Security Holes in Unified Communications: Protecting Against Today's Threats
Same threats, different day
Unified communications is a set of multi-faceted technologies that have been integrated to interoperate with one another, and so there are a lot of different security concerns relative to the type of technology and how it connects with all of the other technologies, said Jonathan Edwards, analyst for unified communications and enterprise communications infrastructure at IDC. However, moving to an IP world means there are real-time security threats that didn't exist before.
The switch from a traditional communications infrastructure to one that rides the IP highway has made it easier for hackers and other nogoodniks to squeak in through security cracks to steal data, swipe financial information and eavesdrop on VoIP and video streams. It's as if the world has stepped into a William Gibson novel ... without all the cool implants. And the threat is very real. With vital corporate information at stake, companies can't afford to risk insecure environments. And yet the benefits of unified communicationsa unified inbox integrated with presence, voice and other featuresprovide an undeniable boost to productivity at a time when companies are looking to increase productivity without hurting their bottom line with more expenses. So what's a company to do? Forgo the benefits in favor of security? Or risk a breach and data loss or worse in order to gain the benefits of unified communications? The first step is to know what to watch for. Two UC specialists recently offered details of some of the biggest threats to unified communications platforms today.