Unseen Exits: Tracking Data Leakage in the Age of UC Collaboration

UC Today's Kristian McCann sits down with Bob Pruett, Senior Solutions Architect at Myriad360, to tackle one of the most underappreciated security risks in modern business

Unified Communications & CollaborationInterview

Published: May 6, 2026

Kristian McCann

In this interview, UC Today’s Kristian McCann sits down with Bob Pruett, Senior Solutions Architect at Myriad360, to tackle one of the most underappreciated security risks in modern business: data leakage through everyday collaboration tools. Most organisations have firewalls, permissions, and email controls in place β€” but nothing for the conversation happening right now in Teams, Zoom, Slack, and Google Chat? Data leakage isn’t a new problem, but the way it happens in 2026 looks almost nothing like it did five years ago.

Key Topics:

The real-time problem changes everything. Voice and chat can’t be paused for inspection the way email can. If sensitive data is shared in a live call or instant message, it’s gone before any traditional DLP tool can react β€” making prevention and policy far more important than detection after the fact.

Passwords and API keys are leaking through chat. One of the most common and overlooked risks Bob flags is credentials being shared in what employees assume are private conversations. Those messages are logged, searchable, and far more permanent than the post-it note people think they’re replacing.

Your policies don’t follow you across platforms. If you’re on Zoom, Teams, Google Chat, and Slack in a single day, your security settings only apply to calls you initiate. The platform the other person starts controls the rules β€” including whether the call is transcribed, recorded, or shared.

Tools exist β€” most companies just haven’t deployed them. Bob highlights Truffle Hog as a practical starting point for finding leaked secrets in chat logs, alongside built-in platform features that most organisations simply haven’t switched on. The gap isn’t tools β€” it’s awareness and policy.

For more on UC security, compliance, and collaboration strategy, visit UC Today. Join the UC Today LinkedIn community at linkedin.com/groups/9551264 Subscribe to the newsletter at uctoday.com/register to stay ahead of the risks shaping the industry.

Collaborative Work Management
Featured

Share This Post