{"id":24480,"date":"2022-08-09T10:03:22","date_gmt":"2022-08-09T09:03:22","guid":{"rendered":"\/gb\/en\/blog\/?p=24480"},"modified":"2025-07-31T20:53:59","modified_gmt":"2025-07-31T19:53:59","slug":"how-to-get-ucaas-security-right","status":"publish","type":"post","link":"\/gb\/en\/blog\/how-to-get-ucaas-security-right\/","title":{"rendered":"How To Get UCaaS Security Right"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The cost of a single data breach has significantly increased in recent years. In 2021, that cost reached an average total of \u00a33.48 million, an increase of 143% compared with 2019. Likewise, according to the IBM Cost of Data Breach report 2021, successful <a href=\"\/gb\/en\/blog\/definitions\/vishing-voice-or-voip-phishing\/\">vishing<\/a> or smishing attacks cost victims \u00a3187B that year.<\/span><\/p>\n<p>This growing risk, plus the General Data Protection Regulation (GDPR) and its increasing fines, shows why it\u2019s essential to scrutinise your vendor\u2019s data privacy processes. In Q3 of 2021 alone, business fines totalled more than \u00a30.94B. You could be at risk if you\u2019re unfortunate enough to choose a <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/office\/unified-communications.html\">UCaaS<\/a> partner with a lax approach to security.<\/p>\n<p><span style=\"font-weight: 400;\">But finding a UCaaS provider with a bulletproof approach isn&#8217;t straightforward. It means knowing exactly what to look out for.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\r\n\t\r\n\t<div class=\"rc-post-content-cta rc-post-content-cta_orange\">\r\n\t\t<div class=\"rc-post-content-cta-columns\">\r\n\t\t\t<div class=\"bottom-cta-img\">\r\n\t\t\t\t<img decoding=\"async\" width=\"805\" height=\"424\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png\" class=\"responsive-image\" alt=\"A diagram showing how RingCentral security infrastructure works\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png 805w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-300x158.png 300w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-640x337.png 640w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-768x405.png 768w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-790x415.png 790w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-376x198.png 376w\" sizes=\"(max-width: 805px) 100vw, 805px\" \/>\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-copy\">\r\n\t\t\t\t<div class=\"headline-copy\" style=\"text-align:left;\">Learn about the essential security, data privacy and compliance requirements for your trusted UCaaS platform.<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t<div class=\"rc-post-content-cta-footer\">\r\n\t\t\t<div class=\"bottom-cta-logo-container\">\r\n\t\t\t\t<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-2082302799\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-2082302799\">Ring Central Logo<\/title>\r\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\r\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\r\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\t\t\td=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\r\n\t\t\t\t\t\t<\/svg><\/span><\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"bottom-cta-link\">\r\n\t\t\t\t<a href=\"https:\/\/netstorage.ringcentral.com\/uk\/guides\/security-ciso-guide.pdf\" class=\"view-all view-all-brown\" target=\"_blank\"\r\n\t\t\t\t\trel=\"noopener noreferrer\" data-dl-name=\"Download the UCaaS security guide\" data-dl-element=\"button\"\r\n\t\t\t\t\tdata-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Download the UCaaS security guide\t\t\t\t\t<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\"\r\n\t\t\t\t\t\t\tfill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-2082302799\"\r\n\t\t\t\t\t\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t<title id=\"cta-ring-arrow-2082302799\">Ring Central Logo<\/title>\r\n\t\t\t\t\t<path\r\n\t\t\t\t\t\td=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\"><\/path>\r\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\"\r\n\t\t\t\t\t\td=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\"><\/path>\r\n\t\t\t\t<\/svg><\/span><\/a>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\r\n\t<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s take a look at some tips you can follow when you&#8217;re considering what provider to go for.\u00a0<\/span><\/p>\n<h2 id=\"three\"><span style=\"font-weight: 400;\">Three things for your UCaaS security checklist<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Transparency is key when it comes to finding a vendor with a responsible approach to their security practices. Your chosen vendor should be upfront about the investments and commitments they\u2019ve made to safeguard your users and data. <\/span><span style=\"font-weight: 400;\">But it\u2019s super important to know what you\u2019re looking for when it comes to your vendor\u2019s security pledge. We\u2019ve outlined three non-negotiables to help you protect your brand and bottom line (<a href=\"https:\/\/netstorage.ringcentral.com\/uk\/guides\/security-ciso-guide.pdf\">more of these tips in the full guide<\/a>).\u00a0<\/span><\/p>\n<h3 id=\"infrastructure\"><b>1. Information security infrastructure<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As the potential attack surface for cybercrime continues to expand, UCaaS vendors must apply <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/trust-centre.html\">airtight practices and features<\/a> that provide real peace of mind for their customers. From a strong commitment to data security to rigorous processes that ensure stringent protection, you\u2019ll need to partner with a vendor whose infrastructure is sound.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ask for details on the security practices of their platform\u2019s cloud infrastructure, this will let you know whether security is truly in their DNA.\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-24482\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png\" alt=\"A diagram showing how RingCentral security infrastructure works\" width=\"805\" height=\"424\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security.png 805w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-300x158.png 300w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-640x337.png 640w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-768x405.png 768w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-790x415.png 790w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/08\/Infrastructure-security-376x198.png 376w\" sizes=\"(max-width: 805px) 100vw, 805px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">You\u2019ll also want demonstrable details on their data security pledge, the physical security of their environment, data handling and regular security assessments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Likewise, industry compliance attestations and security certifications will help to illustrate your vendor\u2019s level of commitment to the cause. Look for certifications like the following:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> SOC 2 attestation\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> SOC 3 attestation\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> ISO 27001 ISO 27017-18 certifications\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> STIR\/SHAKEN (Spam blocking)\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> HITRUST certificate\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> HIPAA attestation of compliance\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> GDPR\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> PCI-certified merchant\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> PIPEDA\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> C5<\/span><\/li>\n<\/ul>\n<h3 id=\"data\"><b>2. Data privacy and compliance management\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With any UCaaS platform, users can easily share confidential details such as customer information and employee details. Easy collaboration is ultimately one of the most valuable aspects of a UCaaS platform after all. So organisations need to have complete trust in the way their vendor manages compliance and data privacy.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is where transparency plays a key role. Your chosen vendor\u2019s data privacy policies should be published in a data privacy notice that is publicly available. They must introduce processes that prevent inadvertent or intentional compromise of your protected data and be completely upfront about how data is collated and used.\u00a0<\/span><\/p>\n<h3 id=\"admin\"><b>3. Security and admin controls<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Whether it boasts features such as waiting rooms for video calls or multi-factor authentication, it&#8217;s worth confirming that your chosen vendor adopts sophisticated capabilities to protect your users and the platform. <\/span><span style=\"font-weight: 400;\">Advanced controls such as who can enable screen sharing could protect your business from harm. <\/span><span style=\"font-weight: 400;\">What\u2019s more, your provider should go the extra mile by taking the guesswork out of which controls you might need. <\/span><span style=\"font-weight: 400;\">Platforms such as RingCentral offer a range of sophisticated security controls, from <a href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/definitions\/end-to-end-encryption\/\">end-to-end encryption<\/a> to video host controls and advanced authentication and single sign on (SSO).\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-23190\" src=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/04\/What-is-end-to-end-encryption.png\" alt=\"What is end-to-end encryption\" width=\"930\" height=\"700\" srcset=\"\/gb\/en\/blog\/wp-content\/uploads\/2022\/04\/What-is-end-to-end-encryption.png 930w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/04\/What-is-end-to-end-encryption-300x226.png 300w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/04\/What-is-end-to-end-encryption-640x482.png 640w, \/gb\/en\/blog\/wp-content\/uploads\/2022\/04\/What-is-end-to-end-encryption-768x578.png 768w\" sizes=\"(max-width: 930px) 100vw, 930px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">All in all, you&#8217;ll want to partner with a UCaaS provider that values the security, privacy and compliance of your data as highly as you do. It&#8217;s always going to be worth looking out for these extra details to ensure you get what you need. If you want to discover more about what to look out for, then it&#8217;s a good time to read <a href=\"https:\/\/netstorage.ringcentral.com\/uk\/guides\/security-ciso-guide.pdf\">RingCentral&#8217;s CISO guide<\/a>.\u00a0<\/span><\/p>\n\t\t<div class=\"uc-expo-cta-2 style-4  CID-cta-2FdM5dTp\"\r\n\t\t\tdata-dl-custom-type=\"ctaButton\">\r\n\t\t\t<div class=\"inner-container\">\r\n\t\t\t\t<div class=\"text\">\r\n\t\t\t\t\t<span>Want to learn more about UCaaS security?<\/span>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"button\">\r\n\t\t\t\t\t<span class=\"\">\r\n\t\t\t\t\t\t<a class=\"rc-cta-shortcode btn btn-primary btn-lg\" data-dl-element=\"button\"\r\n\t\t\t\t\t\t\tclass=\"btn btn-primary btn-lg\" href=\"https:\/\/netstorage.ringcentral.com\/uk\/guides\/security-ciso-guide.pdf\"\r\n\t\t\t\t\t\t\tdata-dl-additional-info=\"Want to learn more about UCaaS security?\"\r\n\t\t\t\t\t\t\tdata-dl-name=\"Want to learn more about UCaaS security? | Download the security guide\" target=\"_blank\"\r\n\t\t\t\t\t\t\trel=\"noopener\" title=\"Grab the security guide\">Download the security guide<\/a>\r\n\t\t\t\t\t<\/span>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"clearfix\"><\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\n","protected":false},"excerpt":{"rendered":"<p>The cost of a single data breach has significantly increased in recent years. In 2021, that cost reached an average total of \u00a33.48 million, an increase of 143% compared with &hellip; <a href=\"\/gb\/en\/blog\/how-to-get-ucaas-security-right\/\" class=\"more-link\">Read more<span class=\"screen-reader-text\"> &#8220;How To Get UCaaS Security Right&#8221;<\/span><\/a><\/p>\n","protected":false},"author":244,"featured_media":24501,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,264],"tags":[74,90],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Get UCaaS Security Right | RingCentral UK Blog<\/title>\n<meta name=\"description\" content=\"he cost of a single data breach has significantly increased in recent years. In 2021, that cost reached an average total of \u00a33.48 million, an increas\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/gb\/en\/blog\/how-to-get-ucaas-security-right\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Get UCaaS Security Right | RingCentral UK Blog","description":"he cost of a single data breach has significantly increased in recent years. In 2021, that cost reached an average total of \u00a33.48 million, an increas","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/gb\/en\/blog\/how-to-get-ucaas-security-right\/","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":":\/gb\/en\/blog\/how-to-get-ucaas-security-right\/#article","isPartOf":{"@id":"\/gb\/en\/blog\/how-to-get-ucaas-security-right\/"},"author":{"name":"RingCentral Team","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c"},"headline":"How To Get UCaaS Security Right","datePublished":"2022-08-09T09:03:22+00:00","dateModified":"2025-07-31T19:53:59+00:00","mainEntityOfPage":{"@id":"\/gb\/en\/blog\/how-to-get-ucaas-security-right\/"},"wordCount":762,"commentCount":0,"publisher":{"@id":"\/gb\/en\/blog\/#organization"},"keywords":["cloud communications","security"],"articleSection":["Cloud Communications","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":[":\/gb\/en\/blog\/how-to-get-ucaas-security-right\/#respond"]}]},{"@type":"WebPage","@id":"\/gb\/en\/blog\/how-to-get-ucaas-security-right\/","url":":\/gb\/en\/blog\/how-to-get-ucaas-security-right\/","name":"How To Get UCaaS Security Right | RingCentral UK Blog","isPartOf":{"@id":"\/gb\/en\/blog\/#website"},"datePublished":"2022-08-09T09:03:22+00:00","dateModified":"2025-07-31T19:53:59+00:00","description":"he cost of a single data breach has significantly increased in recent years. In 2021, that cost reached an average total of \u00a33.48 million, an increas","breadcrumb":{"@id":":\/gb\/en\/blog\/how-to-get-ucaas-security-right\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[":\/gb\/en\/blog\/how-to-get-ucaas-security-right\/"]}]},{"@type":"BreadcrumbList","@id":":\/gb\/en\/blog\/how-to-get-ucaas-security-right\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"\/gb\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"\/gb\/en\/blog\/#website","url":"\/gb\/en\/blog\/","name":"RingCentral UK Blog","description":"RingCentral News and Tips","publisher":{"@id":"\/gb\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/gb\/en\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"\/gb\/en\/blog\/#organization","name":"RingCentral UK","url":"\/gb\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2021\/11\/ringcentral-logo.png","width":1921,"height":416,"caption":"RingCentral UK"},"image":{"@id":"\/gb\/en\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"\/gb\/en\/blog\/#\/schema\/person\/cc4f043d2b478862a8622c28b0ebd08c","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"\/gb\/en\/blog\/#\/schema\/person\/image\/","url":"\/gb\/en\/blog\/wp-content\/uploads\/2020\/03\/samantha-clayton-150x150.jpg","contentUrl":"\/gb\/en\/blog\/wp-content\/uploads\/2020\/03\/samantha-clayton-150x150.jpg","caption":"RingCentral Team"},"url":"\/gb\/en\/blog\/author\/ringcentral-team\/"}]}},"_links":{"self":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/24480"}],"collection":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/comments?post=24480"}],"version-history":[{"count":0,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/posts\/24480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media\/24501"}],"wp:attachment":[{"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/media?parent=24480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/categories?post=24480"},{"taxonomy":"post_tag","embeddable":true,"href":"\/gb\/en\/blog\/wp-json\/wp\/v2\/tags?post=24480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}