Wanna subscribe to our blog?
Get updates once a month.
Wanna subscribe to our blog?
We'll send you updates once a month.
You expect your VoIP phone system to substantially reduce costs, increase efficiency, support mobility, drive scalability, and enhance customer satisfaction. However, a critically important priority that must be top-of-mind at all times is robust protection. To that end, here are 7 VoIP best practices for security:
It is extremely important to enforce SIP Authentication for all VoIP endpoint devices on three levels: valid SIP URI, authenticating username, and strong pseudo-random password.
Ensure that the wireless network uses only WPA-2 encryption and WPA password security. At the same time, verify that all employees who access the system and network through their smartphone, tablet, laptop or desktop have suitable encryption protection in place. An insecure or easy-to-hack network is a disaster waiting to happen!
It is necessary to ensure that all devices are properly and securely provisioned in the network. This process includes: eliminating insecure file transfer protocols; limiting network access only to trusted parties; disabling administrative interfaces; changing default passwords; disabling SSH and HTTP interfaces on embedded Multimedia Term Adapters (eMTAs); and implementing an access list to eliminate unauthorized SIP requests (this is important for thwarting DDoS attacks on the eMTA).
Voice portal passwords should not be sequential, repeated numbers, or have an association to the phone number or extension. That is the first thing that hackers attempt to exploit!
On a regular basis, conduct a security audit to check for vulnerable passwords, international forwarding, and accounts that lack authorization.
Use tools that analyze call detail records on an ongoing basis (at least every 5 minutes), and that support customized fraud detection limits so there are no false positives for appropriate use (e.g. international dialing, legitimate calling patterns, etc.).
Ensure that the system automatically suspends service without the need for human intervention if unusual activity or traffic is detected. This is vitally important to avoid risks such as toll fraud and unauthorized international calling.
At Votacall, we work closely with all of our customers to ensure that each and every one of these VoIP best practices is part of the overall security plan. Plus, our expert team monitors the system 24/7/365, and takes immediate action in the event of a possible or actual data leak or security breach – whether it is caused by accident, misuse, or the result of a cyber attack.
To learn more, contact us today and schedule your complimentary consultation. For more information on hosted VoIP and the truth behind common myths, download our FREE eBook:
No Comments Yet
Let us know what you think