7 VoIP Best Practices for Security

Andy DeAngelis
March 7, 2017

VoIP best practice for securityYou expect your VoIP phone system to substantially reduce costs, increase efficiency, support mobility, drive scalability, and enhance customer satisfaction. However, a critically important priority that must be top-of-mind at all times is robust protection. To that end, here are 7 VoIP best practices for security: 

VoIP Best Practice for Security #1: Enforce SIP Authentication

It is extremely important to enforce SIP Authentication for all VoIP endpoint devices on three levels: valid SIP URI, authenticating username, and strong pseudo-random password.

VoIP Best Practice for Security #2: Use Network Encryption

Ensure that the wireless network uses only WPA-2 encryption and WPA password security. At the same time, verify that all employees who access the system and network through their smartphone, tablet, laptop or desktop have suitable encryption protection in place. An insecure or easy-to-hack network is a disaster waiting to happen!

VoIP Best Practice for Security #3: Secure Device Provisioning

It is necessary to ensure that all devices are properly and securely provisioned in the network. This process includes: eliminating insecure file transfer protocols; limiting network access only to trusted parties; disabling administrative interfaces; changing default passwords; disabling SSH and HTTP interfaces on embedded Multimedia Term Adapters (eMTAs); and implementing an access list to eliminate unauthorized SIP requests (this is important for thwarting DDoS attacks on the eMTA).

VoIP Best Practice for Security #4: Only Use Strong Passwords

Voice portal passwords should not be sequential, repeated numbers, or have an association to the phone number or extension. That is the first thing that hackers attempt to exploit!

VoIP Best Practice for Security #5: Conduct Regular Security Audits

On a regular basis, conduct a security audit to check for vulnerable passwords, international forwarding, and accounts that lack authorization.

VoIP Best Practice for Security #6: Use Monitoring Algorithms & Fraud Detection Software

Use tools that analyze call detail records on an ongoing basis (at least every 5 minutes), and that support customized fraud detection limits so there are no false positives for appropriate use (e.g. international dialing, legitimate calling patterns, etc.).

VoIP Best Practice for Security #7: Automatic Shut-Off

Ensure that the system automatically suspends service without the need for human intervention if unusual activity or traffic is detected. This is vitally important to avoid risks such as toll fraud and unauthorized international calling.

Learn More

At Votacall, we work closely with all of our customers to ensure that each and every one of these VoIP best practices is part of the overall security plan. Plus, our expert team monitors the system 24/7/365, and takes immediate action in the event of a possible or actual data leak or security breach – whether it is caused by accident, misuse, or the result of a cyber attack.

To learn more, contact us today and schedule your complimentary consultation. For more information on hosted VoIP and the truth behind common myths, download our FREE eBook:

Debunking Hosted VoIP Myths eBook download

Subscribe by Email

No Comments Yet

Let us know what you think