{"id":184,"date":"2007-08-24T00:00:00","date_gmt":"2007-08-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/24\/voip-security-requires-layered-approach-experts-say\/"},"modified":"2021-12-30T11:36:41","modified_gmt":"2021-12-30T11:36:41","slug":"voip-security-requires-layered-approach-experts-say","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/08\/24\/voip-security-requires-layered-approach-experts-say\/","title":{"rendered":"VOIP Security Requires Layered Approach, Experts Say"},"content":{"rendered":"<p>A combination of technology and education helps address VOIP threats, security professionals say.  Voice-over-IP deployments are expected by some to be targeted by attackers more as the number of organizations utilizing the technology increases, with phone phishing in particular becoming a greater threat.   An example of a phone phishing scam would be an attacker sending a spoofed e-mail instructing the customer to call a phone number to reactivate his or her bank account.  &#8220;Voice is an inherently trusted communication and consumers are not conditioned to distrust the phone in the same manner that they do unsolicited e-mail,&#8221; said Victoria Fodale, an analyst at research firm In-Stat.  Effectively combating VOIP threats requires applying the same best practices governing Internet security, she added.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>She listed BorderWare Technologies and Sipera Systems as key providers of VOIP security tools on the infrastructure side, and Zfone&#8217;s encryption technology&#8212;which has been submitted to the IETF (Internet Engineering Task Force) as a proposed public standard&#8212;as important on the client side.<\/p>\n<p>&#8220;because most of the voice-over-IP traffic is still not encrypted,&#8221; said Paul Wood, an analyst with MessageLabs, headquartered in Gloucester, England.  However, he added, VOIP security threats remain largely theoretical, as hackers and cyber-thieves tend to focus their efforts on e-mail.  e-mail is certainly the single biggest target for [such attackers] because it enables them to exploit this massive ecosystem,&#8221; Wood said, adding that the mix of hardware- and software-based VOIP deployments makes it harder for hackers to target systems.<\/p>\n<p>It takes a mix of security tools, from session border controllers to dedicated firewalls for VOIP traffic to network and host intrusion detection\/prevention systems, to secure VOIP, Fodale said.  She added that the key challenge for businesses will be to integrate VOIP security into a unified security framework.<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0%2C1759%2C2175285%2C00.asp<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-184","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":2671,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/184\/revisions\/2671"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}