Like any complex computer system, VoIP/UC networks have present unique security challenges. Despite many attempts to formulate best security practices for VoIP/UC solutions within an enterprise, such best practices are not always enforced or correctly followed.