SHARE



ABOUT THE AUTHOR


Jon Arnold
Jon Arnold is Principal of J Arnold & Associates, an independent analyst providing thought leadership and go-to-market counsel with a...
Read Full Bio >>
SHARE



Jon Arnold | January 23, 2014 |

 
   

Is VoIP Putting Your Network at Risk?

Is VoIP Putting Your Network at Risk? VoIP-related threats are evolving faster than you're able to handle, and until you understand the nature of these threats, you won't know what's truly at risk.

VoIP-related threats are evolving faster than you're able to handle, and until you understand the nature of these threats, you won't know what's truly at risk.

For many of you, VoIP is old hat, and when it comes to innovations in communications, you're focusing on other things these days. Even UC may feel very 2013, and now you're more granular, becoming immersed in things like WebRTC, desktop video, BYOD and Big Data--along with anything that produces a tangible ROI for collaboration.

IT's job is getting harder, not easier, and with a near-impossible set of priorities to manage (juggle, really), you hardly ever get the chance to revisit things once they're up and running. This brings me to VoIP, and based on the research done for my latest white paper, I would advocate some second thoughts on that. Whether you deployed VoIP last year or many years ago, you're facing a tougher environment today regarding network security.

The Root of the Problem
No doubt you have rock-solid security to protect your data assets, and for many of you this is mandated for compliance purposes. When it's time for a security audit, the checklist is pretty daunting, and once you get through that, there aren't too many stones left unturned.

More often than not, however, VoIP isn't part of that audit. There are two implications here, and I need to get both of them on the table. First is the fact that VoIP is barely, if at all, part of the security compliance envelope. The technology is too new and not well understood by the audit community in terms of the risks posed by VoIP-enabled security threats. As such, it's not on their general radar, and if VoIP isn't on the audit checklist, the auditors won't likely be looking there.

If this was the only stakeholder group regarding network security, the solution would be easy. However, IT is another key stakeholder--arguably the most important one – and is as much a part of the problem as the solution. To whatever extent IT knows or believes their network is protected from VoIP-enabled security threats, my position is that enterprises are woefully misinformed.

This isn't to say that VoIP cannot be very effectively secured in your network. In many cases, security was not much of a concern when VoIP was initially deployed, and once it becomes hard-baked into your network, you move on to other things. With VoIP becoming a commodity and telephony becoming a smaller line item in your budget, higher priorities take over. If VoIP hasn't led to any notable security breaches yet, you're probably not thinking too much about it as a source of network risk.

A Bigger Picture to Consider: VoIP Isn't Just Telephony
All of the newer, granular factors cited above are far more pertinent to today's needs, and there's only so much time in your day to plug holes in the security dike. Not only does each of these have financial implications for IT, but they pose major security challenges independent of VoIP. These realities may rule the day for IT right now, but a common thread runs through all of them. To varying degrees, they are all touched by VoIP, so if your VoIP security framework is lacking, these higher-order issues will be as well.

Making that connection may not be obvious, especially if you only view VoIP as telephony. At face value, this is certainly true, but that isn't the issue here. Of greater consequence is the fact that VoIP is a form of data, and rides over the same network that is the lifeblood of your business. This is a fundamental shift from legacy systems in which voice never touched your data network--and by extension, telephony was hardly seen as a security threat.

As IP networks become the common fabric for data transport, VoIP is poised to become the weak link in your security chain, especially if it has never been given proper attention this way. For the most part, any form of VoIP security is voluntary, and if the associated threats are not viewed as either imminent or real, getting adequate resources for a solution will be a real challenge.

Network security is a lot like insurance, and to the extent that risks are understood and can be quantified, measures will be taken accordingly. Large scale VoIP-related security breaches are either uncommon or not reported, and when toll fraud occurs, it's more expedient to treat it as a cost of doing business rather than overhauling your IT security framework.

The Need for a New Conversation
This is usually where the conversation ends with VoIP security, but my research says this is where it should start. If toll fraud was the only VoIP-related threat, I wouldn't be writing this article. This will always be a target for small-time operators, but when you think about NSA, WikiLeaks, Stuxnet, or even the recent credit card fraud that hit Target, the major league hackers are after any and all forms of corporate data.

I'm not here to tell you what that milieu looks like, but as I noted earlier, think about the weak link in your security chain. In many cases, it's going to be VoIP, and when you look at the bigger picture, this is what those hackers see. Time and again, the culprit is the IP-PBX, mainly due to lax or nonexistent security practices. A lot of this is basic human error, so employee training is actually a big part of the solution.

Beyond that, though, the network itself needs help--not just the technology; a more holistic view from IT about VoIP security is necessary. For the vast majority of businesses, VoIP-related threats are evolving faster than you're able to handle, and until you understand the nature of these threats, you won't know what's truly at risk.

I explore these issues in greater depth in a white paper, titled "VoIP Security--More Than IT Risk". The paper was sponsored by VoIPshield Systems, but the focus is very much on the problem set, as well as on various paths IT can take to address the risks. My research covered the gamut of stakeholders related to VoIP security, and given the consensus found, I believe this speaks to some real issues in our space, and I'm happy to share the findings with No Jitter readers. I'd love to hear your thoughts and move this discussion forward.





COMMENTS



August 16, 2017

Contact centers have long been at the leading edge of innovation in communications technology, given their promise of measurable ROI and the continual need to optimize customer interactions and sta

July 12, 2017

Enterprises have been migrating Unified Communications & Collaboration applications to datacenters - private clouds - for the past few years. With this move comes the opportunity to leverage da

May 31, 2017

In the days of old, people in suits used to meet at a boardroom table to update each other on their work. Including a remote colleague meant setting a conference phone on the table for in-person pa

August 16, 2017
World Vision U.S. is finding lots of goodness in RingCentral's cloud communications service, but as Randy Boyd, infrastructure architect at the global humanitarian nonprofit, tells us, he and his team....
August 11, 2017
Alicia Gee, director of unified communications at Sutter Physician Services, oversees the technical team supporting a 1,000-agent contact center running on Genesys PureConnect. She catches us up on th....
August 4, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, has lately been working on integrating enterprise communications into Internet of Things ecosystems. He shares examples and off....
July 27, 2017
Industry watcher Elka Popova, a Frost & Sullivan program director, shares her perspective on this acquisition, discussing Mitel's market positioning, why the move makes sense, and more.
July 14, 2017
Lantre Barr, founder and CEO of Blacc Spot Media, urges any enterprise that's been on the fence about integrating real-time communications into business workflows to jump off and get started. Tune and....
June 28, 2017
Communications expert Tsahi Levent-Levi, author of the popular BlogGeek.me blog, keeps a running tally and comprehensive overview of communications platform-as-a-service offerings in his "Choosing a W....
June 9, 2017
If you think telecom expense management applies to nothing more than business phone lines, think again. Hyoun Park, founder and principal investigator with technology advisory Amalgam Insights, tells ....
June 2, 2017
Enterprises strategizing on mobility today, including for internal collaboration, don't have the luxury of learning as they go. Tony Rizzo, enterprise mobility specialist with Blue Hill Research, expl....
May 24, 2017
Mark Winther, head of IDC's global telecom consulting practice, gives us his take on how CPaaS providers evolve beyond the basic building blocks and address maturing enterprise needs.
May 18, 2017
Diane Myers, senior research director at IHS Markit, walks us through her 2017 UC-as-a-service report... and shares what might be to come in 2018.
April 28, 2017
Change isn't easy, but it is necessary. Tune in for advice and perspective from Zeus Kerravala, co-author of a "Digital Transformation for Dummies" special edition.
April 20, 2017
Robin Gareiss, president of Nemertes Research, shares insight gleaned from the firm's 12th annual UCC Total Cost of Operations study.
March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.