Comprehensive Security Guide
INTRODUCTION
Cyberattacks become more sophisticated and hackers more aggressive. Business communications such as telephone calls, voicemails, text messages, video meetings and file sharing are targets of attacks. (Emails remain one of the top vectors.) Communicating, collaborating and sharing information are at the heart of every business. Hybrid work is driving a growing reliance on cloud technology, connecting stakeholders in the organization. Your organization’s ability to withstand security attacks and avoid breaches is critical to the ongoing success of the business. Your cloud communications provider should be as focused on security as they are on product innovations. Here’s a Comprehensive Security Guide to help you keep your security on lock.
THE NEED
Conversations taking place in your company cover so many topics that should remain confidential. From product development and customer information to employee data, company strategy, and more. In short, your company’s intellectual property (IP) is threaded throughout the communications between your employees, customers and suppliers. All of this information is valuable to cybercriminals who will use it against you if they gain access.
The IP footprint created by business conversations is vast. This information is vulnerable for bad actors to steal and use maliciously. It’s common for an unknown caller to join an audio or video conference to listen in on a company meeting. The history of chats and emails can virtually live forever on phones, PCs or company servers. What about secure files containing contracts, customer or employee information, confidential presentations and more? Are they really secure?
The moment any technology is offered on the open market, cybercriminals are looking for weaknesses to exploit. Your business communications provider plays a pivotal role in helping keep your proprietary data safe. If you are not working with a supplier who is continually advancing security as the product evolves, you are at risk.
THE SOLUTION
Intermedia Unite provides affordable, cutting-edge business communication tools with top-notch security features. Small and medium-sized businesses gain Fortune 500-level reliability and security through Triple Shield Security and a Comprehensive Security Guide.
Triple Shield Security – from Intermedia and Towner
With over 25 years of experience, our cloud service prioritizes security. Our certified staff and advanced technologies protect against cyber threats. Triple Shield Security safeguards user access, applications, and data infrastructure.
1 | USER ACCESS SECURITY
User and administrator access – whether from laptops, desktops, smartphones, or even desk phones — if misplaced, misused, or compromised — can become the access point for cybercriminals to access your entire company’s proprietary data.
That’s why user and administrative credentials are a primary target for hackers. Compromised access is frequently used by hackers for lateral movement to get access to other users and other systems, and administrative access is among the most prized target for hackers.
Intermedia’s user access security shields your company from unauthorized access, regardless of device or location. Easy-to-operate access controls allow your administrators to better manage user security — whether through authentication, sophisticated password management, geo-fencing, suspicious login or account compromise detection.
2 | APPLICATION SECURITY
Data is particularly vulnerable when it flows between the safe confines of your secure cloud and your users’ mobile and desktop applications. Cybercriminals can exploit vulnerabilities of in-transit data across complex environments and applications for malicious intent.
Intermedia’s Triple Shield Security helps you foil attempts to access your company at the application layer. We employ encryption, both in-transit (using TLS encryption) and at-rest (using AES 256-bit keys), as an essential component of our “secure-by-design” product architecture to help keep your data private and secure. Data encrypted while at rest includes voicemails, call recordings, meeting recordings/chat/notes, chat and SMS history, chat attachments, and f iles. Applications are penetration tested and reviewed against NIST and ISO security standards.
3 | CLOUD SECURITY
Our cloud is hosted in geographically dispersed, highly secure and monitored datacenters by certified tier-three providers. All of the datacenters are either ISO 27001-certified or are subject to regular SOC security audits.
Network-based monitoring detection systems are configured to detect attacks or suspicious behavior, and vulnerability scans are performed to identify potential weakness in the security and confidentiality of systems and data. We also run advanced, next-generation antivirus technology across our systems to help detect and deter malicious computer usage that often cannot be caught by conventional methods. The technology monitors for unusual patterns and behaviors, alerting security engineers of suspicious activity, 24×7. This endpoint technology can also help prevent attacks against vulnerable services, data-driven attacks on applications, host-based attacks such as privilege escalation, unauthorized logins and access to sensitive files, and malware (e.g., viruses, Trojan horses, and worms).
If most or all of these questions cannot be answered affirmatively by your cloud communications provider, your data may be at risk. Contact us today to learn about our Triple Shield approach in securing your business communications.