How Secure is Your VoIP Network

By Jelani Harper
Updated: September 15, 2011

How Secure is Your VoIP Network

Security has long been a topic of concern for VoIP users, particularly those who employ VoIP service over networks with valuable customer and proprietary company information. Common threats to security for such networks involve both authentication-related and privacy issues, many of which are similar to those for any sort of data transmission system and which have, for the most part, similar solutions. Denial of service attacks or network security leaks are most susceptible in areas in which specific ports in an organization’s firewall must open to permit transmission of voice data packets, in which there are IP PBXs, and in which gateway technologies are employed.

Open Ports

Due to the fact that a network’s firewalls must be opened at certain ports to allow transmission of VoIP data, prudent security measures to compensate for this occurrence include the encryption of the entire computer network, which will enable VoIP transmissions to be encrypted as well. The encryption of internal VoIP traffic should significantly reduce insider attacks, while it is useful to separate and isolate voice traffic onto a virtual LAN and run the encrypted VoIP traffic over a virtual private network for external communication. Other effective means of compensating for open ports is to turn off VoIP protocols that aren’t currently being used by the network to seal those points of entry.

IP PBXs

IP PBXs, which are largely server-based and are used for logging call information as well as for facilitating VoIP service through an internal or a proprietary operating system, are frequently vulnerable to a number of infiltrations and viruses. Hacking into these areas can result in substantial compromising of valuable information, which is why it’s best to keep such equipment frequently monitored with intrusion detection systems and securely placed behind firewalls. Other security measures for IP PBXs include patching them against vulnerabilities and separating their domain from that of other servers to deny internet accessibility to them. It may even be useful to grant limited administrative access to their servers.

Gateway Technologies

These technologies also provide a means through which hackers may infiltrate a VoIP system and make free phone calls. The external use of VoIP requires gateway technologies to convert data packets from the IP network into voice information which is then sent over a public switched phone network, which allows infiltrators to the ability to modify, store, identify, and play back the traffic transmitted through the network. The key to compensating for this particular vulnerability is to restrict access control lists and configure the gateway so that only approved users have the ability to utilize voice calls.
 

Featured Research
  • 8 Ways to Get More From Your VoIP System

    Many businesses adopt VoIP to take advantage of the cost savings without spending enough time reviewing the features and benefits made available by different solutions. If this is true for your business, there’s a good chance you could be getting more from your VoIP system in the form of even lower costs or improved employee productivity. You may even find that your current software offers features that you aren’t taking advantage of! more

  • 7 Ways the Wrong Phone System Can Haunt Your Business

    The wrong phone system could be haunting your business - and we’re talking about problems more serious than ghosts and ghouls. From increased costs to issues with scaling, we’ve identified seven important ways that a less than ideal phone system could be holding you back. You’ll be surprised at how much of a difference this can make to your bottom line too. more

  • Ditch Your Fax Servers

    An in-house fax server gives an IT department centralized management and monitoring over the entire enterprise's faxing. This can help your company track usage and better maintain records for auditing and record keeping. However, there are serious drawbacks that come with utilizing an in-house fax server solution and these range from security to cost-prohibitive pricing. more

  • The IT Manager's Survival Guide

    As an IT manager, maintaining physical fax servers and infrastructure is not a high priority. However, fax capability remains a business need simply because chances are your industry is dependent on its security. What if there was a way to reduce the amount of time spent handling fax complaints and maintaining physical servers? And this way took into account security, cost savings, and freed up your IT resources. Would you be interested? more

  • VoIP: Your New Secret Weapon for a Strong Year End

    As the end of 2017 nears, you may be feeling pressure to make sure you close the year out strong.If you’ve been sitting on the fence regarding VoIP, this may be the perfect time to switch. VoIP options had never been better or more full-featured than they are now, and it may be just the thing your business needs to see a productivity and profitability boost. more