UC Advanced Issue # 1

Research from the last 12 months would

carried out by the CISO’s staff, to keep the organisation’s users in a continual state of vigilance.”

suggest that a portion of businesses, mostly in

Ending the Risk Continual vigilance can sound like a drag, however at the lowest level, it just means keeping hardware and software updated so they can stay compliant with security solutions. Underwood said high quality hardware will have some in-built security mechanisms, such as mutual authentication through unique certificates for each device, or randomisation of input and output ports for phone calls. He added: “In addition to this, regular firmware updates play a vital role in ensuring that businesses can stay ahead of the curve, expanding the functionality of their devices and helping to address any new security vulnerabilities proactively.” Wakankar finalised by adding another layer of complexity; reputation.

the SME bracket, underestimate the risks of their business and are under-protected.

Distributed Denial of Service attacks the risks, however theoretical, can end up in a lot of damage to the business, including lost earnings, fines, and a downgrade in reputation. With such a lot at risk, some businesses will be comforted to know that, according to Martin Taylor, Co-Founder & Deputy CEO of Content Guru, the networks and platforms that we rely on have already invested in preventative and detective measures, leaving humans as the biggest problem. “For the owners and operators of the large-scale communication networks and platforms on which billions of people depend on, the risk of attack is perennial. Consequently intrusion detection systems (IDS) and intrusion prevention systems (IPS) are prevalent through the networks and are continually updated. “Zoned platform designs, which place strict limitations on the types and quantities of data that can pass between zones, protect the integrity of the services that run on these platforms and safeguard the data of their users from compromise. “External bodies, as well as the internal teams of each organisation’s Chief Information Security Officer (CISO) run regular penetration tests, examining the efficacy of the IPS, and ensuring that any intruder able to breach a platform’s perimeter will not be able to move about inside, in the unlikely event that an unauthorised user should gain access. “All of these controls mean that humans emerge as a business’s most vulnerable point. As a result, organisations place particular emphasis on role-based log-ins, limiting the types of activity a user can carry out, whilst monitoring and reporting each user’s every movement. “Physical controls for distributed and hybrid workforces, such as Virtual Private Networks and multi-factor authentication, are augmented by phishing expeditions,

Trevor Francis CEO

46labs.com

As more businesses learn about the potential security risks involved with a VoIP solution, those quick adopters may become more wary, adding “while VoIP calls have become an integral part of the communications sphere, they do carry additional risks compared to traditional voice services that businesses need to be aware of. “This awareness isn’t to scare off businesses from VoIP but rather to arm them with the information and knowledge to protect themselves, particularly by working with secure communications providers and implementing protection measures across multiple layers. “On top of this, it’s vital in the long term for the ecosystem to collaborate and prioritise fraud protection. By doing so, VoIP technology will continue to advance and offer long-term benefits to businesses and users alike.”

Martin Taylor Co-founder & Deputy CEO

contentguru.com

ucadvanced.com

37

Powered by