Startechtel.com's Blog

For All Your Phone System Needs

Security Tips for SIP Trunking

For businesses looking for a cost-effective upgrade, SIP trunking is a coveted option. SIP trunking allows connections between your telephony applications and your PBX systems for VoIP and Unified Communications services. Less hardware is necessary, thus cutting down on costs and providing easier management of your business phone systems. However, with new technologies comes hesitance.

Some worry of the potential increased risk as communications and data are transmitted over networks. Previously, SIP trunking has been linked to instances of telephone fraud and unauthorized listening of calls. But with the proper security and safety measures in order, SIP trunking can be a powerful tool for you business.

While there are always potential risks out there, there are basic security measures we can take to minimize the risk factors. Keep these tips in mind to ensure that your networks and information are secure:

  • Keep software and firmware up-to-date

Hackers love to find the weak points in systems and exploit them. They will work diligently until they crack they system. Software updates not only offer system enhancements, but they offer patches for any security vulnerabilities that arise. That is precisely why it is important to keep your system and devices up-to-date.

  • Complex passwords

Because there are only so many alphanumeric characters, passwords can be relatively easy to crack. As technology advances and cybercriminals get smarter, attacking systems with high-level encryption becomes easier. Crawlers can automatically attempt standard and default passwords in every password field until it gets it right in a matter of minutes. By enforcing policies that require complex passwords on all accounts, you can help to keep your system safe. Requiring that passwords are changed regularly can increase your security.

  • IP address authentication

Once your IP network is secure, the next step is to only allow internal IP addresses access to your telephony resources. That way, you can monitor who within your business gains access. If you have mobile users that also need access to the system, utilize custom or third-party tools that enable you to monitor log files and automatically block IP addresses that have failed a pre-set number of password attempts. Keeping a blacklist of IP addresses that pose potential threats can assist in keeping cyber criminals away.

  • Trusted SIP providers

On the other hand, you can create an IP whitelist that includes only trusted SIP connections and allow your firewall to only accept trusted SIP providers. Intruders and unauthorized connections will not be allowed to gain access.

  • Understand signaling and media

A secure transmission path is the best way to ensure that your communications are safe. You will want to do your homework and research different providers. Take a look at how they handle their transmissions. Some providers send signaling and media in two disassociated streams so that in case calls get intercepted, hackers do not access audio. Other providers may offer end-to-end encryption. Consider what is best for your company and find the provider that meets your standards.

  • Secure connections

Virtual private networks work well if you have established home and satellite offices. Alternatively, you can disguise the transmission and access point by using a non-standard SIP port. If you have mobile workers that need to gain access, you may want to make sure that secure connection protocols (ex. secure socket layers) are in place.

Enforce these practices and enjoy a secure network system. Do you have any tips for your peers? Share with us on Facebook, Google+, Twitter, and Pinterest!

For a great selection of new and refurbished business phones, phones systems, networking equipment, and more, visit us online. To speak with a representative directly, please call 1-800-564-8045. We’re open Monday-Friday 7:00am-5:00pm.

Source: http://www.rcrwireless.com/20151027/opinion/reality-check-busting-myths-and-misconceptions-about-sip-trunking-security-tag10

Summary
Article Name
Security Tips for SIP Trunking
Description
Switching to SIP trunking for your business? Check out these tips to ensure that your system is secure.

Tags: , , , , , , , ,


Phone System Support