Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks. Though Voice over Internet Protocol (VoIP) services are available for both consumer and business markets, it is from the latter that most enthusiasm for it has come; for this reason, it is also where most of VoIP’s security issues occur. While the commercial sector has, of course, invested heavily in protecting their data networks from […]
hacker
Businesses that implement VoIP (voice over IP) telephony systems on their local or wide area networks must ensure that they have effective protection against the growing incidence of VoIP hacking. That’s according to Graeme Victor, CEO of telecommunications solutions company Du Pont Telecom who says a small Johannesburg company was left with a telephone bill of more than R100 000 recently after criminals hacked into its VoIP telephony system over a weekend. VoIP is steadily […]
Viruses and computer hacking have become common terms we all hear regularly in news reports and online. And while the concept of a virus is easy to understand, mainly because we are all taught how biological viruses work in our own body, it’s difficult to understand exactly what is going on during an attack inside your PC. What we need is a realistic visualization of exactly what is happening as an attack happens, and how […]
Researchers propose using hacker tactics to secure cloud computing systems. Handing sensitive data over to a cloud computing provider makes many companies skittish. But new software, called HomeAlone, could help them come to terms with using such services. Cloud computing can save companies money by providing inexpensive, flexible storage and processing resources that are managed for them. All the same, many companies remain hesitant to turn their data over to a third party. Cloud computing […]
Every year or two, we face a new unstoppable IT trend that threatens the way we handle network security . Think instant messaging, USB keys, social media sites, and mobile computing. There are more on the way, as I wrote about last week, including Web 2.0 and cloud computing. Tracking these new computing trends is important for IT admins: They represent a potential swath of new opportunities for attackers to breach systems, steal data, and […]
The “cloud” is a convenient name for a new paradigm in computing that entails changes in policies and processes that can seem as amorphous and shifting as actual clouds. How can you ensure that your data is protected and secure while sitting in the cloud? Start by asking a few questions: Where is the data physically stored? How is it protected? Who can access it? How can you get it back? When the economic crisis […]