How to Secure a UC System