How Secure is Your VoIP Network

By Jelani Harper
Updated: September 15, 2011

How Secure is Your VoIP Network

Security has long been a topic of concern for VoIP users, particularly those who employ VoIP service over networks with valuable customer and proprietary company information. Common threats to security for such networks involve both authentication-related and privacy issues, many of which are similar to those for any sort of data transmission system and which have, for the most part, similar solutions. Denial of service attacks or network security leaks are most susceptible in areas in which specific ports in an organization’s firewall must open to permit transmission of voice data packets, in which there are IP PBXs, and in which gateway technologies are employed.

Open Ports

Due to the fact that a network’s firewalls must be opened at certain ports to allow transmission of VoIP data, prudent security measures to compensate for this occurrence include the encryption of the entire computer network, which will enable VoIP transmissions to be encrypted as well. The encryption of internal VoIP traffic should significantly reduce insider attacks, while it is useful to separate and isolate voice traffic onto a virtual LAN and run the encrypted VoIP traffic over a virtual private network for external communication. Other effective means of compensating for open ports is to turn off VoIP protocols that aren’t currently being used by the network to seal those points of entry.

IP PBXs

IP PBXs, which are largely server-based and are used for logging call information as well as for facilitating VoIP service through an internal or a proprietary operating system, are frequently vulnerable to a number of infiltrations and viruses. Hacking into these areas can result in substantial compromising of valuable information, which is why it’s best to keep such equipment frequently monitored with intrusion detection systems and securely placed behind firewalls. Other security measures for IP PBXs include patching them against vulnerabilities and separating their domain from that of other servers to deny internet accessibility to them. It may even be useful to grant limited administrative access to their servers.

Gateway Technologies

These technologies also provide a means through which hackers may infiltrate a VoIP system and make free phone calls. The external use of VoIP requires gateway technologies to convert data packets from the IP network into voice information which is then sent over a public switched phone network, which allows infiltrators to the ability to modify, store, identify, and play back the traffic transmitted through the network. The key to compensating for this particular vulnerability is to restrict access control lists and configure the gateway so that only approved users have the ability to utilize voice calls.
 

Featured Research
  • Better Together

    It is absolutely essential to the success of your business to employ excellent communicators AND provide them with the support that they need in order to be successful. When you pair your VoIP phone system with UC, you can create a seamless, centralized communication system that your teams can use to collaborate in any medium they choose. more

  • Mobile Communication Showdown

    It's no secret that businesses are becoming agiler and employees are spending more time away from their desks. The question isn't should we get rid of our landlines, but how quickly can we replace them?However, staying connected with your colleagues, clients, and customers is absolutely essential for cultivating long-term, lucrative relationships that will help your company achieve success. more

  • The Best Business Phone Systems in 2017

    71% of people say they are more creative of people when they are able to collaborate on teams. Collaboration is essential to business success and has never been more impactful than today. As the number of conversations outside of face-to-face meetings and travel increases, it is important for you to invest in a phone system that will allow your business to flourish. more

  • The Future of VoIP Security

    Looking to invest in a VoIP system? With the fantastic strides that have occurred in communication technology one thing to keep in mind is there has also been an increase in concerns surrounding security. As an example of this, in the third quarter of 2016 alone, there were over 18 million malware samples captured. more

  • Impressive VoIP Features for Business Growth

    Great communication is an important building block of business success. Let this sink in, through a simple internet connection, you can connect with people around the globe, from where you are at that moment. All of this is possible with a VoIP phone system, and if you don't have one you should be seriously be considering getting one. more