VoIP is extremely cost effective and can be accessed nearly everywhere, from businesses and at-home offices to mobile use. It requires none of the hardware investments of the traditional on-premise POT (plain old telephone) systems of the past.
Because VoIP requires Internet infrastructure to send and receive voice communication, it can face some of the same security issues online users have experienced with their computers.
Firewall
A successful disaster recovery plan requires that your VoIP phone system protection is included in the network’s firewall settings. A VoIP firewall is an application that defines whether to allow or deny certain calls. To provide superior quality, the firewall must be not only reliable, but durable with no latency to voice traffic.
A VoIP firewall or application firewall protection should be part of any VoIP managed plan. These firewalls should support common VoIP protocols including H.323, Session Initialization Protocol [SIP] and Network Address Translation [NAT], which assigns a public address to a computer inside a private network.
Passwords
Put simply, passwords help prevent security breaches. No matter the size of your company, it is important to educate one’s staff on best practices pertaining to password usage. CEO’s or IT techs need to monitor and track unauthorized conversations to eliminate abnormalities or spikes. It is important to view and identify employees who are using the system and assuring their online communications are in accordance with the companies guidelines.
WI-FI
WPA2 [aka Wif-Fi Protected Access] now provides a stronger data protection and network access control than its predecessor, WPA.
WPA2 provides a high level of assurance that only authorized users can access their wireless devices and networks.
There are presently two versions of WPA2; WPA2-Personal, and WPA2-Enterprise. WPA2-Personal will protect unauthorized network access by issuing a “set-up” password. WPA2-Enterprise verifies network users directly via a server.
Stay tuned tomorrow when we will discuss DDoS, Phantom Calls and more about security.