Skip to content

TeleDynamics Think Tank

Securing VoIP: systems and network security

Posted by Daniel Noworatzky on Sep 14, 2022 10:46:00 AM

Securing voice services is among the most essential measures any business can take to mitigate attacks involving toll fraud, denial of service or corporate espionage. Voice over Internet Protocol (VoIP) encompasses a robust and fully developed set of technologies that incorporate strong security features sufficient to deal with virtually all such attacks. Nevertheless, even with the most secured VoIP services, malicious hackers often find alternative attack vectors to achieve their goals.

In this article, we examine those attack vectors and the best practices to defend against them.

Read More

Topics: IP PBX, VoIP, SIP, Network Security, Firewall

VoIP security: Keeping conversations confidential

Posted by Daniel Noworatzky on Sep 7, 2022 10:46:00 AM

When you speak on the phone, it’s natural to believe that it’s a private conversation between you and the person on the other end of the line. However, do you know what mechanisms are employed to deliver this confidentiality? And how confident can you truly be in these security measures?

In this article, we take a detailed look at Voice over Internet Protocol (VoIP) security technologies and how they keep conversations confidential.

Read More

Topics: SIP Phones, IP PBX, VoIP, SIP, Network Security, Protocols & codecs

Grandstream UCM RemoteConnect (UCMRC)

Posted by Daniel Noworatzky on Aug 31, 2022 10:41:00 AM

Product Review

Experienced telecom administrators know it’s challenging to provide ironclad security while maintaining speed on a communications network. This is especially true for enterprises with large mobile workforces, where users have internal telephone extensions on their mobile devices or home computers.

To make achieving these essential goals easier, Grandstream has introduced UCM RemoteConnect. This service caters to provisioning extensions for remote users of on-premises UCM6300 IP PBXs securely and lightning-fast.

Read More

Topics: IP PBX, VoIP, Grandstream, Network Security, Mobile, Product Review, Firewall

How to protect your telephone network from vishing (phone scams)

Posted by Daniel Noworatzky on Aug 19, 2020 10:49:00 AM

Telecommunications networks will always be targets of malicious attacks. One of the most vulnerable components of a telephony network may not be the technology, but people. Rather than targeting the phone system or data network, many attackers focus their fraudulent activities on the users themselves. In this article, we take a look at some of the most common telephony scams out there today, so you can be aware of them and do your part to protect your employees and your company from them.

Read More

Topics: Business Telephone System, Network Security

VoIP troubleshooting resources

Posted by Daniel Noworatzky on Aug 12, 2020 10:45:00 AM

As we celebrate Shark Week this week, we are reminded of the proverbial sharks faced by network engineers in the form of security breaches and technical issues. TeleDynamics has created a collection of resources to help you troubleshoot audio problems, secure your network, protect your telephone system from hackers, analyze voice packets, and more. In this article, we offer a compilation of some of our most popular resources, so you’ll have them handy. For each listing below, click on the blue heading to read the full article.

Read More

Topics: Business Telephone System, VoIP, Network Security, Troubleshooting

How to protect your business against toll fraud

Posted by Daniel Noworatzky on Jul 22, 2020 10:39:00 AM

When we think about network security, the telephone network is often overlooked as a target by attackers. One of the most common forms of attack on a telephony network is what is known as toll fraud. The Communications Fraud Control Association (CFCA) reports that in 2019, toll fraud caused US$28.3 billion globally in losses, corresponding to 1.74% of global telecom revenues.1 In this article, we look at how toll fraud affects both conventional telephony and modern VoIP systems, and what you can do to protect your business.

Read More

Topics: Business Telephone System, Network Security

How to protect against TDoS attacks

Posted by Daniel Noworatzky on Jul 15, 2020 10:53:00 AM

Telephony denial of service (TDoS) is a type of cyberattack that can be used to disable telephony systems. Similar in concept to a typical data network DoS (denial of service), its purpose is to deny users access to a particular telephony service. In this article, we discuss how TDoS attacks are conducted and what measures you and your telco can take to protect your systems.

Read More

Topics: Business Telephone System, Network Security, Business Continuity

Highlights from ITEXPO

Posted by Daniel Noworatzky on Feb 19, 2020 10:53:00 AM

Couldn't make ITEXPO in Ft. Lauderdale last week? Here's a recap.

This year at ITEXPO we saw a number of new events and happenings. There was a good attendee and exhibitor turnout, despite the fact that all of the Chinese factories and representatives were unable to attend due to the coronavirus. Nonetheless, the products and services from these manufacturers were on full display. The attendees expected nothing less from the #TECHSUPERSHOW! 

Read More

Topics: VoIP, Trends, Network Security, Events, SD-WAN, IoT, Unified Communications

How to optimize your Wi-Fi network for VoIP

Posted by Daniel Noworatzky on Sep 11, 2019 10:47:00 AM

Many administrators resist implementing VoIP over Wi-Fi, often citing security and quality concerns. The truth is that if implemented correctly, voice can be safely and reliably deployed on a wireless network. This article examines some best practices for optimizing voice over Wi-Fi (VoWi-Fi).

Read More

Topics: VoWi-Fi, QoS, Wireless, Network Security, Network Design, Wi-Fi, Unified Communications

Common Wi-Fi security threats and how to mitigate them

Posted by Daniel Noworatzky on Aug 21, 2019 10:49:00 AM

Wi-Fi itself should not be feared as a technology susceptible to network attacks; it is a flawed implementation that should be feared. Because of the nature of the technology, Wi-Fi signals can be easily intercepted by any wireless device within range. Nevertheless, with the proper security precautions in place, these intercepted signals become useless to even the most determined attacker. By employing industry-standard security measures, Wi-Fi becomes an enterprise-grade high-performance solution suitable for almost any application.

In this article, we examine the the most pervasive threats to Wi-Fi networks and the best ways to mitigate them.

Read More

Topics: Network Security, Wi-Fi, Firewall

Welcome to our Think Tank

In this blog you'll read our thoughts on business telephone systems. While a lot has changed in telecom since TeleDynamics was founded in 1981, we remain as committed as ever to delivering the best customer service in the industry.

If you would like elaboration on a specific topic, please let us know in the comments section.

Happy reading and thanks for stopping by!

Receive New Articles by Email

BiBA-2017-silver-midres
Easy template for creating a network security policy
New call-to-action
New call-to-action