As unified communications (UC) adoption grows, so too do the bad actors who prey on vulnerabilities. The source of vulnerabilities stem from a lack of understanding risks and subsequent lack of best practices to address UC security threats. When a ...