Many administrators resist implementing VoIP over Wi-Fi, often citing security and quality concerns. The truth is that if implemented correctly, voice can be safely and reliably deployed on a wireless network. This article examines some best practices for optimizing voice over Wi-Fi (VoWi-Fi).
Wi-Fi itself should not be feared as a technology susceptible to network attacks; it is a flawed implementation that should be feared. Because of the nature of the technology, Wi-Fi signals can be easily intercepted by any wireless device within range. Nevertheless, with the proper security precautions in place, these intercepted signals become useless to even the most determined attacker. By employing industry-standard security measures, Wi-Fi becomes an enterprise-grade high-performance solution suitable for almost any application.
In this article, we examine the the most pervasive threats to Wi-Fi networks and the best ways to mitigate them.
A firewall is a vital component of any enterprise network. But, it can also wreak havoc on the operation of VoIP implementations. In this article, we address the most common problems a firewall can introduce to an IP telephony network, as well as best practices for avoiding or remedying them.
By Chris Jones, #TurnOnVPN
In the age of relentless internet surveillance, using a VPN has become mandatory for anyone who values their online privacy. Between your internet service provider storing your entire browsing history and third parties planting “cookies” (data trackers) all over the websites you visit, you leave a considerable digital footprint whenever you surf the web. This intimate data is then sold to advertisers so they can better target online ads.
These growing privacy concerns made VPN incredibly popular. VPN (Virtual Private Network) encrypts your network, making it impossible for third parties to access and collect your browsing data. Widely available and often free, VPN seems to be the perfect solution to guarding your internet privacy.
But as Kenneth White, an internet security expert, revealed to CNN Business, "there is a long history of 'free' VPNs that prey on innocent consumers' concerns about security and cynically make them less safe.” Here are the three main dangers related to using a free VPN service:
Topics: Network Security
Did you miss Channel Partners in Las Vegas last week? Fear not - we've jotted down some of the key themes for you. Take note!
New year, new risks. Let’s talk security.
In today’s digital economy, mobility is not only an expectation, but in many cases, a requirement for workers to successfully fulfill their responsibilities. Security is a key preoccupation for network administrators as they implement voice and data technologies for remote works.
In this article, we’ll review various remote employee voice service scenarios, look at what their potential risks are, and examine the best voice encryption and VPN solution for each case.
The Internet of Things (IoT) is a field of information and communications technology (ICT) that has been increasing exponentially for the past few years, with the number of connected devices now exceeding the world’s human population.
But many IoT device users may not be aware of the inherent security risks of their internet-connected devices, according to a January 2018 study by the Cybersecurity Research Institute. According to the report, hackers have already proven themselves adept at discovering flaws in these devices and turning them into botnets (botnets are a collection of connected devices infected with malware and controlled without the owners' knowledge).
In this article, we review some of the vulnerabilities inherent in connected devices and steps you can take to secure your network and protect against hackers.
One of the most common matters we discuss with customers on our support calls is network security – specifically, how to lock down SIP Trunks, IP PBXs, SIP phones, and routers from hacking. Here we review different ways hackers can break into your voice network and the steps you can take to secure your system.
Review of the EdgeMarc 2900a and 2900e Enterprise Session Border Controllers
Edgewater Networks has added to its line of enterprise session border controllers (eSBCs) with its EdgeMarc 2900a and 2900e models. These are designed to enable enterprises and service providers to future-proof their SIP trunking and Unified Communications (UC) deployments. With built-in mechanisms for both QoS and security, they provide intelligent mechanisms allowing for both hosted PBX services as well as SIP trunking applications.
They have several features that differ from other EdgeMarc SBCs.