Unified Communications: Click to talk:



January 31, 2010  8:53 PM

Controlling Social Networking in the Enterprise

Posted by: Tony Bradley
Data breach, exposure, risk, social media, Social networking, threat, Unified Communications

A recent article from SearchUnifiedCommunications highlights the growing risks faced by organizations from social networking.

Enterprise adoption of social...

December 31, 2009  9:45 AM

VoIP is Low-Hanging Fruit for Attackers

Posted by: Tony Bradley
exploit, risk, Security, threat, UC, Unified Communications, VoIP, vulnerability

VoIP (voice over IP) infrastructures are generally not as secure as the networks they ride on, and they provide attackers with a weakest link in the chain to exploit as a back door to the rest of the network. An

September 8, 2008  8:41 PM

UC Provides New Attack Vectors

Posted by: Tony Bradley
presence, risk, Security, threat, UC, Unified Communications, voice, VoIP

As companies made / make the move from traditional POTS or analog phone services to VoIP (voice over IP) communications, they introduce new risks that may lead to sensitive communications being compromised. There are plenty of books available detailing various VoIP threats and potential attacks....

May 8, 2008  3:27 AM

Policing Instant Messaging

Posted by: Tony Bradley
Avaya One-X Communicator, IM, instant messaging, Microsoft Communicator, policy, risk, Security

One of the key building blocks of unified communications is instant messaging. Instant messaging (IM) client software acts as the focal point and primary interface for a variety of unified communications solutions including Microsoft Communicator, and Avaya One-X Communicator. IM has come a long...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: