrative communications can use standard corporate email. Commercially sensitive negotiations use a corporate secure messaging platform or Signal. The most sensitive communications -- security arrangements, active legal matters, K&R or crisis management -- use Signal with disappearing messages enabled and devices that are managed under the clean device protocol.
Encrypted email only works end-to-end if both parties are on an E2EE platform
An executive who sends a ProtonMail message to a Gmail address receives in-transit encryption from the Gmail side but not full E2EE -- the message is accessible to Google at the receiving end. E2EE email requires both parties to use compatible systems. For sensitive external communications, agreeing in advance on a shared secure channel (Signal for message, ProtonMail to ProtonMail for document exchange) is more reliable than assuming the counterparty's email provider respects the same privacy standards.
Physical security of the device is the last line of communications security
Communications security assumes the device is under the executive's physical control. An unattended phone in a hotel room in a high-risk environment, a device left with a border official for inspection, or a device that has been through hands other than the executive's should be treated as potentially compromised. The clean device protocol addresses this for high-risk travel markets, but device custody discipline is relevant in any environment where the executive's commercial interests make them a worthwhile target.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
