{"id":1284,"date":"2016-07-06T10:20:55","date_gmt":"2016-07-06T14:20:55","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1284"},"modified":"2021-07-07T04:55:11","modified_gmt":"2021-07-07T08:55:11","slug":"top-3-voip-security-risks","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1284","title":{"rendered":"How to Counteract VoIP Vulnerabilities: VoIP Security Risks"},"content":{"rendered":"<p style=\"text-align: justify;\">In today\u2019s day and age we have become familiar and hopefully cautious when receiving strange emails with a random file attached. It\u2019s unlikely that we would give it a second thought before deleting. This is because we recognize the need for cyber security to limit the onslaught of digital threats we receive on a seemingly daily basis. What we often overlook however, is that voice over IP (VOIP) services are susceptible to the same threats. These calls are being made over the internet after all. VOIP systems are quickly becoming the industry standard, yet, do not often receive the same level of care to mitigate risks. It\u2019s why we thought we would compile the top three security risks and the ways they can be thwarted.<!--more--><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Call Interception:<\/strong>\u00a0<\/span>Many times a hacker can access a businesses\u2019 network and remain unidentified for many months depending on the actions they take. For example, if they access your VOIP system, they will have the ability to intercept or even redirect your calls, leaving your businesses\u2019 reputation in the hands of an unknown entity. While intercepting incoming calls, they can impersonate internal staff to request confidential information directly from your customers or employees. It is not only embarrassing, but can leave your business susceptible to penalties for compliance violations if it is determined that reasonable precautions weren\u2019t taken.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><span style=\"color: #800000;\"><em><strong>Tip:<\/strong><\/em>\u00a0<\/span><em>The first line of defense to preventing this type of interception is ensuring your calls are encrypted, both inside your network, and outside for those authorized to access your phone system using mobile apps and devices. This aids in preventing unknown parties from listening in. It is especially important when your setup the system that it allows mobile staff who may use an unsecured Wi-Fi hotspot to make or receive calls.<\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Eavesdropping:<\/strong>\u00a0<\/span>Eavesdropping on calls has been around since the old days, but in order for this to have occurred in the past, an individual would usually physically tap the traditional line or phone switch in order to listen in. Now, with VOIP networks, the conversation can be intercepted and tapped over the network. Depending on the setup, the infiltrator can access the WAV files to record, download, and sell your business\u2019s proprietary information to competitors, or on the black market.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><span style=\"color: #800000;\"><em><strong>Tip:<\/strong><\/em>\u00a0<\/span><em>Luckily eavesdropping can be relatively easy to prevent by ensuring the software being used does in fact have an encryption component. The further use of a Virtual Private Network (VPN) will also help to keep all data (calls, texts, videos) being transferred on your network is secure.<\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Toll Fraud:<\/strong>\u00a0<\/span>A growing threat to businesses involves attackers accessing your VOIP network to make international calls, leaving your business footing the bill. This is a very difficult case to fight and prove that the calls being charged were not authorized, especially on VOIP networks where little authentication or analysis is in place to validate the claims.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em><span style=\"color: #800000;\"><strong>Tip:<\/strong>\u00a0<\/span>Consider installing a Session Border Controller (SBC) to make your VOIP network more secure. The SBC controls the signaling and media streams of VOIP calls, video, and chat features. It prevents your network from being an entry point for these types of attacks, encrypts the voice channels that also prevents eavesdropping, measures traffic volume from sources, and blocks unusual levels at the individual user level.<\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Final Thought:<\/strong>\u00a0<\/span>VOIP is now considered the standard in corporate America, but to what risk? It is common for new technology and products to be released onto the market without much careful thought to privacy or security. However, when the ease and access to this technology is used in commercial applications, the vulnerabilities are quickly exploited through the sheer number of attacks every business, big or small, encounter on a daily basis. These liabilities expose consumers and have proven very difficult to identify or mitigate. While you shouldn\u2019t fear a VOIP implementation, be sure you have your security measures properly established prior to adding voice services onto your data network. Note that some VOIP providers establish an entirely separate network which is exclusively maintained outside of your IT provider. For questions related to your configuration, or more information on how to properly secure your network <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">contact us<\/a>!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s day and age we have become familiar and hopefully cautious when receiving strange emails with a random file attached. It\u2019s unlikely that we would give it a second thought before deleting. This is because we recognize the need for cyber security to limit the onslaught of digital threats we receive on a seemingly&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[41,239,240,241,173,192,242,243,229,244,21,169,245],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Counteract VoIP Vulnerabilities | Top 3 VoIP Security Risks | TSI<\/title>\n<meta name=\"description\" content=\"Learn three important tips to beef up your voice over internet protocol (VoIP) security. Find out how to keep your business safe and secure.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Counteract VoIP Vulnerabilities | Top 3 VoIP Security Risks | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn three important tips to beef up your voice over internet protocol (VoIP) security. Find out how to keep your business safe and secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1284\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-06T14:20:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T08:55:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1284\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1284\",\"name\":\"How to Counteract VoIP Vulnerabilities | Top 3 VoIP Security Risks | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1284#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1284#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png\",\"datePublished\":\"2016-07-06T14:20:55+00:00\",\"dateModified\":\"2021-07-07T08:55:11+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn three important tips to beef up your voice over internet protocol (VoIP) security. Find out how to keep your business safe and secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1284#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1284\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1284#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1284#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Counteract VoIP Vulnerabilities: VoIP Security Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Counteract VoIP Vulnerabilities | Top 3 VoIP Security Risks | TSI","description":"Learn three important tips to beef up your voice over internet protocol (VoIP) security. Find out how to keep your business safe and secure.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Counteract VoIP Vulnerabilities | Top 3 VoIP Security Risks | TSI","og_description":"Learn three important tips to beef up your voice over internet protocol (VoIP) security. Find out how to keep your business safe and secure.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1284","og_site_name":"TSI Support","article_published_time":"2016-07-06T14:20:55+00:00","article_modified_time":"2021-07-07T08:55:11+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1284","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1284","name":"How to Counteract VoIP Vulnerabilities | Top 3 VoIP Security Risks | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1284#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1284#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png","datePublished":"2016-07-06T14:20:55+00:00","dateModified":"2021-07-07T08:55:11+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn three important tips to beef up your voice over internet protocol (VoIP) security. Find out how to keep your business safe and secure.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1284#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1284"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1284#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/07\/Top-3-VOIP-Security-Risks-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1284#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"How to Counteract VoIP Vulnerabilities: VoIP Security Risks"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1284"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1284"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1284\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8429"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}