How Safe is Hosted VoIP?

By Jelani Harper
Updated: September 15, 2011

How Safe is Hosted VoIP?

In many respects, hosted VoIP service can rightfully be considered safer than that of the on-premise variety, for the simple fact that proper vigilance of a VoIP system requires continuous monitoring which an outsourced vendor should ideally have the resources, equipment and personnel to do. The crux of this premise, however, lies in determining that such a service provider is adequately prepared (and willing to indicate so) to deal with the myriad threats which hosted VoIP is vulnerable to. Additionally, there are other security measures users of hosted VoIP can employ to assist in ensuring the safety of their networks.

Vendor Criteria

As the procuring and employment of security sufficient to effectively monitor VoIP service from external and internal threats can be expensive, it is frequently to the user’s advantage to simply pay for this service as part of its monthly fee for utilizing hosted VoIP. However, it then becomes prudent to determine that the vendor selected has the tools and the wherewithal to adequately protect the interests of its customers from security violations.

Hosted providers should have tools such as firewalls with added functionality specific to VoIP, as well as sophisticated intrusion-prevention systems that can be configured for VoIP threats. Additionally, Virtual private networks can allow voice traffic to be encrypted and transmitted over secure pathways. It may be useful to have vendors share an audit trail from an independent auditor to prove the security of their systems.

User Security

Such service provider methods of security can also be augmented by a number of methods that end-users can utilize. Anti-virus software can always be purchased and implemented by hosted VoIP users, while a particularly effective method of supplementing vendor security measures is to separate voice and data traffic into their own LANs. By utilizing virtual networks to transmit the information from the single physical network into respective ones for data and voice traffic, users can hone in on voice data more effectively to monitor specific activities that may pose threats.

Nature of the Threat

While the prudent application of security measures by both hosted VoIP vendors and their users greatly decreases the likelihood of security breaches, it should be understood that hosted VoIP faces many of the same sorts of malicious intrusions that on-premise VoIP does. Common threats include systemically distributed denial of service attacks (in which service is inaccessible), as well as hackers tapping calls, accessing other network components, and making free calls on the user’s service.
 

Featured Research
  • How VoIP is Transforming the Healthcare Industry

    The healthcare industry, like many industries, is in the midst of an era of rising costs and an ever increasing pressure to drive down expenses. Now, what if we were to tell you that there was a simple solution to these problems? The answer is VoIP. And to make it sweeter, it allows for your hospital staff to utilize modern mobile devices as resources instead of antiquated phone systems. more

  • [Infographic] 8 Common Pain Points UC Eliminates

    Every company has moments of frustration, it is when these moments become extended periods of inefficiency, or pain points, where we start to see loss in productivity and employee morale. What truly sets a successful business apart from those of its competitors, is how they take these pain points and use them as opportunities to improve upon procedures and systems to eliminate pain points and move beyond what was the status quo. more

  • Go VoIP and Go Green

    You may be looking to switch to VoIP because of the cost benefits that it will bring your company, but did you know that it is also FAR BETTER than traditional phone systems for the environment as well? With environmental impact being at the forefront of both consumer and business minds, it is essential that business decisions are made now based on economic AND ecological impact. more

  • eGuide: Comparing UC Vendors

    Changing your company’s business communications solution is an investment in time and money that will touch everyone in your organization. A successful unified communications (UC) deployment should streamline everyone’s work flow, simplify IT operations and deliver a lowered total cost of operations. Your company deserves nothing less. more

  • Getting More from Your VoIP System

    Too many businesses fall into the trap of setting up their VoIP as a "plug and play" and getting to work. However, we have found that this thinking only leads to businesses failing to get the most out of their VoIP experience. We have put together an in-depth guide that will walk you through 15 easy steps to get more out of your system. more