Voice over Internet Protocol (VoIP) has gained in popularity for the corporate environment and even the consumer space as the cost savings as compared with traditional phone communications are significant. And, by merging the data and voice networks onto one, the business has access to enhanced capabilities, such as VoIP call recording, to extend the value of the platform.
One interesting aspect in the world of
VoIP call recording, and VoIP use in general, is the heightened security risk that it can present. This Elitetele
piece recently examined this concept, highlighting the importance of security VoIP communications. This writer went so far as to suggest that when VoIP is vulnerable, the industry is insecure.
There is some truth to this statement, but it is not necessarily in the hands of the industry when it comes to protecting a system that must indulge in VoIP call recording. In reality, the calls made on the network are only as secure as the network itself and this security is at the discretion of the company or the IT manager.
According to Graeme Victor, CEO of telecommunications company Du Pont Telecom (News - Alert), VoIP offers a number of advances to businesses, especially the ease in which VoIP call recording can be completed on the network. At the same time, there are new demands placed on the network managers in terms of security. A proactive approach is necessary and it should start with a risk analysis. IT managers should complete this
step to begin the proper protection against attacks.
Victor believes VoIP leaves itself open to increased risks as compared with conventional analog phone systems simply because VoIP is launched on an open network scheme. Within the VoIP call recording environment, signals and data are transferred over the unsecured network of the Internet. By comparison, the analog system operates on a closed network and receiving devices are in fixed areas.
Threats also exist that are
content-based, including unwanted calls and attacks that could easily damage the voice transport system. As a result, it is important that the management and regulation of the VoIP call recording systems is consistent and takes into account certain vulnerabilities. Otherwise, unsecure VoIP calls could be manipulated and diverted, allowing VoIP call recording to
take place outside of the network, without the knowledge of call participants.
Therefore, it is important when migrating from a pure data network to a VoIP-enabled network that the existing network be checked first for security vulnerabilities. VoIP does impose different requirements than pure data applications and secure VoIP call recording demands a secure network.
Susan J. Campbell is a contributing editor for TMCnet and has also written for eastbiz.com. To read more of Susan’s articles, please visit her columnist page.Edited by Juliana Kenny