« Animation about Voice/VoIP/UC Security Attacks | Main | Fraudsters Busted for Attacks on Bank of America »

August 23, 2012

Comments

Virtual PBX

It is amazing to see that people will over look security in the name of saving a few dollars. Do they not realize that VoIP Business Phone Systems are attached to their network? And they are a vulnerability into the network, and could be exploited!

Mike / CCVP, CCSP, CCNP, CCDP

Securing VoIP is INVESTMENT. Sometimes it's money, sometimes it's time, sometimes it's both. Some simple stuff may be done at the planning phase (who can call where and when), some stuff should be monitored constantly (for example do not allow call forwarding on some phones). And some stuff may be very costly (for example, installing firewalls, IDS/IPS, etc.). But there SHOULD be a security (at least at the "common sense level").

Mark Collier

I agree. Quite a few security measures are quite easy and inexpensive to implement. Some others, such as perimeter application security may involve an expense, but are warranted based on where the threat is now and where it will be in the near future.

Thanks for the comment

security systems

I would like to thank you for the efforts you have made in writing this post. I am hoping the same best work from you in the future as well. In fact your creative writing abilities has inspired me to start my own blog now.

Ip phone system waco

VoIP Business Phone is good investment in security measures.People need security in their systems and in office.

Thanks for sharing valuable information.

Security Options

Cisco is a good option for handling security. We've put some thought into this and sometimes it's necessary to consider spending some money.

Henry Fernandes

Thank you for your nice post. I think Cisco is a good option for handling security.

starting a small business

cisco probably one of the best choice for security, and maybe the most trusted brand when it comes to voip products and services

Dana

Secure VOIP connection is accomplished by using device or system certified by the National Security Agency (NSA).

The comments to this entry are closed.

My Photo

Search Blog

  • Search Blog
    Google

    WWW
    voipsecurityblog.typepad.com

Become a Fan

Telephony Denial of Service (TDoS)