A search of the term VoIP Phone Vulnerabilities results in a torrent of articles discussing network hacking and how to protect networks from outside intruders. VoIP data protection is a legitimate security concern I.T. departments must address. However, it is too often overlooked that VoIP phones are still just phones that transmit conversations from one point to another using cable. In some cases, many of the same cables are used for the VoIP phone as the POTS phone that preceded them.
Remember that VoIP phone security is more than just protecting data traffic. The cables that carry VoIP data can also be used to transmit non-VoIP information. This could include audio from a hidden microphone or video from a camera. Physical access to cabling and phone devices can, and will continue to be exploited for illicit purposes.
To learn more about how the TALAN 3.0 protects business telephone systems, please visit the TALAN product page.
Also, consider attending one of REI’s training courses that discusses in-depth what this article has covered. To view upcoming courses, click here.
This is an excerpt from REI’s TSCM Journal. Click here to download the full edition.