ChannelVision Magazine

It’s a crucial piece of the to-do list for 2018, given that last year set the record for both the most breaches and the most data compromised in a year, as several new trends (such as a surge in cloud storage misconfigurations) character- ized the proceedings. According to Risk Based Security’s 2017 Data Breach QuickView Report , there were 5,207 breaches recorded last year, surpassing the previous high mark set in 2015 by nearly 20 percent. The number of records compromised also surpassed all other years, with more than 7.8 billion records exposed, a 24.2 percent increase over 2016’s previous high of 6.3 billion. At the same time, the risk landscape is shifting too, with new regulations and compliance requirements blooming right along with the tulips this spring. Here are six considerations for se- curing your customers’ UC systems and being in compliance: Protect Communications Channels. Above all, you need to protect against unauthorized access to sensitive com- munications and information, taking steps to guarantee that the integrity of that data has not been compromised by insecure interactions that may allow pro- prietary information to be intercepted. This generally involves encryption, strong authentication and an audit of who has access to what information and under which circumstances. Focus on how the UC system will be used in its different modes of communications (voice, web conferencing, video calls and presence, etc.) and think about if there needs to be restrictions related to their business use. By David Portnowitz A 6-Point Checklist for Securing UC A s ransomware, hacking incidents and massive data breaches continue to play out in the headlines, organizations that rely on VoIP and unified commu- nications (UC) should take stock of what they can do to lock down their systems from attack. Cyber Patrol Compliance. It’s also critical to perform compliance audits to make sure you’re on the right side of a variety of industry and government regulations surrounding data privacy. To do this, you need a way to track usage of voice, messaging and video communications for auditing, com- pliance and business planning pur- poses. Regulations include the well- known HIPAA requirements in the medical field, a range of financial in- dustry requirements, and new things on the horizon, such as the EU’s General Data Protection Regulation, or GDPR, set to go into effect in May. It covers any company that has any dealings with European citizens and carries strict requirements for data safety. Non-compliant organizations face strict penalties of up to 4 percent of global annual turnover. Implement Network Security. IP voice and other UC packets rep- resent just another type of traffic on your network, so the general best practices for network security ap- ply. It’s important to use firewalls to prevent unauthorized traffic from entering or leaving a company’s network, which will help protect the business from attacks and malware. Also, other forms of network access control (NAC), intrusion protection and detection and more will help to establish a perimeter around any crown jewels. Channel Vision | March - April, 2018 28

RkJQdWJsaXNoZXIy NTg4Njc=