SHARE



ABOUT THE AUTHOR


Jon Arnold
Jon Arnold is Principal of J Arnold & Associates, an independent analyst providing thought leadership and go-to-market counsel with a...
Read Full Bio >>
SHARE



Jon Arnold | January 23, 2014 |

 
   

Is VoIP Putting Your Network at Risk?

Is VoIP Putting Your Network at Risk? VoIP-related threats are evolving faster than you're able to handle, and until you understand the nature of these threats, you won't know what's truly at risk.

VoIP-related threats are evolving faster than you're able to handle, and until you understand the nature of these threats, you won't know what's truly at risk.

For many of you, VoIP is old hat, and when it comes to innovations in communications, you're focusing on other things these days. Even UC may feel very 2013, and now you're more granular, becoming immersed in things like WebRTC, desktop video, BYOD and Big Data--along with anything that produces a tangible ROI for collaboration.

IT's job is getting harder, not easier, and with a near-impossible set of priorities to manage (juggle, really), you hardly ever get the chance to revisit things once they're up and running. This brings me to VoIP, and based on the research done for my latest white paper, I would advocate some second thoughts on that. Whether you deployed VoIP last year or many years ago, you're facing a tougher environment today regarding network security.

The Root of the Problem
No doubt you have rock-solid security to protect your data assets, and for many of you this is mandated for compliance purposes. When it's time for a security audit, the checklist is pretty daunting, and once you get through that, there aren't too many stones left unturned.

More often than not, however, VoIP isn't part of that audit. There are two implications here, and I need to get both of them on the table. First is the fact that VoIP is barely, if at all, part of the security compliance envelope. The technology is too new and not well understood by the audit community in terms of the risks posed by VoIP-enabled security threats. As such, it's not on their general radar, and if VoIP isn't on the audit checklist, the auditors won't likely be looking there.

If this was the only stakeholder group regarding network security, the solution would be easy. However, IT is another key stakeholder--arguably the most important one – and is as much a part of the problem as the solution. To whatever extent IT knows or believes their network is protected from VoIP-enabled security threats, my position is that enterprises are woefully misinformed.

This isn't to say that VoIP cannot be very effectively secured in your network. In many cases, security was not much of a concern when VoIP was initially deployed, and once it becomes hard-baked into your network, you move on to other things. With VoIP becoming a commodity and telephony becoming a smaller line item in your budget, higher priorities take over. If VoIP hasn't led to any notable security breaches yet, you're probably not thinking too much about it as a source of network risk.

A Bigger Picture to Consider: VoIP Isn't Just Telephony
All of the newer, granular factors cited above are far more pertinent to today's needs, and there's only so much time in your day to plug holes in the security dike. Not only does each of these have financial implications for IT, but they pose major security challenges independent of VoIP. These realities may rule the day for IT right now, but a common thread runs through all of them. To varying degrees, they are all touched by VoIP, so if your VoIP security framework is lacking, these higher-order issues will be as well.

Making that connection may not be obvious, especially if you only view VoIP as telephony. At face value, this is certainly true, but that isn't the issue here. Of greater consequence is the fact that VoIP is a form of data, and rides over the same network that is the lifeblood of your business. This is a fundamental shift from legacy systems in which voice never touched your data network--and by extension, telephony was hardly seen as a security threat.

As IP networks become the common fabric for data transport, VoIP is poised to become the weak link in your security chain, especially if it has never been given proper attention this way. For the most part, any form of VoIP security is voluntary, and if the associated threats are not viewed as either imminent or real, getting adequate resources for a solution will be a real challenge.

Network security is a lot like insurance, and to the extent that risks are understood and can be quantified, measures will be taken accordingly. Large scale VoIP-related security breaches are either uncommon or not reported, and when toll fraud occurs, it's more expedient to treat it as a cost of doing business rather than overhauling your IT security framework.

The Need for a New Conversation
This is usually where the conversation ends with VoIP security, but my research says this is where it should start. If toll fraud was the only VoIP-related threat, I wouldn't be writing this article. This will always be a target for small-time operators, but when you think about NSA, WikiLeaks, Stuxnet, or even the recent credit card fraud that hit Target, the major league hackers are after any and all forms of corporate data.

I'm not here to tell you what that milieu looks like, but as I noted earlier, think about the weak link in your security chain. In many cases, it's going to be VoIP, and when you look at the bigger picture, this is what those hackers see. Time and again, the culprit is the IP-PBX, mainly due to lax or nonexistent security practices. A lot of this is basic human error, so employee training is actually a big part of the solution.

Beyond that, though, the network itself needs help--not just the technology; a more holistic view from IT about VoIP security is necessary. For the vast majority of businesses, VoIP-related threats are evolving faster than you're able to handle, and until you understand the nature of these threats, you won't know what's truly at risk.

I explore these issues in greater depth in a white paper, titled "VoIP Security--More Than IT Risk". The paper was sponsored by VoIPshield Systems, but the focus is very much on the problem set, as well as on various paths IT can take to address the risks. My research covered the gamut of stakeholders related to VoIP security, and given the consensus found, I believe this speaks to some real issues in our space, and I'm happy to share the findings with No Jitter readers. I'd love to hear your thoughts and move this discussion forward.





COMMENTS



Enterprise Connect Orlando 2018
March 12-15 | Orlando, FL

Connect with the Entire Enterprise Communications & Collaboration Ecosystem


Stay Up-to-Date: Hear industry visionaries in Keynotes and General Sessions delivering the latest insight on UC, mobility, collaboration and cloud

Grow Your Network: Connect with the largest gathering of enterprise IT and business leaders and influencers

Learn From Industry Leaders: Attend a full range of Conference Sessions, Free Programs and Special Events

Evaluate All Your Options: Engage with 190+ of the leading equipment, software and service providers

Have Fun! Mingle with sponsors, exhibitors, attendees, guest speakers and industry players during evening receptions

Register now with code NOJITTEREB to save $200 Off Advance Rates or get a FREE Expo Pass!

November 1, 2017

Your customers (internal and external) demand that you offer them the ability to connect by any means. With the adoption of cloud communications tools you now have access to an expanded portfolio o

October 18, 2017

Microsofts recent Ignite event had some critically important announcements for enterprise communications. Namely, Microsofts new Team Collaboration offering, Teams, will be its primary communicatio

September 20, 2017

Customer experience can make or break your business. But how do you achieve outstanding customer service when you're dealing with outdated organizational structure, lagging technology, dated proces

September 22, 2017
In this podcast, we explore the future of work with Robert Brown, AVP of the Cognizant Center for the Future of Work, who helps us answer the question, "What do we do when machines do everything?"
September 8, 2017
Greg Collins, a technology analyst and strategist with Exact Ventures, delivers a status report on 5G implementation plans and tells enterprises why they shouldn't wait to move ahead on potential use ....
August 25, 2017
Find out what business considerations are driving the SIP trunking market today, and learn a bit about how satisfied enterprises are with their providers. We talk with John Malone, president of The Ea....
August 16, 2017
World Vision U.S. is finding lots of goodness in RingCentral's cloud communications service, but as Randy Boyd, infrastructure architect at the global humanitarian nonprofit, tells us, he and his team....
August 11, 2017
Alicia Gee, director of unified communications at Sutter Physician Services, oversees the technical team supporting a 1,000-agent contact center running on Genesys PureConnect. She catches us up on th....
August 4, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, has lately been working on integrating enterprise communications into Internet of Things ecosystems. He shares examples and off....
July 27, 2017
Industry watcher Elka Popova, a Frost & Sullivan program director, shares her perspective on this acquisition, discussing Mitel's market positioning, why the move makes sense, and more.
July 14, 2017
Lantre Barr, founder and CEO of Blacc Spot Media, urges any enterprise that's been on the fence about integrating real-time communications into business workflows to jump off and get started. Tune and....
June 28, 2017
Communications expert Tsahi Levent-Levi, author of the popular BlogGeek.me blog, keeps a running tally and comprehensive overview of communications platform-as-a-service offerings in his "Choosing a W....
June 9, 2017
If you think telecom expense management applies to nothing more than business phone lines, think again. Hyoun Park, founder and principal investigator with technology advisory Amalgam Insights, tells ....
June 2, 2017
Enterprises strategizing on mobility today, including for internal collaboration, don't have the luxury of learning as they go. Tony Rizzo, enterprise mobility specialist with Blue Hill Research, expl....
May 24, 2017
Mark Winther, head of IDC's global telecom consulting practice, gives us his take on how CPaaS providers evolve beyond the basic building blocks and address maturing enterprise needs.
May 18, 2017
Diane Myers, senior research director at IHS Markit, walks us through her 2017 UC-as-a-service report... and shares what might be to come in 2018.
April 28, 2017
Change isn't easy, but it is necessary. Tune in for advice and perspective from Zeus Kerravala, co-author of a "Digital Transformation for Dummies" special edition.
April 20, 2017
Robin Gareiss, president of Nemertes Research, shares insight gleaned from the firm's 12th annual UCC Total Cost of Operations study.
March 23, 2017
Tim Banting, of Current Analysis, gives us a peek into what the next three years will bring in advance of his Enterprise Connect session exploring the question: Will there be a new model for enterpris....
March 15, 2017
Andrew Prokop, communications evangelist with Arrow Systems Integration, discusses the evolving role of the all-important session border controller.
March 9, 2017
Organizer Alan Quayle gives us the lowdown on programmable communications and all you need to know about participating in this pre-Enterprise Connect hackathon.
March 3, 2017
From protecting against new vulnerabilities to keeping security assessments up to date, security consultant Mark Collier shares tips on how best to protect your UC systems.
February 24, 2017
UC analyst Blair Pleasant sorts through the myriad cloud architectural models underlying UCaaS and CCaaS offerings, and explains why knowing the differences matter.
February 17, 2017
From the most basics of basics to the hidden gotchas, UC consultant Melissa Swartz helps demystify the complex world of SIP trunking.
February 7, 2017
UC&C consultant Kevin Kieller, a partner at enableUC, shares pointers for making the right architectural choices for your Skype for Business deployment.
February 1, 2017
Elka Popova, a Frost & Sullivan program director, shares a status report on the UCaaS market today and offers her perspective on what large enterprises need before committing to UC in the cloud.
January 26, 2017
Andrew Davis, co-founder of Wainhouse Research and chair of the Video track at Enterprise Connect 2017, sorts through the myriad cloud video service options and shares how to tell if your choice is en....
January 23, 2017
Sheila McGee-Smith, Contact Center/Customer Experience track chair for Enterprise Connect 2017, tells us what we need to know about the role cloud software is playing in contact centers today.