June 9, 2020

Living on the Edge: The New Real-Time Communications Security Risks

By Patrick Joggerst

Real-time communications Security Risks As more and more people have been forced to work remotely due to the global public health crisis, collaboration platforms have unexpectedly saved the day for millions of businesses and allowed teams to continue to get work done and stay connected. With so many of their employees working remotely, companies must […]

Real-time communications Security Risks

As more and more people have been forced to work remotely due to the global public health crisis, collaboration platforms have unexpectedly saved the day for millions of businesses and allowed teams to continue to get work done and stay connected.

With so many of their employees working remotely, companies must also move their communications and sensitive data onto collaboration platforms, but at what cost? It is essential for organizations to understand that new security threats will surface and extra attention must be paid to securing not only data and infrastructure, but also Real-time communications.

Complience Cloud Risks

Real-time communications

The recent high-profile vulnerabilities on popular collaboration platforms like Slack and Zoom have many organizations keenly focusing their security efforts on preventing similar types of breaches. As more data is being processed outside of enterprises’ physical domains, and outside the core of the network, cybersecurity risks are skyrocketing – including the risk of real-time communications sessions (voice, data, messaging, video, collaboration, etc.) being compromised.

Potential threats include malware, denial of service (DoS), distributed denial of services (DDoS), viruses, worms and ransomware and more. As innovations, including voice to text conversion, can turn confidential conversations into easily searched and accessed data, it’s time to think more deeply about securing these vulnerable environments.

So, what can companies do to protect mission-critical data and information from malicious attacks? For a completely secure network environment, organizations should seriously consider adding unified communications (UC) analytics to their security stack. With sophisticated software and automation, they can leverage network behavioral analytics to detect and protect against bad actors.

Advanced UC Analytics Solutions

Advanced UC analytics solutions can determine how an organization’s communications system acts in the enterprise during different times of day, establishing a baseline of normal network operations. Irregularities can be detected, analyzed and mitigated as needed. By creating a baseline model leveraging analytics, security intelligence tools can identify threats in near real-time and then dynamically share bad actor policies and enforcement methods into the entire network.

Running behavioral network analytics against the UC network to observe and detect malicious activity enables organizations to turn data into actionable information. This information can, in turn, be consumed by a suite of security applications, including session border controllers (SBCs), to prevent fraud, robocalling and telephony denial of service (TDoS) attacks. UC analytics can also share security policy decisions with multiple vendor hardware and software solutions to lock down the network edge.

What traditional firewalls do for data, SBCs do for voice and video data, which is increasingly shared over IP networks. More often than not, SBCs are the first line of defense for voice and video endpoints because of their ability to detect suspicious or anomalous behavior and communicate between other devices, firewalls and technology within a network – an ability that firewalls alone do not have.

Beyond UC analytics and SBCs, here are a few more practical steps that organizations can implement to protect their employees and their networks against attacks:

  • Secure virtual collaboration platforms with the same high level of security policies and software that is used for securing email. Apply all software patches as soon as possible, including mandating updates to end-user devices.
  • Mandate two-factor or multi-factor authentication for all logins.
  • Continually educate employees on all corporate security policies. Ensure that corporate security policies are easily accessible to new and existing employees.
  • Modernize monitoring tools and technologies designed to spot sensitive data that might be exposed; securing cloud-based applications is completely different from traditional premise-based or distributed VPN services.

Investing in a UC analytics solution along with proven applications like SBCs, complemented by sound security measures, will go a long way in protecting organizations against an expanded threat vector in a post-pandemic world when more employees will be working from home than ever before.

By Patrick Joggerst

Patrick Joggerst

Patrick Joggerst is the Chief Marketing Officer and Executive Vice President of Business Development for Ribbon Communications, a secure real time communications company. Previously, Patrick was EVP of Global Sales & Marketing for GENBAND.

He has an accomplished career in communications spanning three decades, having managed sales and marketing organizations for both telecommunications service providers and technology suppliers. Prior to GENBAND, Patrick served as Vice President of Global Sales for BroadSoft, a leading provider of software and services that enable service providers to offer Unified Communications over their IP networks.

Patrick also served as the Executive Vice President & General Manager for the Carrier Services & Solutions business unit at Aricent Group, a systems integration and software solutions provider owned by KKR. Earlier positions held by Patrick included: Senior VP of World-Wide Sales at NextPoint Networks (formerly NexTone), EVP of Global Sales and Marketing at Telcordia Technologies, President of PrimeCo PCS, President of Carrier Service at Global Crossing, as well as several executive positions at AT&T.

Patrick is a graduate of Georgetown University’s School of Foreign Service.
Steve Prentice

Episode 19: Why AWS Needs to Become Opinionated about FinOps

On today’s episode of the CloudTweaks podcast, Steve Prentice chats with Rahul Subramaniam, CEO at CloudFix [...]
Read more
Metasploit-Penetration-Testing-Software-Pen-Testing-Security

Leading Cloud Vulnerability Scanners

Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn’t help with [...]
Read more

AI at the Gate: Navigating the Future of Cybersecurity with SonicWall’s Bobby Cornwell

Navigating the Future of Cybersecurity In the face of the digital age’s advancements, AI’s role [...]
Read more

Lambda Cold Starts: What They Are and How to Fix Them

What Are Lambda Cold Starts? Lambda cold starts occur when AWS Lambda has to initialize [...]
Read more
Jeff DeVerter

Charting the Course: An Interview with Rackspace’s Jeff DeVerter on AI and Cloud Innovation

Rackspace’s Jeff DeVerter on AI & Cloud Innovation In an insightful conversation with CloudTweaks, Jeff [...]
Read more

Exploring SaaS Directories: The Path to Optimal Software Selection

Exploring the Landscape of SaaS Directories SaaS directories are vital in today’s digital age, serving [...]
Read more

SPONSORS

Interviews and Thought Leadership

Randy

Karen Buffo, CMO of MixMode, on the Rise of AI in Safeguarding Digital Assets

Welcome to our Q&A session with Karen Buffo, CMO of MixMode, hosted by CloudTweaks. Today, we’ll explore the profound impact of generative Artificial Intelligence (AI) on cybersecurity. As AI takes [...]
Read more
Algirdas Stasiūnaitis

The Future of Cybersecurity: Insights from Cyber Upgrade’s Founders

AI and Cybersecurity: Innovations and Challenges In the rapidly evolving landscape of technology, where artificial intelligence and cybersecurity shape the future of our digital world, CloudTweaks is pleased to present [...]
Read more

Exploring SaaS Directories: The Path to Optimal Software Selection

Exploring the Landscape of SaaS Directories SaaS directories are vital in today’s digital age, serving as key resources for businesses [...]
Read more

The Future of Cybersecurity: Insights from Cyber Upgrade’s Founders

AI and Cybersecurity: Innovations and Challenges In the rapidly evolving landscape of technology, where artificial intelligence and cybersecurity shape the [...]
Read more

Leveraging Artificial Intelligence in Insurance Claims Analytics Software Development

Enhancing Insurance Claims Analysis with AI Technology Nowadays, digital technology affects all aspects of our everyday lives, and the insurance [...]
Read more

SPONSOR PARTNER

Explore top-tier education with exclusive savings on online courses from MIT, Oxford, and Harvard through our e-learning sponsor. Elevate your career with world-class knowledge. Start now!
© 2024 CloudTweaks. All rights reserved.