Identifying and defending your system from vulnerabilities

VoIP Security: Identifying and defending your system from vulnerabilities

First we had viruses, then rootkits, now we have ransomware.  One thing is certain, the next bit of malware technology is currently under development and be with us soon. Even systems like VoIP are under attack and are being used as portals to gain access to corporate information. 

What kind of threats are currently being seen in VoIP systems and how are they to be countered? 

The first thing to understand that because VoIP is based on IP technologies it is vulnerable to all the malware and attack techniques that are inflicted on IP networks.  The second is that VoIP goes over the Internet, and while you can contain and manage IP security in your internal closed corporate network, you are at the mercy of third-party service providers of varying quality in their security systems.  The third, and one often forgotten, is that all devices in the VoIP network are IP devices and are therefore vulnerable to all the threats found with other IP devices. That must be factored into the overall data and voice protection scenario.Continue reading