Cookie Preference Centre

Your Privacy
Strictly Necessary Cookies
Performance Cookies
Functional Cookies
Targeting Cookies

Your Privacy

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences, your device or used to make the site work as you expect it to. The information does not usually identify you directly, but it can give you a more personalized web experience. You can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, you should know that blocking some types of cookies may impact your experience on the site and the services we are able to offer.

Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site may not work then.

Cookies used

Performance Cookies

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site. They help us know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies, we will not know when you have visited our site.

Cookies used

Google Analytics

Functional Cookies

These cookies allow the provision of enhance functionality and personalization, such as videos and live chats. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies, then some or all of these functionalities may not function properly.

Cookies used




Targeting Cookies

These cookies are set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant ads on other sites. They work by uniquely identifying your browser and device. If you do not allow these cookies, you will not experience our targeted advertising across different websites.

Cookies used


This site uses cookies and other tracking technologies to assist with navigation and your ability to provide feedback, analyse your use of our products and services, assist with our promotional and marketing efforts, and provide content from third parties

Become a Basic Member for free. Click Here

Telephony, security and you - TEO Technologies - Blog

Telephony, security and you

In today's world of constant manipulation by hackers, it's critical for companies to ensure their corporate networks are secure and protected against intrusion. Especially important to effectively secure are communication tools like email, messaging and voice technologies.

The unified communications market continues to expand. A 2016 report from Research and Markets suggested that the value of the industry would grow at a compound annual rate of 12.3 percent from 2016 to 2020 as companies invest in global deployments of telephony solutions. These kinds of applications - like mobility, video conferencing and telepresence tools - are growing in popularity, especially as business process integration and social media have shifted to become the primary focus of many organizations.

As the UC market grows, so too does the need for IT teams to improve their security systems. What are some of the security challenges IT managers should watch out for that affect unified communications systems? Let's take a look at some of the most common ones and see how your organization can combat these security challenges:

1. DDoS attacks on UC ports

Distributed denial-of-service attacks are a constant source of concern for network operators. A DDoS attack occurs when hackers flood the network with pings and traffic so bandwidth is taken up and servers don't have enough power to accommodate requests, which clogs networks and makes it difficult for people to access important information.

According to Telecom Reseller, DDoS attacks are also a legitimate concern for UC systems. Some sophisticated attacks even use multiple IP- and SIP-level sources to make it difficult for systems to filter out unwanted traffic. The result is, inevitably, that phone systems go down - which means employees are unable to communicate and customers are unable to reach the system.

"TDoS incidents occur thanks to high levels of traffic."

2. Telephony denial-of-service attacks

Similar to the traditional DDoS attack, TDoS incidents occur thanks to high levels of traffic. However, instead of focusing on the network itself, hackers will utilize the telephony technology itself to flood the phone lines. Bad actors will utilize SIP generators to create more calls than the SIP trunks can handle, making it impossible for legitimate calls to come through. Complicating matters is the fact that these calls all appear legitimate to the system.

Installing application-aware firewall protection can be one solution to this challenge. In addition, it's important for employees and IT staff to monitor SIP networks closely when they're receiving a higher-than-normal volume of calls - this way, they can determine whether or not they are being targeted by a TDoS attack.

3. Eavesdropping

This is not a new fear, rather one that has evolved with the times. According to TechTarget contributor John Burke, the unauthorized interception of VoIP can occur if the network is compromised along any point in the data route. This makes it easy for criminals to activate handsets or headsets without taking these devices off the hook, which allows them to eavesdrop on private conversations that take place while employees aren't even talking on the phone.

"Performing such compromises may not be easy, but the changing nature of security attacks - from amateur to professional, from general to targeted - means that these techniques will be developed and available to anyone for a price," Burke wrote.

Hackers shouldn't keep you from investing in UC solutions.

Have the right tools on your side

When it comes to keeping your organization's communications tools safe from intrusion by malicious actors, it's important to partner with the right UC provider and work closely with them to ensure total network security. Having the right security tools can go a long way in the fight against data breaches, DDoS attacks and eavesdropping.

In fact, according to TechTarget contributor Joel Dubin, UC offers organizations a greater level of security than traditional phone lines thanks to the inherent adaptability of these kinds of solutions.

"Unified communications can be beefed up to be more secure than the old traditional phone network your company has always relied on," Dubin wrote. "Unified communications security can be accomplished by traditional network security best practices, secure network architectural design and network and hardware tools."

Deploying effective security solutions and beefing up your network starts with getting in touch with your UC provider. For more information about UC security and to talk about your telephony options, contact Teo Technologies today.


Publish Date: April 17, 2017 5:00 AM

2020 Buyers Guide Messaging Systems


miSecureMessages is an encrypted messaging application designed as a pager replacement for healthcare organizations, call centers, and enterprise environments.

Startel Corp.

Contact Center Software
Startel is a leading provider of unified communications, business process automation and performance management solutions for contact centers. Since its founding in 1980, Startel has established a loyal customer base from a variety of industries, including contact centers, education, healthcare, insurance and telephone answering service. Startel's solutions are designed to enhance the customer experience, improve employee productivity, reduce operating costs, and increase revenues.
PH: 800-782-7835


Engage with your customers in Real-Time.

Connect personally with your customers, generating new revenues and boosting CSAT scores. Synthetix Chat is the fastest way to engage your users, with a Live Key-Press Feed, ID and Verification, simultaneous chats and AI-Powered predictive suggestions, Synthetix Chat reduces averages handling times by up to 50%.
PH: +44 1279 555 580

View more from TEO Technologies

Recent Blog Posts:
What to know about touchpoints: Improve the customer experienceMarch 15, 2018 5:00 AM
IP phones are key ingredients in VoIP telephony successMarch 9, 2018 5:00 AM
Call recording: An essential feature in VoIP call centersMarch 5, 2018 5:00 AM
Is it time to upgrade your UC?: Tips, considerations and best practicesFebruary 6, 2018 5:00 AM
4 ways unified communications solutions improve your cybersecurity postureJanuary 31, 2018 5:00 AM
Are chatbots necessary in UC contact centers?January 30, 2018 5:00 AM
3 features to focus on when evaluating unified communications solutionsJanuary 30, 2018 5:00 AM
Contact center modernization: The time is now January 19, 2018 5:00 AM
What to know about using instant messaging in an enterprise settingDecember 13, 2017 5:00 AM
Security Awareness: Top Threats to UC TechnologyNovember 30, 2017 5:00 AM

ABOUT US IN 60 seconds!

Latest Americas Newsletter
both ids empty
session userid =
session UserTempID =
session adminlevel =
session blnTempHelpChatShow =
session cookie set = True
session page-view-total =
session page-view-total =
applicaiton blnAwardsClosed =
session blnCompletedAwardInterestPopup =
session blnCheckNewsletterInterestPopup =
session blnCompletedNewsletterInterestPopup =