Market Daily

Attention to Trust: HumanX Addresses Mistrust in Corporate Australia

By: Maria Williams

Employers in Australia are facing a crisis of trust. According to market research company Roy Morgan, 66% of Australians today distrust any organization or sector, while under 41% can identify any organization or secretary they trust. This difference represents a net decline of 8% from a year ago. As corporations adapt to technological changes, many employees feel disconnected. Some aggravating factors include skepticism over the introduction of AI, increased workplace monitoring, remote and hybrid work models that blur work-life balance, and shifting societal attitudes toward corporate culture.

The trust crisis may have long-lasting detrimental effects on employees and employers, including dissatisfaction in the workplace and decreased productivity. Sydney-based HR consultancy HumanX has identified some underlying causes of loss of trust in the workplace. With expertise and experience in cultivating a strong workplace culture, HumanX is working to bring mutual trust and respect into the office, helping organizations create an experience that feels more human.

Hich Nasr, Partner at HumanX, has warned about the dangers of not addressing this issue. “Employees might not even quit given the current cost of living pressures. Instead, they might stay but only work half-heartedly,” Nasr states. “Not only is the employee left feeling disengaged, but that disengagement may cost the organization around 20% of the employee’s salary. Low trust levels may add up to major problems.” Identifying the causes of these trust issues is the first step to addressing them, and one factor may include the growing pains of adopting new technologies.

Many organizations have integrated new technologies into their operations to stay competitive and efficient. Artificial intelligence has already become a component of many Australians’ work. According to cloud-based software company Salesforce, 53% of Australian professionals actively use or experiment with generative AI in their work. However, while premier management and team leads have embraced AI, only 34% of workers without management responsibilities have expressed enthusiasm. This points to a growing trust gap concerning how AI is integrated between employees and management. Training may be another aggravating factor, as Salesforce reports that 81% of office workers express concern about the lack of relevant AI training.

Another technology that may create trust concerns is the rising prevalence of workplace monitoring. While these tools may aid managers in tracking the performances of their team members, they may create stress without addressing the underlying causes of production issues. As reported by the publisher SmartCompany, 64% of Australians claim their stress has risen because of more aggressive performance goals and targets. Comparatively, 47% of respondents from the same survey said more empathetic leaders would improve their job satisfaction.

As technologies like AI and workplace monitoring are implemented, open discussions and training may allow these tools to be utilized more effectively while easing the stress and concerns that can spark distrust. “Employees are more likely to trust their employers when the purpose behind workplace monitoring is clearly explained,” Nasr states. “Providing relevant training, especially around new tools like AI, empowers employees and fosters trust. Keeping people central to the process is at the heart of any successful transformation.”

In addition to other technological shifts, more jobs have taken on hybrid or remote work schedules. While these models benefit employees, such as additional flexibility, concerns over blurred lines between work and personal time have risen. According to a 2024 annual report by the Australian Government Productivity Bulletin, labor activity fell across 2022–2023 because output growth failed to keep pace with a record increase in hours worked. As more employees feel pressured to pack in work hours at home, increased burnout contributes to lower productivity and trust in employers.

The 2024 Australian Government Productivity Bulletin also decouples wages and productivity. With rising income inequality, more Australians distrust the corporations that employ them. All of these factors, including introducing new technologies, the pressure of performance monitoring, and burnout, create a workplace of mistrust that can harm employers and employees. HumanX highlights these growing issues and strives to help businesses correct them.

“High workplace trust may lead to increased productivity, collaboration, and creativity, ultimately driving better outcomes for the business,” Nasr explains. With a blend of strategic and tactical HR solutions, HumanX’s mission is to make the workplace work for everyone. 

Published by Elle G

How Encryption Tools Work in Mobile Devices

In today’s digital world, protecting personal data has become a critical concern, especially as mobile devices are used for everything from banking and shopping to communication and work. Mobile devices store and transmit sensitive information, making them prime targets for hackers and unauthorized access. Encryption tools play a vital role in safeguarding data on mobile devices, ensuring that personal, financial, and business information remains secure. In this article, we explore how encryption tools work in mobile devices and why they are essential for security.

What Is Encryption and Why Is It Important for Mobile Devices?

Encryption is the process of transforming data into a secure format that cannot be easily understood by unauthorized parties. The purpose of encryption is to protect sensitive data from being accessed by malicious actors, even if the device is lost, stolen, or hacked.

In mobile devices, encryption ensures that all data—whether stored locally or transmitted over the internet—remains private and secure. Mobile devices are particularly vulnerable to attacks because they are often used to store sensitive information, such as passwords, personal identification numbers (PINs), credit card details, and emails. Without proper encryption, this data could be easily exposed to unauthorized access.

Encryption also protects the integrity of communications, such as messages, emails, and data exchanged between apps. Without encryption, mobile users risk exposing their private conversations to cybercriminals, government surveillance, and other threats. This makes encryption an essential part of maintaining privacy and security in mobile devices.

Types of Data Encryption

There are two primary types of encryption used in mobile devices: data-at-rest encryption and data-in-transit encryption.

Data-at-Rest Encryption

Data-at-rest encryption refers to the protection of data that is stored on the device, whether it is in the form of files, apps, or system data. This type of encryption ensures that if the device is lost, stolen, or accessed by an unauthorized person, the data is unreadable without the proper decryption key.

Both iOS and Android devices use built-in full disk encryption or file-based encryption to secure data-at-rest. For example, Apple’s iPhones use a hardware-based encryption approach that encrypts the entire device storage, ensuring that all data, including apps, settings, and system files, is protected by default.

Data-in-Transit Encryption

Data-in-transit encryption protects the data as it is being transmitted over networks, such as when sending a message or accessing a website. This type of encryption ensures that even if data is intercepted while traveling between devices or over Wi-Fi networks, it remains unreadable and secure.

For example, HTTPS (HyperText Transfer Protocol Secure) is used for encrypting web traffic to prevent third parties from intercepting and reading data between your device and a website. Similarly, messaging apps like WhatsApp and Signal use end-to-end encryption, ensuring that messages can only be read by the sender and receiver, not by anyone else, including the service provider.

How Does Encryption Work on Mobile Devices?

Encryption on mobile devices typically involves two core components: encryption algorithms and key management. These elements ensure that data is both securely encrypted and properly decrypted when needed.

Encryption Algorithms

The process of encrypting and decrypting data involves the use of complex algorithms that transform the data into a secure format. Two of the most common encryption algorithms used in mobile devices are symmetric encryption and asymmetric encryption.

  • Symmetric Encryption: In symmetric encryption, the same key is used to both encrypt and decrypt the data. This method is efficient because it uses a single key for the entire process. One of the most widely used symmetric encryption algorithms is AES (Advanced Encryption Standard), which is used to encrypt data-at-rest on mobile devices. AES is considered highly secure and is implemented in both Android and iOS devices.
  • Asymmetric Encryption: Asymmetric encryption uses two keys: a public key for encryption and a private key for decryption. This method is often used for securing communication and data-in-transit. Algorithms such as RSA and ECC (Elliptic Curve Cryptography) are used in mobile devices to secure internet traffic, emails, and messaging.

Key Management

Key management refers to the process of securely storing and exchanging encryption keys. Proper key management is essential to ensuring the security of encrypted data, as the encryption keys themselves must remain protected.

  • Key Storage: Both Android and iOS devices have secure storage areas for encryption keys. For example, iOS uses the Keychain service to store encryption keys and other sensitive information. Android devices utilize the Keystore system, which is a hardware-backed storage location for keys, making it more resistant to tampering.
  • Key Exchange Protocols: In many encryption scenarios, such as secure messaging or web browsing, encryption keys must be exchanged between devices. Protocols like Diffie-Hellman are used to securely exchange keys over an insecure network, ensuring that only the communicating parties can derive the same key to encrypt and decrypt messages.

Mobile Encryption Technologies

Mobile devices employ several encryption technologies to ensure that data is protected in different contexts.

Full Disk Encryption (FDE)

Full disk encryption (FDE) is the most common form of data-at-rest encryption in mobile devices. FDE encrypts the entire storage of the device, including operating system files, apps, and user data. On iOS devices, FDE is enabled by default, providing robust security without requiring users to take any additional steps. Similarly, Android devices with versions newer than 5.0 (Lollipop) use FDE as the default encryption method.

The key advantage of FDE is that it ensures that all data is encrypted, making it inaccessible without the correct authentication (e.g., a PIN, password, or biometric identification). However, if the encryption key is compromised, the entire device’s data could be exposed.

File-Based Encryption (FBE)

File-based encryption (FBE) is a more granular approach to securing data compared to FDE. With FBE, each file on the device is encrypted separately, and the encryption keys for each file can be stored independently. This allows for more flexibility and efficiency, as it enables specific files to be decrypted without decrypting the entire disk.

Android 7.0 (Nougat) and later versions implement FBE by default, allowing for better performance and greater control over how data is encrypted and decrypted.

Benefits of Encryption on Mobile Devices

  • Privacy Protection: Encryption ensures that personal and sensitive data, including messages, emails, and banking information, remain private, even if the device is compromised.
  • Protection from Theft: If a mobile device is lost or stolen, encryption prevents unauthorized users from accessing the data stored on the device.
  • Secure Communication: Encryption protects data transmitted between mobile devices and online services, such as messaging apps and websites.
  • Compliance with Regulations: Encryption helps organizations meet privacy and security regulations, such as GDPR and HIPAA, by safeguarding user data.

As mobile devices continue to store more personal and sensitive information, encryption becomes an essential tool for protecting privacy and security. Both data-at-rest and data-in-transit encryption work together to secure the data stored on your device and the communications you send. Understanding how encryption works in mobile devices and the technologies behind it is crucial for both users and developers looking to enhance the security of their digital lives. By adopting strong encryption practices, users can significantly reduce the risk of unauthorized access and ensure that their personal data remains protected.