Security isn’t just about big men with intimidating body language standing outside of clubs anymore. It’s about protecting your company’s information, at all hours of the day or night, from criminal computer nerds. RingCentral takes this band of ill-meaning, anonymous hackers very seriously, as you can see from its comprehensive security system. From passwords to encryption to disaster plans, it’s all here.
Users can manage their own security system on their end in a few ways. They can disable or allow calls to specific countries to avoid accidental fees. They can also block certain numbers from calling in, a well as manage user permissions for employees. By giving system access to only a select few and controlling who can call in, you can make sure you are protected inside and out.
Passwords and PINs
RingCentral recently upgraded their password and PIN requirements to make it more difficult for hackers to breach customer systems. Passwords are now required to contain both letters and numbers, and a 6-10 digit PIN is needed for specific interactions, such as phone support. The extra precaution ensures that even acquiring a password isn’t enough to completely breach your account.
Toll Fraud Protection
Toll fraud is when hackers gain access to your PBX account and use it to make their own calls. This growing area of fraud costs an estimated annual $1.2 billion in the US alone. For RingCentral customers on the metered Standard and Premium plans, toll fraud could result in astronomical bills, especially since many toll fraud hackers hail from other countries.
Never fear! RingCentral screens customer accounts to prevent toll fraud, catching crooks before they can suck away your precious minutes. They actually have a dedicated full-time security and fraud prevention department that does this.
Encryption and Infrastructure
Here is where all of the tech mumbo-jumbo comes into play. Suffice it to say that RingCentral takes no shortcuts when it comes to security. SSL v3/TLSv1 (Secure Sockets Layer/Transport Layer Security) provides encryption during data transmission, and network access requires dual-level authentication. Within the infrastructure, anti-fraud and theft technology protect against would-be hackers. It might be easier to get into Mordor than to hack RingCentral.
RingCentral utilizes a fully redundant network with multiple geographical locations, so you will continue to receive service even if one data center goes down (which is, in and of itself, highly unlikely). Each of these data centers is regularly inspected and fits the audit requirements of two recognized assurance audit organizations.
In Case of Emergency
Through a complex web of primary and secondary backup locations, RingCentral ensures that your data is always backed up. The secondary backup is always on standby, ready to take over if needed. Data is always duplicated to more than one of RingCentral’s many data centers, so one catastrophe won’t take out your data.
Whether you afraid of data loss, minute-sucking hackers, or just the occasional solicitation call, RingCentral will keep you protective. Its extremely comprehensive security plan is impressive to say the least.
Latest posts by Christina Sterling (see all)
- Compare RingCentral and 8×8 - February 3, 2014
- RingCentral Meetings: Better than Google Hangouts and Skype - January 27, 2014
- Compare RingCentral and Jive - January 21, 2014