News, recommendations and expertise of our team for your business.
Securing your VoIP phone system; Is it necessary?
Companies immobilized by hacker attacks or computer fraud, so many are hitting the news these days. Can VoIP phone systems also make our businesses more vulnerable? More open; more vulnerable The majority of our businesses have turned to VoIP for our telephone communications. Why not; the savings generated and greater flexibility make this technology very attractive. In exchange for these benefits, we have moved these systems into the sphere of IT services. So the answer is definitely yes. We made them vulnerable to computer attacks and fraud. A new way to enter our businesses All our computer systems, including our VoIP PBX, must communicate through a network to their users and often to third-party systems. Also, all of our systems share resources such as the network and to do so, they must maintain open some doors. These doors, or ports in computer terms, are all ways that an intruder or malicious user can use to sabotage or modify, erase or steal data. Watch all doors With our new VoIP phone systems, we have added multiple gateways to our businesses. These systems have users everywhere in our offices and from outside by our smartphones. They are open to other systems for receiving and routing calls. They also maintain interfaces for our managers and enable integration with other applications such as a CRM. All this new access adds to the vulnerability of our companies. When one of these doors is not guarded or passwords are easily broken or stolen, the path is free to our telephone system. In addition, with it compromise, the rest of our IT infrastructure becomes attackable from the inside. The best protection that we can afford Your SME has a VoIP phone system. You want to know if it needs to be upgraded in terms of security. Very good. Begin by adding this system to the list of your systems to secure by informing those to whom you give this responsibility. They need to know that you want this system, even if administered externally, to be the best protected for the allocated budget. If you are this manager, go back to the market regularly. Obtain the security specifications from your IP PBX operator and compare them with quotes from other providers. This will allow you to migrate your system to the level of security that your budget will allow. This kind of move is no longer complicated. Make a call for tenders every 2 or 3 years to make sure you follow the technical advances entering the market. It’s more complicated than that Obviously, the protection of our computer systems is much more complex than what I propose here. I am aware of this and I invite you to learn more about the fortification of computer systems. If you only keep from this article that your business IT protection plan must include securing your VoIP system, my goal will be achieved. Our businesses are increasingly exposed to dangers that we do not easily see as an SME manager. That being said, forcing our suppliers to help us address them is a means within our reach. Have them work for you and protect the future of our businesses. Related readings: Example of a company relying on its external supplier for the security of its main system. Bonjour-santé website remains down after 11 days (Global News, October 17th 2019)