Unified communications has become a far more prolific aspect of corporate technology provisioning strategies in recent years, driven by organizations' need to have more efficient, integrated and affordable collaboration utilities in place. With Voice over Internet Protocol phone systems, video conferencing, enterprise messaging services and mobility entering into the average workplace, it only makes sense that small business owners are looking to find ways to keep everything unified and in order.
Productivity and spend-management are certainly high priorities among the entrepreneurial community when approaching new communications and technological solutions, but security cannot fall by the wayside when deployments are being made. A new study pointed out that an often-overlooked aspect of UC and IT security is expected to cause some headaches in the coming years.
Apps gone wild
Gartner recently forecast that, through the end of next year, roughly three-quarters of applications will simply not be passable in terms of security testing, while roughly 90 percent of companies are already using these tools for a variety of purposes. Keeping in mind that apps and UC are becoming increasingly converged in the average workplace, this represents a significant threat to corporate continuity, asset protection and other core areas of management.
"Enterprises that embrace mobile computing and bring your own device (BYOD) strategies are vulnerable to security breaches unless they adopt methods and technologies for mobile application security testing and risk assurance," Dionisio Zumerle, principal research analyst at Gartner, asserted. "Most enterprises are inexperienced in mobile application security. Even when application security testing is undertaken, it is often done casually by developers who are mostly concerned with the functionality of applications, not their security."
The analysts went on to note that highly sophisticated hackers are not even the concern here, but rather that 75 percent of apps will not be properly configured, creating vulnerabilities that can be used to break into sensitive systems.
A consistent issue
Configuration problems have been at the root of many issues in the modern cybersecurity arena, while the fact that UC frameworks are increasingly dependent upon IT makes this a broad corporate issue in virtually every workplace. In many instances, the best way to combat configuration problems is to work with UC providers that will step in, support the company throughout the implementation process and optimize management frameworks to avoid hiccups in integration and oversight.