If you’re like most IT professionals, you’ve noticed that your roster of third-party providers continues to grow.
- PilotHouse Vendor Rating
- Contact Center and Customer Engagement
- Cloud and Data Center
- Cost Models and Total Cost of Ownership
- Enterprise Trusted Advisor
- IT Innovation, Transformation, and Enterprise Technology
- Mobile and Network Services
- Security, Risk Management, and Compliance Research Initiatives
- Unified Communications and Collaboration
Enterprise Connect 2015 proved a popular venue for contact center and customer engagement announcements.
At the 25th anniversary Enterprise Connect this week in Orlando Microsoft took a bit of a gamble, walking away from the “Lync” name for its unified communications platform that it had adopted just
Cisco IP Phone Vulnerability Casts New Light on VOIP Security
Researchers at Columbia University unveiled a security flaw in Cisco IP phone firmware that makes them easily vulnerable to remote eavesdropping, allowing hackers to turn on speakerphones and disable phone lights to secretly listen in on, and/or record conversations. Only direct access to one phone is necessary for a hacker to potentially compromise all phones in an enterprise telephony system.
While Cisco has since offered a patch, it’s likely that the vast majority of Cisco IP phones remain vulnerable as security is typically not a high priority for those managing VOIP systems. Just 39% of companies cite “security” as their primary reason for deploying session border controllers at the interface of their telephony environment with SIP trunking service providers. Far less actively test or monitor their IPT environments for threats and attacks or deploy application specific firewalls to protect against VOIP threats.
ETA Bottom Line: Incorporate active security monitoring and proactive threat protection into your IPT architecture. Stay on top of vulnerability announcements and apply appropriate patches.