New White Paper: VoIP Security Risks Must be Addressed

25 Dec 2013

As useful as Voice over Internet Protocol (VoIP) is, sometimes security issues can be an additional price users must pay for it. VoIPshield Systems addresses security gaps caused by VoIP systems, and has recently launched the VoIPaudit 3.1 to better monitor and secure a VoIP communications environment.

VoIPshield contacted J Arnold and Associates, which researched and studied the security risks resulting from VoIP. The results were published in the just-announced white paper, "VoIP Security: More than Just IT Risk."

According to the white paper, organizations do need to address their voice security risks, as threats always remain one step ahead of the security used to stop them. Auditors are not always aware of the extent or purpose of IP voice communications in their organizations, so it is often overlooked, and must be included in risk-based audit plans. Without voice control, a company's entire network could be jeopardized.

"Having followed VoIP since 2001, I've seen a lot of evolution, but little attention has been paid to network security," says Jon Arnold, principal of J Arnold & Associates, UC Expert for UCStrategies, and the author of the white paper. "A lot still needs to be learned about the security risks not only within VoIP systems but also the risks that VoIP poses to the wider enterprise network, and that was clearly validated by our research."

The value of VoIP tends to outweigh the risks, but that doesn't mean they should be overlooked. As VoIP systems are integrated with existing systems and networks, they create new blind spots and openings for hackers, but those blind spots can be found and fixed using a solution such as VoIPaudit. VoIPshield's solution provides reports on security as well as regulatory compliance, so that organizations can ensure their VoIP security is up to date.

For more information on VoIPaudit, visit VoIPshield's website. You can also download the white paper here.

Comments

There are currently no comments on this article.

You must be a registered user to make comments