We Believe We Have the Most Secure VoIP Service
Companies come to us specifically for communications security. Below are several design elements we provide for secure voice conversations. We don’t see others doing the same for for Virginia business.
|National VoIP Firms||Infotel Systems|
|LAN||Phone and Computer share one Ethernet cable and one switch.||We install separate voice cabling to physically isolate the voice and data networks.|
|VOICE ENCRYPTION||No. Just unpack the phone and plug it in.||Yes. We install a voice encryption router at your premise.|
|CARRIER HOTELS||90% of "Nationals" are on the West Coast. VoIP traffic goes through 3rd party "carrier hotels" that hand off from one carrier to another.||Your conversation NEVER leaves your Internet carrier (Verizon, Comcast, Cox). We are co-located with Verizon and one mile from the Comcast RVA hub. We call this "close cloud" , we are simply close to you Richmond.|
|PHONE PROVISIONING||Uses "Zero touch" install. Out of box phone first contacts a China provisioning server that registers your phone's ID and your business Internet IP address.||We use our own provisioning server in our data center.|
|SERVER ISOLATION||Huge virtualized servers. A server hack to one customer can provide a "vector" to other customers on that same server.||We don't do this and otherwise, no comment.|
|VOICE RECORDINGS||Stored on hosted servers. This was the data breach with Broadvoice||We offer on site "tap and store" of recordings. The data never leaves your premise.|
Here are just a few of the major data breaches in recent history
|Year||Company||Breach (Entry) Point||Damage|
|2014||Target Stores||3rd party HVAC vendor's server||40 million credit cards numbers compromised|
|2019||Broadvoice||Shared Voicemail server||200,000 voicemail transcripts, customer data, etc|
|2020||Solar Winds||Software Update affected all who downloaded it||Data breach of government servers including Department of Treasury and Commerce|
Old Phone Service Was Secure, Some VOIP Systems Are Not
Your old phone system used (POTS) Plain Old Telephone Service. It was the analog line standard for one hundred years since Alexander Graham Bell. Many considered “POTS” impervious to hacking. Yet, most VoIP phone systems use unsecured Internet connections connected to your data network. VoIP provider Vonage states on this web page “.. do not use VoIP … use analog telephone lines instead as they are just harder to tap and extract the data from”
The Risk of Unsecured Voice – PCI (credit card) Example
Your sales person takes a credit card number over your new Voice over Internet (VoIP) telephone system. The system does not feature VoIP audio encryption. Many systems fail this VoIP security requirement as PCI 3.0 was only ratified in November 2018. You are subject to these fines. https://www.google.com/search?q=pci+fines
Articles on VoIP hacks
Industry Standards Security Review
- HIPAA – requires voicemails, audio recordings and call reports to be protected. Unlike national providers, we can provide an onsite storage for the ultimate in compliance.
- PCI – Telephone system VoIP security rules. We encrypt all traffic. Handled!
- FIRNA – rule 4370 recommends business continuity systems such as 4G internet backup to a failed Comcast Internet. Rule 3170 covers voice recordings.
- NIST – standards for VoIP security to include separation of voice and data networks. A national VoIP company that self-install ships phones in a box does not comply.
- SOX – Reflects NIST standards for data network protection.