Secure Voip

The Ins and Outs of Call Center Fraud

VoIP users have access to the caller ID field, and it can be set to whatever they want. This is a key advantage to those perpetrating fraud since they don't need many technical skills to make this work. Fraud perpetrators have developed software to reset PINs and access accounts and IVR systems. This is called call center fraud.

The VoIP Addict’s Guide – VoIP Security Fact and Fiction

VoIP security is a hot topic, and rightfully so. A compromised system can cost you $$$ in phone bills, so how do you prevent a breach? Well, the answer isn’t as complicated as you’d expect. There are a lot of opinions floating around on the subject, so let me address some truths and falsehoods that may be of importance when securing your VoIP system.

The Forgotten Security Frontier: How Secure Are Your Phone Calls?

Cyber threats are constantly evolving, and 2017 is ramping up to be a banner year for security. Last year brought forth new and incomparable in scale attacks directed at high-profile brands. According to Control Risks, the attacks perpetrated by cyber criminals doubled in frequency. Across South East Asia, government, finance, and telecoms sectors were the most frequently targeted. It is becoming imperative for enterprises to invest in cyber security defense systems and collaborate with experts who can advise on the best preventive strategies.

The Dos and Don'ts of Securing Your VoIP Communications

Like every other cloud-based, internet-connected application running within your business, Voice-over-IP (VoIP) apps require comprehensive security. Whether it's ensuring secure user authentication and network configuration or enabling end-to-end encryption in all VoIP communication and data storage, organizations need to be diligent in both overseeing IT management and working closely with their business VoIP provider to ensure that security requirements are being met and enforced.

The Top 5 VoIP Security Risks and Their Controls

Businesses often ponder on the reliability and overall quality of VoIP telephony system. This is a major concern which leads such businesses to consider the dangers of data security risks. In spite of the few controversial security breaches in the past, VoIP technology has advanced and transformed into a more robust business tool.

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

There are numerous protocolsused in voice-over-IP (VoIP) communications. According to IBM Managed Security Services (MSS) data, the most targeted VoIP protocol is Session Initiation Protocol (SIP), which accounted for over 51 percent of the security event activity analyzed in the last 12 months.

The Need for VoIP Security: Vulnerabilities and Defensive Tactics

Over 70% of respondents reported that their businesses were compromised through IT attacks.  Because Voice over Internet Protocol (VoIP) phone systems use the same data lines as the rest of your IT system, some companies see the use of VoIP as a potential security risk.