Sponsored By

Assuring Security in a Hyper-connected WorldAssuring Security in a Hyper-connected World

As disruptive as real-time communications is proving, it'll pale against cybercrime.

David A. Walsh

January 11, 2018

4 Min Read
No Jitter logo in a gray background | No Jitter

Disruption is happening all around us in the incredibly fast-moving world of real-time communications. Prime examples include the movement to telco cloud, full network functions virtualization environments, and software-defined networking inside enterprises. Other examples of disruption include the embedding of voice and video messaging into business applications, as well as the rise of artificial intelligence (AI), Internet of Things (IoT), biometrics, and more.

Yet even as we change the channels, connecting and communicating in so many creative ways, we know one of the biggest disruptors of all is likely to be challenges presented by cybercrime.

Do the math, and you'll see the disruption is inevitable. The more connected we are as people and as people interacting with things and systems, the more opportunities there are for invasions of our privacy, identity, and assets.

Targeting Voice
The expansion of the "attack surface" is growing as fast as the number of endpoints, clouds, mobile apps, Web apps, and the application programming interfaces that glue a lot of software together.

And while the media has devoted a ton of emphasis and coverage to massive breaches of databases connected over what enterprises thought were secure data networks, it's paid less attention to one of the fastest-growing areas of vulnerability -- attacks on voice and video applications.

VoIP services aren't immune to data theft. In 2015, one major breach compromised 70 million records across 37 states and went largely unreported. The breach affected 14,000 phone recordings, including confidential attorney-client conversations.

The Communications Fraud Control Association says international revenue-sharing fraud (one of the most prevalent types of telecom fraud) costs global service providers nearly $11 billion annually. This type of activity consists of fraudsters utilizing illegal resources to gain access to an operator's network in order to bring traffic to phone numbers obtained from an international premium rate number provider.

The value of extracting information by listening in is growing in parallel, considering the increased ease of conversing via over-the-top messaging platforms along with the rise in conference calls, including those during which enterprise professionals discuss confidential strategies, transactions, and deals.

And so are "pivot attacks" in which hackers use voice or video systems to tunnel into databases or to initiate malware or ransomware attacks.

Think about contact centers where live agents take credit card and other personal information over the phone. Cybercrime is a multitrillion-dollar global industry on its own, not because cybercriminals are stupid or underfunded. They're increasingly sophisticated and make their own capture nearly impossible as they understand how to make their own communications deeply dark.

Think about healthcare records, which privacy regulations like HIPAA in the U.S. and similar laws globally aim to protect. Making healthcare more available and far less expensive through telemedicine applications has enormous value, but unlocking that value will be challenging when voice, video, and messaging between physicians and patients can be hacked because the security software hasn't been built into the real-time communications platforms and networks.

Think about trading; negotiating the exchange of equities, derivatives, bonds, currencies, commodities, and more; and the movement to blockchain systems, which are starting to displace traditional currencies with cryptocurrency. Talk about disruptive! Who are the new "Barbarians at the Gates" when our global financial exchanges are having to adapt to innovation in real time, reduce their operational costs, improve quality and transparency, and comply with tighter regulations, including the upcoming General Data Protection Regulation (GDPR) going live in the EU next May?

Security-First Thinking
Voice, video, and messaging security today and forever will require building security into applications, not just relying on traditional encryption and firewalls. Given that enterprises are driving everything forward digitally, information and communications are part of everything we do -- and just as networking can no longer be an afterthought, enterprises are moving from cloud and mobile-first strategies to "security first."

The world is moving rapidly toward new security paradigms, including "authenticate first, connect second" (rather than the other way around). But this and other approaches can't slow down performance or increase cost. In addition, they must comply with much stricter privacy laws, which vary from region to region and country to country, and be built to last.

New services must be secured within the context of our new architectures, and strong enough to withstand not only attacks, but massive fines that will be levied against any enterprise or enterprise partner that doesn't comply and experiences a privacy breach.

In the case of GDPR, the highest-level parent company can be fined 4% of its total annual revenue. So, for example, a technology giant could acquire a small IoT company and sell a smart product controlled by Alexa voice activation, but for whatever technical reason makes it possible for a cybercriminal to steal private information. The technology giant's risk is in the billions for the fine alone, not to mention the cost in reputational harm.

There should be no quality voice, video, or other messaging service in the future without security as part of its DNA, and as part of its ability to co-exist with applications. Enterprises and service providers can disrupt and be disrupted unless they put security first inside of everything they offer.

About the Author

David A. Walsh

David A. Walsh is the Founder of the Kandy Communications Cloud Solutions for Ribbon Communications.
Previously, David was President and CEO of GENBAND prior to its merger with Sonus. He joined the GENBAND Board upon the merger of NextPoint (an OEP portfolio company) with GENBAND in 2008. He assumed the position of GENBAND Chairman in 2010 following the acquisition of the Nortel Carrier VoIP and Application Solutions business. Prior to that he was a Managing Director of One Equity Partners (OEP). David has served on the Board of Directors of Aligned Energy LLC, and as Chairman of Netas Telekomunikasyon A.S., Turkey's leading IT services business. David was appointed the Chairman of PledgeMusic in June 2017, which is a unique marketplace where fans and artists connect.

David has also served on the Board of Directors of Telwares Inc. and SAVVIS. He was Chairman of WestCom Corporation and Telerate, Inc. (formerly Moneyline Telerate, Inc.). David was also a member of the Board of Directors of IPC. In addition, he founded IXnet, Inc. in 1993 and served as its Chief Executive Officer and Chairman until its sale to Global Crossing Ltd. in 1998, at which time he became President and Chief Operating Officer. He founded Voyager Networks in 1993 and sold it to Global Center in 1998, which subsequently merged with Frontier Communications.

David received a bachelor degree in Business Administration from Valdosta State College and master's in Telecommunications from New York University.