VoIP News
VoIP Providers
VoIP Books
VoIP Software
VoIP Jobs
VoIP Events Calendar
VoIP FAQ
Archives
Contact
About
Redscan Publishes a Free Guide on Combating VOIP Security Threats
VOIP technology is becoming increasingly popular as businesses seek to provide employees with latest telephony services, connect remote workers and keep costs under control, but the associated security threats must be recognised and guarded against, according to a new guide from managed security company,
Redscan
.
The guide,
Securing Voice Over IP systems/a> sets out the major security risks that businesses which use VOIP systems and software can encounter.
Including:
Privacy concerns: the data from VOIP calls can be intercepted easily when compared to analogue calls. Businesses can mitigate the risk by taking security measures such as using individually firewalled vLANs and encrypting calls.
Access and authentication: there needs to be a strong authentication process in place. If a single password is used to identify a user it must be strong enough to discourage hackers.
Denial of Service attacks: VOIP networks are vulnerable to DoS attacks such as hackers flooding servers with connection requests - such attacks can bring down the entire system. Businesses that have an application firewall in place can protect themselves against these attacks.
Vishing: criminals have started using VOIP to carry out phishing campaigns, with some attacks being masked as coming from a trusted phone number. These attacks are likely to increase in sophistication and businesses must remain vigilant to avoid handing over any data to criminals.
The guide also covers; toll fraud; VOIP spam; replay attacks and traffic manipulation.
Simon Heron, Internet Security Analyst, Redscan says: VOIP brings many benefits to businesses such as reduced telephony costs, increased productivity and the flexibility of making and receiving calls to work numbers remotely, however, implementing VOIP systems and software does provide increased opportunities for cybercriminals to exploit security loopholes in corporate networks. Our guide highlights the main threats to businesses and provides advice on how managers can mitigate the risks associated with using VOIP.
Posted on Dec 01, 2010
Reviews
|
Share
|
Digg
Filed in:
Security
|
VoIP Reports
Related Entries
•
Security Researcher Demonstrates Enterprise VoIP Phone Hack at Recent Amphion Forum
•
Vertex Telecom Selects RedShift Networks as the VOIP/SIP Security Solution for Enterprise and Wholesale Customers
•
Report: The VoIP Market 2012-2017 - Prospects for Skype and Other Players
•
Report: Carrier VoIP and IMS Market Falls Back to Earth in Q2 after LTE-Inspired Boost
•
Rebtel Mobile Device Survey Shows that 20 Million American Smartphone Owners Spend Approx. $37.8B Annually On International Calls
•
Report: ''Global VoIP Revenues to Reach $65 Billion in 2012''
All comments require the approval of the site owner before being displayed.
Post a Comment
Please use a valid e-mail address. Your address will not be publicly visible and is only a means for us to contact you when asked. Thank you.
Name
E-mail
(will show your
gravatar
icon)
Home page
Remember Me
Comment (Some html is allowed:
)
Enter the code shown (prevents robots):
All brand, company, and product names are trademarks or registered trademarks of their
respective owners. © 2012 VoIP Monitor. All rights reserved.
Privacy Policy
Terms
SUBSCRIBE
Subscribe to our RSS feed
Bookmark VoIPMonitor.net
Subscribe to our newsletter via email
News Categories
Asterisk
Bluetooth Headsets
E911
General
Hardware
Investments
iPad
iPhone
Mergers and Acquisitions
Mobile VoIP
Offbeat News
Security
SIP
VoIP Advice
VoIP Awards
VoIP Bloggers
VoIP Books
VoIP by Region
Africa
Asia
Australia
Europe
Middle East
North America
South America
VoIP Events
VoIP Jobs
VoIP Products
VoIP Promotions
VoIP Providers
ATT
Fusion
Google Talk
Lingo
MCI
MSN Messenger
Net2Phone
Packet8
Phone Power
Pingo
Qwest
RingCentral
SBC
Skype
SunRocket
Verizon
ViaTalk
Vonage
Yahoo Messenger
VoIP Reports
VoIP Software
VoIP Solutions
VoIP Wireless
WiFi
VoIP Information
Tom Keating
Alec Saunders
Andy Abramson
Garrett Smith
Jeff Pulver
Om Malik
Thoughts on VoIP
Solomon's VoIP World
VoIP Weblog
VoIP Guide
Archives
May, 2013 (2)
December, 2012 (3)
November, 2012 (7)
October, 2012 (19)
September, 2012 (5)
August, 2012 (10)
July, 2012 (24)
June, 2012 (18)
May, 2012 (28)
April, 2012 (20)
March, 2012 (16)
February, 2012 (12)
January, 2012 (12)
November, 2011 (21)
October, 2011 (28)
September, 2011 (23)
August, 2011 (26)
July, 2011 (26)
June, 2011 (38)
May, 2011 (59)
April, 2011 (49)
March, 2011 (67)
February, 2011 (68)
January, 2011 (54)
December, 2010 (45)
November, 2010 (43)
October, 2010 (47)
September, 2010 (43)
August, 2010 (32)
July, 2010 (28)
June, 2010 (39)
May, 2010 (46)
April, 2010 (36)
March, 2010 (52)
February, 2010 (45)
January, 2010 (44)
December, 2009 (41)
November, 2009 (46)
October, 2009 (54)
September, 2009 (58)
August, 2009 (29)
July, 2009 (36)
June, 2009 (32)
May, 2009 (32)
April, 2009 (13)
March, 2009 (47)
February, 2009 (37)
January, 2009 (53)
December, 2008 (44)
November, 2008 (56)
October, 2008 (51)
September, 2008 (50)
August, 2008 (41)
July, 2008 (50)
June, 2008 (52)
May, 2008 (53)
April, 2008 (64)
March, 2008 (59)
February, 2008 (53)
January, 2008 (65)
December, 2007 (39)
November, 2007 (33)
October, 2007 (65)
September, 2007 (29)
August, 2007 (52)
July, 2007 (49)
June, 2007 (59)
May, 2007 (64)
April, 2007 (43)
March, 2007 (66)
February, 2007 (100)
January, 2007 (108)
December, 2006 (86)
November, 2006 (100)
October, 2006 (86)
September, 2006 (55)
August, 2006 (31)
July, 2006 (76)
June, 2006 (79)
May, 2006 (87)
April, 2006 (45)
March, 2006 (55)
February, 2006 (55)
January, 2006 (56)
December, 2005 (53)
November, 2005 (61)
October, 2005 (13)
September, 2005 (42)
August, 2005 (57)
April, 2005 (57)
March, 2005 (21)
February, 2005 (15)