Unified communications has become relatively ubiquitous in the private and public sectors in recent years, as a broad range of industries have adopted helpful tools such as video conferencing and instant messaging services to improve collaboration among employees and clientele. While many will erroneously leave UC out of the IT security conversation, this can be a weighty problem when leaders are trying to maintain a handle on their information governance and network protection.
For example, Voice over Internet Protocol phone services, which often act as the foundation for UC strategies, will generate a significant amount of data that can either be used for performance improvements through good governance, or represent significant threats when overlooked. As such, businesses must become more comprehensive in their security procedures to ensure that all IT and UC frameworks and investments are protected from the threats that abound in the current marketplace.
Inside the problem
PricewaterhouseCoopers recently released its 2014 State of Cybercrime Report, which indicated that the majority of organizations are still behind the eight ball when it comes to protection-related provisioning and deployments. The study was conducted by PwC, as well as the U.S. Secret Service, CSO Magazine and Carnegie Mellon University's Software Engineering Institute, while the results highlighted several key deficiencies that are plaguing businesses today.
For one, the study found that companies are not taking strategic approaches to cybersecurity spending, nor are they assessing risks or collaborating with one another to better mitigate threats as they proliferate.
"Cyber criminals evolve their tactics very rapidly, and the repercussions of cybercrime are overwhelming for any single organization to combat alone. It's imperative that private and public organizations collaborate to combat cybercrime and gain intelligence about security threats and how to respond to them. A united response will prove to be an indispensable tool in advancing the state of cybersecurity," David Burg, PwC's Global and U.S. Advisory Cybersecurity Leader, explained.
The key to strong security performances is the comprehensive oversight of all systems that could be susceptible to vulnerabilities and risks. Many experts have pointed to the importance of synergy between IT and UC frameworks for productivity and disruption reduction purposes, and this connection is just as critical for the integrity of data and systems in light of new cybersecurity threats.
By diligently managing the entirety of communications and computing technology, businesses can begin to reduce the risk of falling victim to a major breach.