Posted by: Margaret Rouse
|“The major threats a company faces in using VoIP is that, when improperly implemented, eavesdropping is pretty easy.”
Randy Abrams, Threats On The Move
How does VoIP work?
When you call a number, a VoIP adapter logs on to a routing server. The VoIP adaptor is provided by your VoIP service provider. It might be a software program, a phone jack that plugs into your computer or a dedicated VoIP phone.
The routing server looks up the IP number that’s associated with the destination phone number and makes the connection. If the destination number isn’t using VoIP, the routing server recognizes that the destination number is a Public Switched Telephone Network (PSTN) phone and routes the call through the traditional Public Switched Telephone Network.
Learn more about the basics with our VoIP Security Guide.
VoIP security threats quiz
As VoIP becomes increasingly prevalent, so do the threats aimed at subverting its security. After all, letters IP in VoIP stand for Internet Protocol and that means attackers have a ready-made bag of tricks to pick from. How much do you know about the threats to VoIP security? Take our quiz to find out.