The Dos and Don'ts of Securing Your VoIP Communications

Like every other cloud-based, internet-connected application running within your business, Voice-over-IP (VoIP) apps require comprehensive security. Whether it's ensuring secure user authentication and network configuration or enabling end-to-end encryption in all VoIP communication and data storage, organizations need to be diligent in both overseeing IT management and working closely with their business VoIP provider to ensure that security requirements are being met and enforced.

The Top 5 VoIP Security Risks and Their Controls

Businesses often ponder on the reliability and overall quality of VoIP telephony system. This is a major concern which leads such businesses to consider the dangers of data security risks. In spite of the few controversial security breaches in the past, VoIP technology has advanced and transformed into a more robust business tool.

Counting The Cost Of Voicemail Hacking

Voicemail hacking is not just a problem for celebrities. According to the National Fraud Intelligence Bureau (NFIB) it affects an increasing number of businesses every year and the costs, much of which are borne by the business, are in the $billions globally.  Clearly the so-called ‘controls’ built into PBX and voicemail systems are inadequate. As organised crime increasingly focuses on this lucrative revenue stream, Paul German, CEO, VoipSec calls on businesses to take another look at voicemail security.