As
an IP-reliant service, hosted PBX users should watch out for a variety
of cyber threats: denial of service attacks (DoS), interception,
eavesdropping, vishing, theft, hacking, fraud and more. Although
standard security protocols do serve as protective agents on a given
network, most firewalls cannot stop attacks directed at the signaling or
media layers. But this doesn’t mean hosted PBX users are helplessly
susceptible to such attacks.Tuesday, February 17, 2015
Intrusion-Prevention Systems (IPS) for Hosted PBX
Intrusion-Prevention Systems (IPS) for Hosted PBX
As
an IP-reliant service, hosted PBX users should watch out for a variety
of cyber threats: denial of service attacks (DoS), interception,
eavesdropping, vishing, theft, hacking, fraud and more. Although
standard security protocols do serve as protective agents on a given
network, most firewalls cannot stop attacks directed at the signaling or
media layers. But this doesn’t mean hosted PBX users are helplessly
susceptible to such attacks.
As
an IP-reliant service, hosted PBX users should watch out for a variety
of cyber threats: denial of service attacks (DoS), interception,
eavesdropping, vishing, theft, hacking, fraud and more. Although
standard security protocols do serve as protective agents on a given
network, most firewalls cannot stop attacks directed at the signaling or
media layers. But this doesn’t mean hosted PBX users are helplessly
susceptible to such attacks.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment