- Date: 24 April 2017
Is your phone system connected to a network? If you’re using a VoIP or cloud-based phone solution, you’ve already discovered the cost-effectiveness and convenience of a scalable network phone solution. But just as email has shown us, threats to VoIP systems is no laughing matter. It’s of particular interest in the UK, which has seen nearly two-thirds of all cybersecurity breaches occur through VoIP servers.
What are the most common forms of attacks against phone systems and what can businesses do to prevent phone and voicemail breaches in their organization? Read on:
Common Threats to Phone Systems
- Distributed Denial of Service (DDoS) – These attacks involve spam and viruses designed to disrupt service, slowing your connection and keeping legitimate parties from accessing their voicemails and phone systems.
- Privacy compromises – Whether by disruptions, intrusions, or hijacking of personal data, hackers can access private networks and systems by capturing sensitive data like passwords and usernames on your network.
- Service disruptions – Malicious actors can track your IP numbers and access your systems to run scam operations over long distances, passing the costs along to the owner.
- Vishing/Phishing – By hijacking your phone system, unknown parties can place calls using your numbers to contact business partners or trusted organizations in an attempt to access confidential information.
- Spamming via VoIP – Also known as SPIT, Spamming over Internet Telephony is the phone equivalent of spam emails. As more businesses move to web-based phone systems, the threat of SPIT attacks bring viruses, malware, and worms to integrated network systems to try and gain access to further levels of sensitive data.
What Businesses Can Do to Protect Themselves
- Regular Security Audits – There’s nothing more important than checking your wall for cracks on a routine basis. No matter how sophisticated your system or security software, you should always review firewall settings, keep abreast of changing encryption standards, and enforce strict user authentication practices – including regular updates to user passwords.
- Use a VPN – A Virtual Private Network (VPN) can be used alongside your existing web-based phone system to encrypt all data transferred across your network and into the wider web.
- Deploy a VoIP-Friendly Network – Not all internal network infrastructure is best suited to accommodating an Internet telephony solution. Check with your IT department to ensure your routers and switches are up-to-date and ready to accommodate current VoIP security measures.
- Monitor Network Traffic 24/7 – A recent study shows that 88% of all VoIP and phone-based attacks occur outside of working hours to avoid detection. If you use a third-party or managed IT service, you can monitor your network even when your internal IT team isn’t at their desks.
- Adopt a Cloud-Based System – Using a fully cloud-based voicemail solution for your business won’t just secure your communications, it’ll provide a written transcription of all voicemails for access across your many devices. For more information, contact Phone Cloud Hub today.