Security Threat Mitigation
Data, as a top asset of a business, must be protected to uphold both the business’s competitive advantage and reputation. Collaboration through voice and video is at the core of modern business conduct, which means the collaboration infrastructure is a fundamental carrier of sensitive information. Information security best practices must therefore be a foundational practice in the deployment and operation of the collaboration solution.
This chapter covers both policy and technical defense mechanisms for reducing the risk of attacks on collaboration systems where SBCs are deployed. The following specific topics are discussed:
An Overview of Security Threats to Collaboration Solutions—This section provides ...