Doing business today, they say, is a bit like going to war. Would users fight alongside a soldier whose actions put them at risk? Would they let them reload their rifle, and trust them? Users would think twice.
Then they probably agree that accepting an unprotected Internet Protocol (IP) connection from a VOIP partner is not the safest tactic either.
“Besides inviting eavesdropping on your most sensitive business dealings, it also puts you at risk of sponsoring thousands of rands in phone calls made on your account,” says Rob Lith, director of Connection Telecom.
Clear and present 
How real is the threat of VOIP hacking? First of all, telephone hacking is a much more time-honoured tradition than many people realise. “Phreaking” – breaking into analogue networks to make free calls – dates back decades.
Since then, techniques have become much more sophisticated, and telephony has migrated onto IP networks, which are more open to interference than analogue lines. Mainstream tools meant to help companies assess their network vulnerability are in fact used by hackers for the opposite purpose – to exploit vulnerabilities.
For these reasons, it is much more common today to hear of hackers hijacking lines to make calls to high-value destinations, or diverting them via expensive routes and taking a cut of the termination fee.
Ultimately, the cost is borne by the consumer. A prepaid VOIP customer may be many thousands of rands down on their account before noticing anything, unless the proper systems are in place to halt illicit activity.
What can be done
So what can be done to keep a PBX safe from spilling trade secrets and bleeding out cash resources? The good news is that both VOIP providers and customers can pitch in. Here are some ways to safeguard telephony.
On the customer side:
* Password generators – cloud PBX customers should use only securely-generated random passwords. Passwords chosen by humans are often the weakest link in a company’s security posture, so invest in tools that manage and retrieve passwords easily and securely. 1password from AgileBits is a good example.
* Strong access policies – it can be as basic as allowing only known IP address ranges access to the voice platform. But this approach, while highly secure, sacrifices flexibility – for instance the ability to access the voice server while roaming overseas.
* Cloud customers can also load tools that monitor VOIP accounts for repeated failed password attempts, and block the IP address from which the attempts are coming pending administrator investigation. Fail2ban is one such tool.
On the provider side:
* Tools like Zabbix monitor unusual call patterns, destinations, numbers of live calls and account balances, and trigger alarms when certain values are exceeded (too many calls, a sharp drop in account balance or unusual international prefixes being dialled). Anything out of place is picked up long before too much harm can come to the user enterprise.
* VPN tunnelling used in an enterprise VOIP service shields calls from eavesdropping and line-jacking, making it as secure as line encryption. An MPLS network and VPN technology like ViBE are among the applications that enable secure VPN tunnelling.
* Private cloud solutions are shielded from the public Internet by virtue of the customer’s ownership of the hosted domain.
Conclusion
VOIP hacking, while not an everyday occurrence, is very possible. However, with the right tools and a few basic security habits, this form of communication can be highly secure.