Security Holes in Unified Communications: Protecting Against Today's Threats

  • By

    Chris Talbot

Same threats, different day

Same threats, different day

Unified communications is a set of multi-faceted technologies that have been integrated to interoperate with one another, and so there are a lot of different security concerns relative to the type of technology and how it connects with all of the other technologies, said Jonathan Edwards, analyst for unified communications and enterprise communications infrastructure at IDC. However, moving to an IP world means there are real-time security threats that didn't exist before.
The switch from a traditional communications infrastructure to one that rides the IP highway has made it easier for hackers and other nogoodniks to squeak in through security cracks to steal data, swipe financial information and eavesdrop on VoIP and video streams. It's as if the world has stepped into a William Gibson novel ... without all the cool implants. And the threat is very real. With vital corporate information at stake, companies can't afford to risk insecure environments. And yet the benefits of unified communications—a unified inbox integrated with presence, voice and other features—provide an undeniable boost to productivity at a time when companies are looking to increase productivity without hurting their bottom line with more expenses. So what's a company to do? Forgo the benefits in favor of security? Or risk a breach and data loss or worse in order to gain the benefits of unified communications? The first step is to know what to watch for. Two UC specialists recently offered details of some of the biggest threats to unified communications platforms today.
This article was originally published on 2010-08-09