Why VoIP Security is Becoming Increasingly Important

The Future of VoIP in Apple Valley and Victorville | Sonic Systems for Businesses
The Future of VoIP in Apple Valley and Victorville
July 25, 2016
Choosing the Right VoIP Telephones for Your Business | Victorville Telecommunications
Choosing the Right VoIP Telephones for Your Business
September 9, 2016

Why VoIP Security is Becoming Increasingly Important

Why VoIP Security is Becoming Increasingly Important | Victorville Web Conference

At the 19th edition of Black Hat USA, the most important gathering of the information security (InfoSec) community, experts agreed that more should be done to address the vulnerabilities related to Voice over Internet Protocol (VoIP) technologies.

Black Hat USA 2016 took place in its traditional venue of Las Vegas, and it featured the attendance of more than 15,000 hackers from around the world. Although the focus of this conference is to advance digital security, organizers know that attendants may not always be good guys. The InfoSec community is fragmented; while most members are interested in protecting systems, others are interested in breaching them. It is not unreasonable to think that unethical hackers attend these conferences to learn what they are up against.

Despite its ominous name, the Black Hat USA conference is not for bad guys; however, nefarious practices and how to protect against them are discussed. VoIP was a major topic this year; a renowned security firm talked about how the attack surface is increasing due to the interest in unified communications (UC).

Weaknesses in Unified Communication Systems

InfoSec specialists describe the totality of system weaknesses as the attack surface. UC systems blend voice, chat, email, social media, and all other communications into a single platform. Due to the nature of these communication methods, the UC attack surface is significant.

Some of the common VoIP and UC threats reviewed at the conference include: caller ID spoofing, malicious messages, distributed denial of service (DDOS) attacks, toll fraud, and others. The attack vectors are usually poorly configured SIP trunks, phishing on instant messaging networks, social engineering through customer service channels, and more.

UC technology is at the heart of the VoIP strategy for business; in Apple Valley, Victorville and across the High Desert, Sonic IT Systems routinely installs UC systems for local companies. When installing UC systems and making them part of a business network, our technicians make sure that each known vulnerability is addressed.

Based on what was discussed at the Black Hat conference, a do-it-yourself VoIP installation is not something a High Desert business owner would want to try. If you have questions about VoIP systems, UC solutions or network security in general, please contact our Victorville office today.