Great service since 1981 | TeleDynamics distributes wholesale telecom equipment & supplies to qualified dealers and installers only

Become a Dealer Now

Great service since 1981

TeleDynamics Think Tank

Network security and the IoT

Posted by Daniel Noworatzky on May 23, 2018 3:54:00 PM

 

The Internet of Things (IoT) is a field of information and communications technology (ICT) that has been increasing exponentially for the past few years, with the number of connected devices now exceeding the world’s human population.

But many IoT device users may not be aware of the inherent security risks of their internet-connected devices, according to a January 2018  study by the Cybersecurity Research Institute. According to the report, hackers have already proven themselves adept at discovering flaws in these devices and turning them into botnets (botnets are a collection of connected devices infected with malware and controlled without the owners' knowledge).

In this article, we review some of the vulnerabilities inherent in connected devices and steps you can take to secure your network and protect against hackers.

Read More

Topics: Network Security, Trends, IoT

How to hack-proof your VoIP network

Posted by Daniel Noworatzky on Jan 24, 2018 3:49:00 PM

One of the most common matters we discuss with customers on our support calls is network security – specifically, how to lock down SIP Trunks, IP PBXs, SIP phones, and routers from hacking. Here we review different ways hackers can break into your voice network and the steps you can take to secure your system.

Read More

Topics: Routers, Network Security, SIP Phones, SIP, IP PBX

EdgeMarc SBCs that scale with growing businesses

Posted by Daniel Noworatzky on Oct 26, 2017 10:00:00 AM

Review of the EdgeMarc 2900a and 2900e Enterprise Session Border Controllers

Edgewater Networks has added to its line of enterprise session border controllers (eSBCs) with its EdgeMarc 2900a and 2900e models. These are designed to enable enterprises and service providers to future-proof their SIP trunking and Unified Communications (UC) deployments. With built-in mechanisms for both QoS and security, they provide intelligent mechanisms allowing for both hosted PBX services as well as SIP trunking applications.

They have several features that differ from other EdgeMarc SBCs.

Read More

Topics: VoIP, Network Design, Network Security, Peripherals, QoS, SIP, Product Review

Top Take-aways from Channel Partners Evolution

Posted by TeleDynamics on Oct 4, 2017 3:40:00 PM

If you weren’t able to attend Channel Partners Evolution last week in Austin, fear not: here are our top takeways from the event.

 

Read More

Topics: Cloud, VoIP, Trends, Events, Network Security

The Future of Telecommunications: the Next 25 Years

Posted by Guest Blogger on Mar 22, 2017 3:56:00 PM

Quantum-leap technology advancements will enable on-demand services anytime, anywhere, with ubiquitous connectivity.

 

by Laureen R. Cook, Principal Telecoms, Media and Technology Advisor, IFC (World Bank) 

Nordic Mobile Telephony (NMT) was introduced as the first 1G system in the Scandinavian countries in 1982. 2G was commercially deployed in 1992 and 3G launched commercially in 2001, allowing mobile data as a mainstream service. 4G has been deployed since 2012, and is still being deployed around the world in developing markets, and 5G is on the horizon for the early- to mid-2020s. On average, we deploy a new generation of mobile communications every 10 years. In 25 years’ time, we will have deployed 7G and be well underway with design of the specifications for 8G, where wireless high-definition video streaming and virtual reality are part of the everyday norm. We will have transformed ourselves from the Digital Era of the 1990s to 2020, to the Digital Era of Automation from 2020 and beyond, which will be an all-immersive, high-definition user experience, taking us seamlessly from Gigabytes GB = 109 of data to Zettabytes ZB = 1021.

Read More

Topics: Trends, Business Telephone System, Wireless, Network Design, Network Security, Mobility, mobile

Implementing VoIP safely and efficiently on the network edge

Posted by Daniel Noworatzky on Mar 1, 2017 3:14:00 PM

Voice over IP networks can be challenging to implement efficiently and securely. This is in part because voice packets require specialized management and must be treated differently than normal data packets. Quality of Service (QoS), security and flow control are just some areas in which the required handling of voice traffic differs from conventional data traffic.

The good thing is that with the proper expertise and care, many of these issues can be successfully dealt with within the corporate network. Such networks are under the complete control of the network administration team and thus can be fully customized for the needs of the voice being transmitted.

However, what happens when voice packets are routed beyond the corporate network, either for voice calls to the PSTN or mobile network, or for employees who use internal voice network services remotely? Here we look at various network edge mechanisms that can be used to monitor and manage data traveling in and out of the LAN.

Read More

Topics: QoS, VoIP, Trends, Network Security, Total Voice Solution, Network Design

For a safe new year, you need more than a firewall

Posted by Guest Blogger on Jan 4, 2017 3:21:00 PM

By John Macario, SVP of Product Management and Marketing at Edgewater Networks

The beginning of a new year is a time when many business managers reflect on learnings from the previous year and begin working on their goals for the current year. Business continuity and data security are, of course, top priorities and securing the network is a vital part of this. 

For network professionals, there is no word more fearsome than “breach.” A security breakdown can mean lost data, stolen secrets, expensive lawsuits, and more. According to IBM, the average cost of a data breach is now US$4 million. This is why nearly every organization that knows what's good for it now invests in antivirus, data loss prevention (DLP), and of course, firewalls.

These days, however, we need to protect more than just data. Enterprise communications have grown into a multi-billion dollar market, particularly due to the widespread adoption of VoIP and unified communications (UC) services. This presents a new challenge that firms will have to face in order to gain a winning edge: voice security. IP phone services present a whole new attack area to potential hackers, a frontier that firewalls simply cannot protect by themselves. The essence of this challenge lies in the fact that we're talking about two entirely different types of information transmission that, in turn, require different security solutions.

Read More

Topics: QoS, VoIP, Network Security

Five reasons you should add an SBC to your IP network

Posted by Daniel Noworatzky on Aug 31, 2016 3:48:00 PM

We consider session border controllers (SBCs) to be a best practice in most enterprise contexts because of the improved security, control and overall VoIP system functionality they lend.

So what exactly are SBCs and why do you need one?

Read More

Topics: SIP, QoS, VoIP, SIP Phones, Network Security, Total Voice Solution, Business Telephone System

Wi-Fi network security: Do you have a blind spot?

Posted by Daniel Noworatzky on Aug 3, 2016 2:54:00 PM

 

Some businesses do a good job of securing their data network (local area network or LAN) but forget to secure their wireless network. Despite all the pains they took to secure their LANs, their network is as vulnerable to entry as a locked car with the windows rolled down. Wi-Fi network security is a common blind spot, especially for small businesses. Here we look at some basic steps companies can take to lock down their Wi-Fi networks.

Read More

Topics: Network Security, Business Telephone System, VoWi-Fi

Is your SIP phone system safe?

Posted by Daniel Noworatzky on Jun 22, 2016 3:48:00 PM

Because VOIP telephone systems send voice over a packet network, they are just as vulnerable to data breaches and cyberattacks as any other IP (Internet protocol) application. According to The Sileo Group, a data security think tank, fully 60% of small companies go out of business within a year of a data security breach.

“Cybercrimes hit companies of all sizes and affect their bottom line to the tune of several years of profit,” asserts John Sileo, CEO of The Sileo Group.

The good news is, if your data network is secure, your VOIP voice transmissions are in some ways even more secure than a traditional analog phone system. And most risks can be mitigated by putting some basic best practices in place.

Read More

Topics: SIP, VoIP, IP PBX, SIP Phones, Business Telephone System, Network Security

Add a Comment:

Welcome to our Think Tank

In this blog you'll read our thoughts on business telephone systems. While a lot has changed in telecom since TeleDynamics was founded in 1981, we remain as committed as ever to delivering the best customer service in the industry.

If you would like elaboration on a specific topic, please let us know in the comments section.

Happy reading and thanks for stopping by!

Receive New Articles by Email

BiBA-2017-silver-midres.jpg

Recent Posts

click here to download our step-by-step guide to using Wireshark for troubleshooting VoIP
Grandstream HT Gateway spec comparison table download
New Call-to-action
Download TeleDynamics' Guide to Media Gateways
Grandstream GWN7610 Product Review