{"id":10287,"date":"2020-06-08T08:16:17","date_gmt":"2020-06-08T07:16:17","guid":{"rendered":"\/gb\/en\/blog\/?p=10287"},"modified":"2023-01-16T17:31:53","modified_gmt":"2023-01-16T17:31:53","slug":"keeping-your-communication-secure","status":"publish","type":"post","link":"\/gb\/en\/blog\/keeping-your-communication-secure\/","title":{"rendered":"Keeping Your Communication Secure"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In today\u2019s world, security is a high priority. It\u2019s essential for companies to protect their data. With businesses working from home, data security has never been so important. From healthcare, to financial services, to online retailers and fintech services, day-to-day business operations to interactions with customers and clients, organisations must ensure their communications software supports their data protection requirements.<\/span><\/p>\n<h2><b>The New Norm<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Businesses being faced with security challenges during the coronavirus crisis resulted in an enormous shift to home-based workers and agents. According to Contact Babel\u2019s latest research, for example, 84% of UK Contact Centres are now operating remotely. Up until very recently, fewer than 4% of agents worked remotely at home on a permanent basis.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rapid responses to the coronavirus pandemic leave organisations vulnerable to security breaches.\u00a0 Considerations around cybersecurity, data privacy and user safeguards have come to the forefront. Faced with the need to enable remote work, businesses rushed to find a solution; <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/contact-centre\/overview.html\">cloud contact centre<\/a>, for instance, or telephony with contact centre capabilities and video conferencing.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The world is going to be very different after COVID-19. Remote working will be the new norm. You need to ensure your organisation is protected from unauthorised access, data breaches and other online threats.\u00a0<\/span><\/p>\n<h2><b>Comprehensive Security for Peace of Mind<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">There are many reasons for businesses wanting to switch to cloud communications platforms. Perhaps traffic to your business is taking off and you need a secure and scalable cloud solution. Or perhaps you want to combine multiple communications apps into a single, unified platform to ensure maximum security?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security threats are constantly evolving and becoming more sophisticated. A trusted provider should be committed to customers\u2019 privacy and security. When it comes to choosing the right UCaaS provider, what questions should you ask? I think fundamentally the company\u2019s culture plays an important role.<\/span><\/p>\n\t<div class=\"cta-banner  CID-2FdM5dTp IID-6a08413f92754\"\r\n\t\tdata-dl-custom-type=\"ctaButton\">\r\n\t\t<div class=\"cta-banner-img-wrap\">\r\n\t\t\t<div class=\"cta-banner-img\" style=\"background-image:url(\/gb\/en\/blog\/wp-content\/uploads\/2019\/05\/ringcentral-security.jpg)\"><\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"cta-body\" data-dl-custom-type=\"ctaButton\">\r\n\t\t\t<span class=\"cta-sub-heading\">Top industry security rating<\/span>\r\n\t\t\t<h3 class=\"cta-heading\">Peace of mind for every business<\/h3>\r\n\t\t\t<p>The RingCentral platform uses multiple layers of security to protect your data and communications while also guarding against fraud and service abuse.<\/p>\r\n\t\t\t<a class=\"rc-cta-shortcode btn btn-primary btn-lg\" data-dl-element=\"button\"\r\n\t\t\t\thref=\"https:\/\/www.ringcentral.com\/gb\/en\/technology\/security.html\" class=\"btn btn-primary\"\r\n\t\t\t\ttarget=\"_blank\" rel=\"noopener\" data-dl-additional-info=\"Peace of mind for every business\"\r\n\t\t\t\tdata-dl-name=\"Peace of mind for every business | Find out more\">Find out more<\/a>\r\n\r\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\t\n<p><b>First, what is the company\u2019s approach to security?<\/b><span style=\"font-weight: 400;\"> Do they have a dedicated security function with specialised security engineering, security audit and compliance team, who are also focused on application security and security data?<\/span><\/p>\n<p><b>Second, does the company provide cloud security? <\/b><span style=\"font-weight: 400;\">Cloud security offers many benefits, including centralised security of the infrastructure, back-end communications platform, enhancement of traffic analysis, streamlining of the monitoring of network events and fewer software and policy updates. It is essential to work with a cloud provider that offers experience with multiple types of security infrastructure, anti-malware, and endpoint detection, and has security analytics for threat detection and cloud threat monitoring. Not to mention service border defences at network and application layers such as firewalls, session border controllers and <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/office\/unified-communications.html\">unified communications<\/a> threat management for the services you require.<\/span><\/p>\n<p><b>Third, what about their security measures that build into the applications? <\/b><span style=\"font-weight: 400;\">There are several areas to consider, such as testing, risk management and cyber security governance for their products and services. What standard encryption does the vendor have?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unified communications involves multiple endpoints. It\u2019s important to make sure encryption extends beyond data in a data center. Does your intended vendor have independent third-party verification and assessments?\u00a0<\/span><\/p>\n<p><b>Fourth, what is their approach to data privacy?<\/b><span style=\"font-weight: 400;\"> Is the vendor General Data Protection Regulation (GDPR) compliant? What do they do with your customer data? Are their disclosures clear and transparent?\u00a0<\/span><\/p>\n<h2><b>Know Your Vendor\u2019s Security Standards<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Today\u2019s organisations need technology vendors that continuously improve their security capabilities while delivering the services customers require. <\/span><a href=\"https:\/\/www.ringcentral.com\/gb\/en\/why-us-enterprise.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">RingCentral\u2019s cloud-based services<\/span><\/a><span style=\"font-weight: 400;\"> are designed to deliver world-class security greater than many traditional on-premises solutions. Frequent security updates are included in the service, meaning you don&#8217;t need to hire in-house IT specialists to maintain security on the platform. This is just one feature among the many cost savings of switching to a cloud-based communications system. RingCentral reinvests up to 20% of its revenue back into innovation, driven by a<\/span><span style=\"font-weight: 400;\"> relentless focus on reliability, privacy, security and transparency.<\/span><\/p>\n<p class=\"uc-expo-cta-2 text-center IId-bottom-banner-144903516 CId-bottom-banner-1098205596\"><span style=\"font-size: 24px; line-height: 30px;\">Get details on the security and trust built into RingCentral products and services<\/span><span class=\"text-center\" style=\"display: block;\" data-dtm-element=\"button\" data-dtm-context=\"bottom-cta\" data-dtm-additional-info=\"Get the guide\"><a class=\"btn btn-primary btn-lg\" style=\"margin-top: 16px; font-weight: bold;\" title=\"Read the eBook\" href=\"https:\/\/netstorage.ringcentral.com\/uk\/documents\/cloud_communications_and_collaboration.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-dtm-name=\"Bottom CTA\">Download the white paper<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s world, security is a high priority. It\u2019s essential for companies to protect their data. With businesses working from home, data security has never been so important. From healthcare, &hellip; <a href=\"\/gb\/en\/blog\/keeping-your-communication-secure\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;Keeping Your Communication Secure&#8221;<\/span><\/a><\/p>\n","protected":false},"author":244,"featured_media":10289,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[74,116,90],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keeping Your Communication Secure | RingCentral UK Blog<\/title>\n<meta name=\"description\" content=\"It\u2019s essential for companies to protect their data. Organisations must ensure their communications software supports their data protection requirements.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/keeping-your-communication-secure\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeping Your Communication Secure | RingCentral UK Blog","description":"It\u2019s essential for companies to protect their data. Organisations must ensure their communications software supports their data protection requirements.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/keeping-your-communication-secure\/","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":":\/gb\/en\/blog\/keeping-your-communication-secure\/#article","isPartOf":{"@id":"\/gb\/en\/blog\/keeping-your-communication-secure\/"},"author":{"name":"RingCentral Team","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c"},"headline":"Keeping Your Communication Secure","datePublished":"2020-06-08T07:16:17+00:00","dateModified":"2023-01-16T17:31:53+00:00","mainEntityOfPage":{"@id":"\/gb\/en\/blog\/keeping-your-communication-secure\/"},"wordCount":719,"commentCount":0,"publisher":{"@id":"\/gb\/en\/blog\/#organization"},"keywords":["cloud communications","digital transformation","security"],"articleSection":["UC - Collaboration"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":[":\/gb\/en\/blog\/keeping-your-communication-secure\/#respond"]}]},{"@type":"WebPage","@id":"\/gb\/en\/blog\/keeping-your-communication-secure\/","url":":\/gb\/en\/blog\/keeping-your-communication-secure\/","name":"Keeping Your Communication Secure | RingCentral UK Blog","isPartOf":{"@id":"\/gb\/en\/blog\/#website"},"datePublished":"2020-06-08T07:16:17+00:00","dateModified":"2023-01-16T17:31:53+00:00","description":"It\u2019s essential for companies to protect their data. Organisations must ensure their communications software supports their data protection requirements.","breadcrumb":{"@id":":\/gb\/en\/blog\/keeping-your-communication-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[":\/gb\/en\/blog\/keeping-your-communication-secure\/"]}]},{"@type":"BreadcrumbList","@id":":\/gb\/en\/blog\/keeping-your-communication-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"\/gb\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"UC - Collaboration"}]},{"@type":"WebSite","@id":"\/gb\/en\/blog\/#website","url":"\/gb\/en\/blog\/","name":"RingCentral UK Blog","description":"RingCentral News and Tips","publisher":{"@id":"\/gb\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/gb\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/gb\/en\/blog\/#organization","name":"RingCentral UK","url":"\/gb\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","width":1921,"height":416,"caption":"RingCentral UK"},"image":{"@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/person\/image\/","url":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","contentUrl":"https:\/\/rcbloguk.wpengine.com\/gb\/en\/blog\/wp-content\/plugins\/rc-profile-photo\/images\/default-avatar.png","caption":"RingCentral Team"},"url":"\/gb\/en\/blog\/author\/ringcentral-team\/"}]}},"_links":{"self":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/10287"}],"collection":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/comments?post=10287"}],"version-history":[{"count":0,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/10287\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media\/10289"}],"wp:attachment":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media?parent=10287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/categories?post=10287"},{"taxonomy":"post_tag","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/tags?post=10287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}