uc security

As ransomware, hacking incidents, and massive data breaches continue to play out in the headlines, organizations who rely on VoIP and Unified Communications (UC) should take stock of what they can do to lock down their systems from attack. It’s a crucial piece of the to-do list for 2018, given that last year set the record for both the most breaches and the most data compromised in a year, as several new trends (like a surge in cloud storage misconfigurations) characterized the proceedings.

Related: Top 6 Ways To Maintain Secure Communications

According to Risk Based Security’s 2017 Data Breach QuickView Report, there were 5,207 breaches recorded last year, surpassing the previous high mark by nearly 20%, set in 2015. The number of records compromised also surpassed all other years, with over 7.8 billion records exposed, a 24.2% increase over 2016’s previous high of 6.3 billion.

Related: Major Yahoo Breach Is Yet Another Warning To Boost Security Measures

5 Considerations For UC Security

Don’t fall prey to security breaches. Keep these tips in mind when choosing your communications system and configuring its security features.

Protect Communications Channels

Above all, you need to protect against unauthorized access to sensitive communications and information. Taking steps from the outset to guarantee that the integrity of your data has not been compromised by insecure interactions that threaten proprietary information is your best first step for ensuring UC security. This generally involves encryption, strong authentication, and an audit of who has access to what information and under which circumstances. Focus on how the UC system will be used in its different modes of communications (voice, web conferencing, video calls and presence, etc.) and determine if there need to be restrictions related to their business use.

Related: How To Bring Next-Level Security & Compliance To Your Office

Compliance

It’s also critical to perform compliance audits to make sure you’re on the right side of a variety of industry and government regulations surrounding data privacy. To do this, you need a way to track usage of voice, messaging, and video communications for auditing, compliance, and business planning purposes. Regulations include the well-known HIPAA requirements in the medical field, a range of financial industry requirements, and new things on the horizon, like the EU’s General Data Protection Regulation, or GDPR, set to go into effect in May. It covers any company that has any dealings with European citizens and carries strict requirements for data safety. Non-compliant organizations face strict penalties of up to 4% of global annual turnover.

Related: 3 More Ways To Maintain Secure Communications

Implement Network Security

IP voice and other UC packets represent just another type of traffic on your network, so the general best practices for network security apply. It’s important to use firewalls to prevent unauthorized traffic from entering or leaving your company’s network, which will help protect your business from attacks and malware. Also, other forms of network access control (NAC), intrusion protection, detection, and more will help to establish a perimeter around your private data. 

Related: Are You Following These UC Security Tips?

Don’t Forget Mobile

Especially in this era of bring-your-own-device (BYOD) and having remote workers connecting to corporate resources via public Wi-Fi connections, companies must make sure that communications on employee mobile devices are secure. That means on internal or external wireless LANs, cellular, and wired networks. Using strong, two-factor authentication and encryption is key, as is VPN functionality for users that connect from home or a public Wi-Fi hotspot. Mobile device management software is available for locking down company functions on a user device as well. 

Related: How Younger Employees Are Driving Demand For Heightened Security

Patch, Patch, Patch

Performing regular maintenance and keeping security protections up-to-date on both endpoints and the UC system itself should not be a “nice to have.” Taking advantage of unpatched systems with known security flaws is one of the top ways that bad actors enter company networks to install malware or exfiltrate data. Patching can be a labor-intensive process, but the effort taken to do it can prevent significant brand and financial damage down the road. 

Related: Benefits Of Cloud Unified Communications & How To Leverage Them


Category:
Related News Articles
Gain Business Agility with Unified Communication

Sarasota, Florida, February 4, 2016- Star2Star Communications, developers of “...

Sarasota, Florida, November 13, 2015 – Star2Star Communications, developers of...

Star2Star Communications, makers of the World’s Most Scalable Cloud...

Star2Star Communications, makers of the World’s Most Scalable Cloud...



Blog Archives
Unified Communications from Star2Star - Blog Listing Archives