As we celebrate Shark Week this week, we are reminded of the proverbial sharks faced by network engineers in the form of security breaches and technical issues. TeleDynamics has created a collection of resources to help you troubleshoot audio problems, secure your network, protect your telephone system from hackers, analyze voice packets, and more. In this article, we offer a compilation of some of our most popular resources, so you’ll have them handy. For each listing below, click on the blue heading to read the full article.
TeleDynamics Think Tank
Topics: Business Telephone System, VoIP, Network Security, Troubleshooting
How to protect your business against toll fraud
When we think about network security, the telephone network is often overlooked as a target by attackers. One of the most common forms of attack on a telephony network is what is known as toll fraud. The Communications Fraud Control Association (CFCA) reports that in 2019, toll fraud caused US$28.3 billion globally in losses, corresponding to 1.74% of global telecom revenues.1 In this article, we look at how toll fraud affects both conventional telephony and modern VoIP systems, and what you can do to protect your business.
Telephony denial of service (TDoS) is a type of cyberattack that can be used to disable telephony systems. Similar in concept to a typical data network DoS (denial of service), its purpose is to deny users access to a particular telephony service. In this article, we discuss how TDoS attacks are conducted and what measures you and your telco can take to protect your systems.
Topics: Business Telephone System, Network Security, Business Continuity
Couldn't make ITEXPO in Ft. Lauderdale last week? Here's a recap.
This year at ITEXPO we saw a number of new events and happenings. There was a good attendee and exhibitor turnout, despite the fact that all of the Chinese factories and representatives were unable to attend due to the coronavirus. Nonetheless, the products and services from these manufacturers were on full display. The attendees expected nothing less from the #TECHSUPERSHOW!
Topics: VoIP, Trends, Network Security, Events, SD-WAN, IoT, Unified Communications
Many administrators resist implementing VoIP over Wi-Fi, often citing security and quality concerns. The truth is that if implemented correctly, voice can be safely and reliably deployed on a wireless network. This article examines some best practices for optimizing voice over Wi-Fi (VoWi-Fi).
Topics: VoWi-Fi, QoS, Wireless, Network Security, Network Design, Wi-Fi, Unified Communications
Common Wi-Fi security threats and how to mitigate them
Wi-Fi itself should not be feared as a technology susceptible to network attacks; it is a flawed implementation that should be feared. Because of the nature of the technology, Wi-Fi signals can be easily intercepted by any wireless device within range. Nevertheless, with the proper security precautions in place, these intercepted signals become useless to even the most determined attacker. By employing industry-standard security measures, Wi-Fi becomes an enterprise-grade high-performance solution suitable for almost any application.
In this article, we examine the the most pervasive threats to Wi-Fi networks and the best ways to mitigate them.
Topics: Network Security, Wi-Fi, Firewall
How to troubleshoot VoIP problems caused by your firewall
A firewall is a vital component of any enterprise network. But, it can also wreak havoc on the operation of VoIP implementations. In this article, we address the most common problems a firewall can introduce to an IP telephony network, as well as best practices for avoiding or remedying them.
Topics: VoIP, Network Security, Troubleshooting, Network Design, Firewall
By Chris Jones, #TurnOnVPN
In the age of relentless internet surveillance, using a VPN has become mandatory for anyone who values their online privacy. Between your internet service provider storing your entire browsing history and third parties planting “cookies” (data trackers) all over the websites you visit, you leave a considerable digital footprint whenever you surf the web. This intimate data is then sold to advertisers so they can better target online ads.
These growing privacy concerns made VPN incredibly popular. VPN (Virtual Private Network) encrypts your network, making it impossible for third parties to access and collect your browsing data. Widely available and often free, VPN seems to be the perfect solution to guarding your internet privacy.
But as Kenneth White, an internet security expert, revealed to CNN Business, "there is a long history of 'free' VPNs that prey on innocent consumers' concerns about security and cynically make them less safe.” Here are the three main dangers related to using a free VPN service:
Topics: Network Security
Did you miss Channel Partners in Las Vegas last week? Fear not - we've jotted down some of the key themes for you. Take note!
Topics: Trends, Network Security, Cloud, Events, News, IoT, Unified Communications
New year, new risks. Let’s talk security.
In today’s digital economy, mobility is not only an expectation, but in many cases, a requirement for workers to successfully fulfill their responsibilities. Security is a key preoccupation for network administrators as they implement voice and data technologies for remote workers.
In this article, we review various remote employee voice service scenarios, look at what their potential risks are, and examine the best voice encryption and VPN solution for each case.
Topics: VoIP, Network Security
Welcome to our Think Tank
In this blog you'll read our thoughts on business telephone systems. While a lot has changed in telecom since TeleDynamics was founded in 1981, we remain as committed as ever to delivering the best customer service in the industry.
If you would like elaboration on a specific topic, please let us know in the comments section.
Happy reading and thanks for stopping by!
Receive New Articles by Email
Posts by Topic
- 5G
- AI
- Android
- Avaya
- Bluetooth
- Boom Collaboration
- Business Continuity
- Business Strategy
- Business Telephone System
- Case Study
- Catalog
- Cisco
- Cloud
- Codecs
- Collaboration
- Communication
- Conferencing
- Cordless
- CPaaS
- Customer Service
- Customer Success Story
- DECT
- E911
- Events
- Facility Management
- Firewall
- Firmware Upgrades
- FoIP
- Gateway
- Grandstream
- Headsets
- Home Security
- Internet Protocol
- IoT
- IP PBX
- Jabra
- Konftel
- Leasing
- Microsoft
- Mobile
- Mobility (including remote work)
- NEC
- Network Design
- Network Infrastructure
- Network Security
- News
- OTT VOIP
- Outsourcing
- Panasonic
- Peripherals
- PoE
- Polycom
- Power Management
- Product Review
- Productivity
- QoS
- Regulations
- Routers
- SD-WAN
- SIP
- SIP Phones
- Snom
- Software Integration
- Surveillance
- Switches
- Total Voice Solution
- TP-Link
- Trends
- Troubleshooting
- UCaaS
- Unified Communications
- Videoconferencing
- VLAN
- Voice Protocols
- Voicemail
- VoIP
- VoWi-Fi
- VTech
- WAN Technology
- Wi-Fi
- Wireless
- WISP
- Yealink
- Yeastar
- Zoom