4 Cloud Implementation Mistakes that Compromise the Security of Business Phone Networks

Michael Tindall

With more and more businesses basing their phone systems in the cloud, it’s important to be mindful of common implementation errors that can create security risks.

Potential risks include the distribution of malware, toll fraud, botnets, and denial of service attacks, among others. While such attacks remain a rarity, they can cause major disruptions, leading to possible financial losses and the compromise of critical, proprietary, or confidential data. In addition to choosing the right vendor, businesses can mitigate these risks by paying close attention to their implementation techniques.

In particular, there are four common mistakes to avoid when setting up a cloud phone network:

Keeping Passwords Set to Defaults
Default passwords are very vulnerable, and often include easy-to-guess standards like “admin.” The problem is that busy IT departments often elect to change the passwords after the network is up and running, then forget to follow through. Always change default passwords to strong, specially chosen alternatives that include alphanumeric characters and cannot be guessed.

A Lack of Up-to-Date Network Security
Signing up for a cloud-based phone service means that all voice data also migrates to the new LAN. If the existing LAN has security gaps that have not been addressed, they will also affect the hosted phone service. Instead of relying on incomplete or ineffective security technologies, be sure to have the vendor perform a comprehensive network security assessment when the new phone service is implemented.

Failing to Use Encryption
Data can easily be intercepted over the Internet, and sensitive phone conversations can be damaging if they fall into the wrong hands. However, while many businesses use encryption techniques for their email and online communications, they fail to apply them to their phone services. End-to-end voice data packet encryption is a must-have for enterprises that conduct sensitive business over the phone. Complete voice encryption, while complex, is also an option.

Using Public Internet Connections

Cloud phone services use the Internet rather than traditional telephone lines. Thus, a company’s Internet service provider and the type of Internet service that’s in place both become critical factors in phone network security. A surprising number of businesses still use publicly accessible Internet connections that require little to no user authentication. This leaves the door open for hackers and cyber criminals to gain unauthorized access, and possibly intercept phone conversations.

On the whole fiber-optic Internet services are also considered more secure, since cables cannot be spliced or otherwise disrupted. Consider making the switch to fiber optics to maximize network security. The best way to avoid these issues altogether is to partner with a trusted vendor of telecom solutions like thinQ. With an advanced understanding of current best practices for cloud security and a complete line of communications services for businesses, Commio is a leading provider of fast, reliable next-generation technologies. Visit Commio today to learn more.

Date posted: May 1, 2021

Topic: Inbound Voice   Outbound Voice   Toll-Free   Uncategorized   Voice API  

Tags: CPaaS   SaaS   VoIP   VoIP Fraud  

Michael Tindall

CTO Michael Tindall leads Commio's product development and engineering teams. While attending Clemson University, Michael co-founded Tsoft Solutions, purchased by ClearSky Networks. Next he built and ran support for US Networks. Michael then worked for Bandwidth till he was approached by Aaron Leon to build a cloud-based routing system. The rest is history. Michael is a “40 under 40” winner, and one of only 18 OpenSIPS Certified professionals worldwide. When not coding the future of telecom, you’ll find him enjoying movies, cars, entertaining, and exercising.

Recent posts from Michael Tindall

Get the latest from Commio

We’ll send you one email a month featuring our latest blog content.

';