If there’s one constant in the field of cyber-security, it’s that hackers will never stop looking for new ways to hurt your business. In the most recent development, they’ve set their sights on Voice over Internet Protocol (VoIP) systems. Technology administrators for hospitals, government entities, and small businesses need to be on alert for the possibility of damaging denial of service (DoS) to their communication system. Read on for a complete rundown on this scary trend.
Denial of service attacks
The end goal of any DoS attack is to overwhelm a system with so many requests that the system is eventually forced to shut down. Telephony DoS (TDoS) attacks are a subcategory wherein these types of attacks are leveled at VoIP systems. Sadly, this security bulletin has jumped to the front of security concerns as a result of its use against hospitals and 9-1-1 phone lines.
In another depressing development, some TDoS attackers demand a ransom to halt the attack. Much like ransomware, with the help of cryptocurrencies and caller-ID spoofing, it’s incredibly difficult to identify attackers.
TDoS attacks generally employ fewer resources than the DoS attacks that are designed to cripple IT systems such as networks, servers, and software. At its most basic, all that a TDoS attack requires is an automated phone dialer that calls a target phone number and hangs up — over and over. That very simple concept can stop anyone else from getting through the line.
What organizations need to do
Counterintuitive as it might sound, locking down your VoIP system with complicated and unnecessary security measures will ultimately do more harm than good. Most businesses can’t operate if they can’t communicate with their customers.
Although VoIP may be a digital resource similar to your other IT systems, the very nature of phone lines makes it impossible to hide them behind firewalls and other protections. However, there are new solutions that offer protection to VoIP systems. The new security protocols can protect your communication infrastructure against those who try to use force to gain access to your directory information. These protocols can also identify, reroute, and filter calls coming from known attackers.
If you’re experiencing any abnormalities with your VoIP system, or if you want to deploy the most up to date solution that the market has to offer, we have just the company in mind. With years of experience in the field, our expert staff is ready to help you at the drop of a hat — just call today.