Keep Those VOIP Phones Off Your Main Network
One of the less common, but well-known, attack vectors for companies are the VOIP phones. Yes, that thing sitting on your employees’ desks can be used to infiltrate your network. If intruders can get past your gateway and firewall (you DO have at least one firewall, right?!) then it is possible to attack any device that is plugged into your network whether it’s via Ethernet cable or Wi-Fi. One of the ways they can hide and record your operations is by breaching and installing their software on your VOIP phones.
Once they have something installed on a phone, they can secure an easy way in and around your network. They can also use these devices as a springboard to attack other workstations, servers, or appliances. Did you know your two-factor authentication you use when connecting to QuickBooks Online is now easily bypassed? As of this year, it’s a pretty common practice amongst digital thieves, but the first thing they need in order to start the silent mayhem is access to the inside of your network. Keep them out by segmenting your phone system away from the rest of your network. Install firewalls between departments, phones, and wireless access points, not just the Internet. Assume any device on your network could be compromised and you’re one step closer to ensuring your business stays alive for the long haul as these new times of dramatically increased small business hacking craziness continues.
Click to Call or Email us today to schedule a meeting to discuss your company’s Cybersecurity needs before it’s too late.