FAQ: Voice Security

Enforcing strict security policies for every user on your network and keeping each device's firmware up-to-date is vital to the security of your data. Devices should have the ability to be updated at anytime from a single location, ensuring each device has the latest firmware and protection.

Telecom Metric actively monitors all layers of network traffic to prevent intruders from unauthorized access, DoS & DDoS attacks, Toll-fraud, and other common vulnerabilities. Secure SIP, SRTP encryption, VLAN segmentation, and MPLS Routing are just a few of the ways we protect your business’ sensitive voice data.

Learn More:

Telecom Metric Inc. uses best-in-class practices to strengthen an organization's communication security. We use a next-generation solution that has the ability to curtail expenses and increase efficiency, all while protecting yourself from unwanted attacks, intruders, and data breaches! Leveraging Telecom Metric Inc's cloud or on-prem, solution, you are guaranteed to enjoy secure communications.

Learn More:

Traditional voice systems were notoriously difficult to hack into. Attackers would have to gain access to proprietary systems from very few available entrance points to compromise them. Physical presence would usually be necessary either from within the telco’s central office or from within the cable closets of an enterprise to eavesdrop on voice conversations or to commit Toll-fraud or other harmful actions.

With the introduction of VoIP technology, companies can take advantage of the infrastructure of IP packet networks and take their phone system to new heights! At the same time, it opens up voice networks to the same inherent security risks that IP packet networks have. As a leader in the Enterprise Virtual Datacentre environment, Telecom Metric specializes in turnkey solutions that help companies of all sizes effectively and efficiently transition to a secure & private cloud-based infrastructure.

Learn More:

Common attacks on phone systems are:

  • DDoS attacks to lock down the system
  • Toll-fraud for financial gain (stealing your minutes)
  • Eavesdropping to compromise important business information

Learn More:

Just like any other device connected to the internet, phones can be exploited by cybercriminals for financial gain. When a phone solution is not properly implemented, hackers can take advantage of vulnerabilities to launch an attack that can:

  • Compromise valuable business data and customer information
  • Commit extortion and fraud
  • Eavesdrop during private direct and boardroom conference calls

Telecom Metric Inc. actively monitors all layers of network traffic to prevent intruders from unauthorized access, DDoS attacks, Toll-fraud, and other common vulnerabilities.

Learn More:

Most phone providers offer so called 'endpoint protection' where they encrypt the physical hardware such as your PBX system and desk phones. With Toll-fraud however, hackers use the outgoing SIP trunk network to reroute phone calls to take advantage of your minutes. This is often not monitored by your phone provider but by the owner of the SIP trunk, such as Bell and Broadsoft, and they charge you for those minutes.

TMI leverages it's own independent nationwide SIP provider. Therefore we are able to set automatic thresholds to monitor your outbound calling. If you reach 20% of your average spending our technicians will check whether the outbound calls are suspicious in order to avoid toll-fraud. Most often calls to abnormal destinations cause unexpected costs when the phone is being hacked. Our technicians will also inform you when 80% of your normal maximum spending is reached. This assures that you never pay too much while we make sure that no one else uses your network.

Learn More:

DDoS (Distributed Denial of Service) is an attempt to exhaust the resources available to a network, application, or service so that genuine users cannot gain access. These attacks are designed to basically take down a network, at least temporarily, making it difficult if not impossible for the network to function as it was designed to do. Hackers will launch DDoS attacks for a number of reasons including:

  • To extort money
  • To damage the brand and reputation of a business
  • To disrupt business services for customers

Learn More:

Eavesdropping is the intentional act of secretly or stealthily listening to the private conversation or communications of others without their consent. Telecom Metric uses the SRTP protocol to provide media encryption and message authentication for both the phone's network as well as trunking. This protects clients from replay (man-in-the-middle) and eavesdropping attacks.

Learn More:

Once your voice data is transferred outside of Canada, it becomes subject to the laws of the country where the data is stored. For instance, if you send voice data to the U.S. with an American provider (or cloud hosting provider), the voice data would then be subject to U.S. law, and law enforcement agents in the U.S. could gain access to search this data held by American service providers such as backups and voicemail.

If you are using or thinking about switching to a hosted voice solution you have to remember that your organization remains accountable for the information and where it traverses the internet. Canadian telecom companies who use Canadian cloud providers have the best knowledge of the country’s privacy laws, so they’re in the best position to securely store and transfer data for public and private companies.

Learn More:

Security Monitoring as a Service (SMaaS) is a service offered by Telecom Metric where we actively monitor all layers of network traffic to prevent intruders from unauthorized access, DoS & DDoS attacks, Toll-fraud, and other common vulnerabilities. Telecom Metric aims to detect and resolve network problems before our customers report the problems.

Learn More:

TM’s SMaaS solution includes real-time network, usage, and security alerts to ensure that you're always in the loop when it comes to your voice security. As soon as an incident occurs, you will be instantly notified by email, SMS, or push notification. You can rest assured that you will be notified of issues promptly before emergencies crop up allowing you to keep full control of what drives your customers' voice communications.

Learn More:

PIPEDA (the Personal Information Protection and Electronic Documents Act) protects consumer data across the country. PIPEDA holds private organizations accountable for protecting information during transit and at rest even when outsourcing. While information can cross borders, your business remains liable for any problems or breaches. Canadian provinces have additional provincial regulations that individual industries and sectors must follow.

Learn More:

SIP (Session Initiation Protocol) uses virtual phone lines that enable users to make and receive phone calls over the internet to anyone in the world with a phone number. Telecom Metric recommends choosing a strong partner that will help walk you through the implementation process and support you as the needs of your business change over time.

TM uses the SRTP protocol to provide media encryption and message authentication for both the phones network as well as trunking. This protects our clients from replay (man-in-the-middle) and eavesdropping attacks. If you have additional questions about how SIP might work for you, we’re happy to help.

Learn More:

NEED MORE INFORMATION?

One of our solution specialists will be happy to contact you for a quick call at your convenience to learn more about Telecom Metric's secure cloud PBX solutions.

By submitting your information, you agree that Telecom Metric may contact you regarding relevant content, products, and special offers. You also agree to Telecom Metric's Privacy Policy.