Is VoIP safe enough to ensure total privacy?

By Stan Baldwin
Updated: January 31, 2011

The short answer is “No!”. But that truth does not tell us what we need to know about VoIP security. “Total privacy” isn't available with a traditional hard-wired phone, as any number of books, movies and news stories have reminded us when they talk about “wire taps”. The better question is “Is VoIP safe enough to use for my business?” and the answer for just about everyone is “Yes.”.

The degree of information “safety” needed depends upon the kind of business and the type of information being transmitted. For most operations the “standard” security provided by commercial VoIP providers is adequate. The authentication, authorization and encryption technologies typically deployed make it impossible for the casual intruder to eavesdrop.

The most sensitive and valuable business information tends to be shared between a relatively small number of “known” members of an organization and their associates. Data such as operations figures, financial reports and personnel records are most often communicated between parts of a business, or with “trusted” parties outside the business. A basic, but powerful, protection technology involves Access Control Lists which can be set up on routers to permit or deny a group of addresses or specific addresses access to the resources within the business.

Access lists are usually included as one of the features of a firewall. Firewalls can have a static configuration or be “managed”. Managed firewalls are typically out-sourced services which update configurations, log the traffic and periodically report performance and security. For a small business, handing this extremely technical task off to a group of experts may be much more cost (and performance) effective than maintaining the arcane knowledge within the organization.

Firewalls can perform many other tasks intended to assure privacy and continuity of service, including protection against Denial of Service attacks, Area Code Blocks, Port Control and keeping a record of everything that passes through them. Sometimes simply reviewing the router logs, noting which addresses are talking to which, will expose a breach in security or misuse of business resources.

With all the sophisticated technology at our command, it's important to remember that one of the most effective privacy and security tools remains the creation of strong passwords by every user on your system. Unfortunately employees are far more difficult to “configure” than the equipment they use.

Featured Research
  • Is Your Phone System Stealing Profits?

    Having the wrong phone system can dramatically cut into your profits. Despite this, many businesses just sign up for a plan or platform that seems ‘good enough’. If you haven’t carefully considered your options and the included features, there’s a very good chance that you are leaving money on the table in some way. more

  • Phone System Technology Showdown

    VoIP and IP telephony are often misconstrued as being the same type of phone system, but the truth is they operate on different technology and deployment methods. This guide will explain the differences between VoIP and IP, go into the pros and cons of both VoIP and IP-PBX, and give insight into which type of phone system will benefit your business the most. more

  • Why Enterprises are Making the Switch to VoIP

    Your phone system is your most important business communication system. It allows you to connect with your employees, prospects, and clients. And wouldn't it be great if there was a solution that helped drive down costs while providing a competitive advantage? more

  • Business Phone System Buyer's Guide

    Communication has been a focal point in business since inception, but the industry is changing drastically in how people connect to one another and what tools and systems they use to do so. Less than 15 years ago, 90% of people relied on landline phone systems for communication. Today, less than 60% of Americans even have a landline and 40% rely solely on their mobile phone. more

  • Ditch Your Fax Servers

    An in-house fax server gives an IT department centralized management and monitoring over the entire enterprise's faxing. This can help your company track usage and better maintain records for auditing and record keeping. However, there are serious drawbacks that come with utilizing an in-house fax server solution and these range from security to cost-prohibitive pricing. more