Dear Editor,
This latest potential VoIPtalk breach is one that should make the SIP Trunking industry sit up and take serious notice.
As the benefits of VoIP become ever clearer to businesses of every size, sales of the underpinning SIP Trunking technology continue to grow, providing a great revenue stream for vendors and resellers alike. Yet, In an era of near continuous security breaches, SIP trunking is inherently vulnerable. Unsecured environments are at risk of voicemail hacking, denial of service attacks and toll fraud – but unfortunately, when it comes to SIP Trunking too many vendors have downplayed the security risks as, to date, the traditional Session Border Controller (SBC) option has been a significant sales inhibitor.
Many SIP Trunking vendors will therefore cite their own SBC investment: if they are secure, their customers are secure. But take a closer look at the contract and it becomes very clear that in the event of a breach that results in toll fraud, denial of service or data loss, the provider is not liable for the cost.
If therefore, the VoIPtalk breach has led to hackers gaining access to customers’ VoIP passwords, any organisation who doesn’t have a security solution in place will be at serious risk of a breach themselves.
The fact is that in a constantly evolving threat landscape security has to be considered – this head in the sand approach adopted by many SIP Trunk providers and resellers is simply not good enough given the scale of attack being experienced by UK businesses.
Actively raising the issue of security is now a necessity for all.
Yours sincerely,
Paul German,
CEO
VoipSec