How to Protect VoIP Against Risks
Many of the principles and practices for safe VoIP usage are the same as those you may already be practicing with other internet applications. Ignoring these general principles could allow attackers to gain control of your computer operating system by means of an existing software flaw or a misconfiguration unrelated to your VoIP application. It may then be possible for them to exploit flaws in your VoIP configuration, thereby possibly gaining access to personal information you share when using VoIP. Here are some of the key practices of good personal computing:•Use and maintain anti-virus and anti-spyware programs.
•Be cautious about opening files attached to email messages or instant messages.
•Verify the authenticity and security of downloaded files and new software.
•Configure your web browser(s) securely.
•Use a firewall.
•Identify, back-up, and secure your personal or financial data.
•Create and use strong passwords.
•Patch and update your application software.
•Do not divulge personal information to people you don’t know.
•If you are using a software VoIP application, consider using encryption software for both your installation and for those you wish to talk to.
No comments:
Post a Comment