• No results found

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER

N/A
N/A
Protected

Academic year: 2021

Share "THE TOP SECURITY QUESTIONS YOU SHOULD ASK A CLOUD COMMUNICATIONS PROVIDER"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

(1)

THE TOP SECURITY QUESTIONS YOU SHOULD ASK A

CLOUD COMMUNICATIONS PROVIDER

(2)

DATA PROTECTION. YOUR SYSTEM IS ONLY AS SECURE AS YOUR INTERNAL SAFEGUARDS AND THOSE OF YOUR VENDORS.

DATA BREACHES CAN COME FROM INSIDE OR OUTSIDE, BUT

VULNERABILITIES CAN BE MINIMIZED WITH THE RIGHT SAFEGUARDS. SERVICE HIJACKING IS A SERIOUS CONCERN THAT MAKES CONSTANT MONITORING ESSENTIAL FOR ANY SYSTEM.

Reputable, cloud-based VoIP services like ShoreTel Connect CLOUD will have a security policy and safeguards in place. But as a business owner, it’s still important to educate yourself about what security issues exist in cloud phone systems.

This simple Q and A will examine essential security concerns to help you ensure your cloud-based VoIP is secure.

(3)

WHAT YOUR PROVIDER DOES:

All reputable service providers are required to comply with Federal Guidelines laid out for protections in specific verticals. As a part of your search for a service provider, you should check credentials and compliance with these standards.

Reputable service providers are equipped with a host of data protection measures including: firewalls, intrusion detection and prevention systems to help protect against DDoS (Distributed Denial of Service) attacks—all of which should be monitored constantly.

WHAT YOU NEED TO DO:

Regardless of the system you choose, there are multiple ways you can set up your system to be resistant to data breaches. Robust authentication and encryption authorization credentials are a good start. You’ll also want to be sure you set up a registration process.

SHORETEL SOLUTION:

The ShoreTel Connect CLOUD system includes Session Border Controllers, or SBCs. SBCs enforce security, quality of service and admission control mechanisms over the VoIP sessions. SBCs also provide firewall services to protect from attacks.

SHORETEL PROTECTION:

ShoreTel also provides, on an end-to-end basis, encryption that helps protect IP voice against unauthorized recording, playback and other forms of electronic snooping. ShoreTel also uses SSL/TLS to protect instant messaging sessions.

WHAT DO I NEED TO KNOW TO

GUARD AGAINST DATA BREACHES?

(4)

START WITH A SYSTEM CAPABLE OF ENCRYPTING TRAFFIC WITH RESET DEFAULT PINS.

It’s important to find a system that is capable of encrypting traffic with reset default pins. It’s also important to arm your network to act quickly in the event of a hack.

Controlling access to the account is the first step to preventing toll fraud. Only one person in your company should have the ability to change the list of contacts maintained by your vendor. Many IP (Internet Protocol) phone system platforms can be configured to restrict international and directory assistance calls. You can also require an authorization code to make calls.

Strong passwords make it trickier for bad actors to use your account. A few tactics for making passwords stronger include: updating passwords every 90 days, using different passwords for all phones or voicemail boxes and making all passwords longer than four digits—but vary the number of digits from phone to phone.

SHORETEL SOLUTION:

The following actions are taken by ShoreTel teams to help ensure the protection of our customers:

• Weak password scanning activities

• Developing stricter password policies and case studies regarding the use of the same password across applications

• Disabling international click-to-dial features

• Use of fraud monitoring systems to help detect when fraud my be occurring.

WHAT CAN BE DONE TO PREVENT PHISHING SCAMS,

FRAUDULENT INTERACTIONS AND TOLL FRAUD?

(5)

API IS AN ACRONYM FOR APPLICATION PROGRAM INTERFACE.

Strongly built interfaces and consistent monitoring do a lot to make integration of third-party apps safer.

Relying as much as possible on the phone system you’ve chosen, rather than turning to additional third-party providers, can help keep your system secure. Your system should have built-in resources for integrating business applications.

(6)

NO DOWNTIME

Possible causes of downtime include severe weather, unexpected influxes of customers, or DDoS attacks. Consistent monitoring of a system makes it possible to identify the cause of the shutdown quickly and get back online.

Redundancy is also vital to keeping your system up and running. Much like a freeway system that gives travelers multiple routes to get to a single destination, the key to redundancy is to make sure your data has some way to get through if the main access point is not available.

SHORETEL SOLUTION:

ShoreTel’s VoIP network is designed so core and distribution routers are redundant with no single point of failure. We are constantly updating our networks with the most advanced

routers and switches available for maximum availability and reliability. For a more in-depth and technical look at our architecture, check out the ShoreTel white paper: Staying Secure in the Cloud.

WHY SHOULD I BE WORRIED ABOUT DOWNTIME?

(7)

YES.

While no one wants to believe that a colleague or coworker would purposefully attack their own workplace, an internal system of checks and balances, which prevents unauthorized users from accessing data above their clearance level, does much to keep company information and data secure.

SHORETEL SOLUTION:

We have a zero-tolerance policy for putting customers at risk, which includes strict guidelines for employee and vendor behavior.

(8)

YES.

The adoption of a cloud business phone system means that some daily management activities will no longer be on your system. Although this may initially be an uncomfortable change, there are many good reasons to choose a cloud business phone system that ultimately override the risks. Lower overhead costs, increased departmental and overall system efficiency and system availability are some of the reasons why more and more companies have accepted the requisite loss of control that comes with migration to the cloud.

IS IT POSSIBLE TO USE A CLOUD BUSINESS PHONE SYSTEM

AND MAINTAIN CONTROL?

(9)

SECURITY CHECKLIST

The service easily provides access to qualified users while

blocking non-authorized users.

There is a cloud-installed Intrusion Prevention System (IPS) and

regularly run penetration/compliance tests.

Firewalls and data encryptions are in place across the system.

The service complies with federal guidelines and corporate

access policies.

There are backup and restoration policies and procedures

in place.

The service interfaces with my own, on-premises

security environment.

APPENDIX

(10)

UNIFIED COMMUNICATIONS (UC):

The integration of communication services including instant messaging, presence information, voice (including IP

telephony), mobility features, audio, web and video.

UCAAS:

Unified Communications as a Service. A delivery model in which a variety of communication and collaboration applications are outsourced to a third-party provider and delivered over an IP network, usually the public Internet.

VLAN:

Virtual Local Area. A group of devices located on different LAN (Local Area Network) segments that are configured to communicate as if they were attached to the same wire.

VLAN TAGGING:

Inserting a VLAN ID into a packet header to identify which VLAN the packet belongs to.

VOIP:

Voice over Internet Protocol. A group of technologies used for delivering voice communications over Internet (IP) networks.

API:

A software intermediary that makes it possible for application programs to interact with each other and share data.

DDOS ATTACK:

A distributed denial of service attack. An attacker makes a target unavailable to users by attacking the system, usually with an influx of data.

PBX:

Private Branch Exchange. An enterprise telephone system that switches between enterprise users on local lines while allowing all users to share a certain number of external phone lines.

PHISHING SCAMS:

Direct users to visit a website that tries to get them to

voluntarily share private, personal information like credit card, Social Security or bank account numbers.

TOLL FRAUD:

Long distance service theft. This happens when a perpetrator gains remote access to the customer’s PBX or key system and uses the system to make unauthorized phone calls.

(11)

THANK YOU FOR READING OUR EBOOK.

We hope it’s been a useful overview of

VoIP security concerns and solutions.

References

Related documents

To more directly contrast the convergent and forward remapping hypotheses, we designed Experiment 3, in which two oppositely oriented adaptors were presented simultaneously

Focus group #4 (N=8) included representatives from the regional transit system, the Veteran’s hospital, the local senior living community, local community college, and

The voltage variation signals which consist of voltage sag, swell and interruption will be simulated from MATLAB and then analyzed through the Gabor transform.. From the

This site contains materials that have been created, developed, or commissioned by, and published with the permission of, Realtime Publishers (the “Materials”) and this site and

The degrees of depression, anxiety and hostility of the patients were assessed by the SCL-90-R scores, and the fighting spirit was measured by the Mental Adjustment to Cancer

Adopting a Foucauldian genealogical approach I explore the ways in which a specific widening participation initiative, that of Adult Learners’ Week (ALW), has been used by

My experience of planning a process of teaching and learning of German as a foreign language, in view of the diverse needs, interests, styles and motivation of learners in

Data Security - Both cloud and on-premise deployment models offer the security you need for your business Data Access - When you choose a well-known and respected cloud provider,